P. Alvarez, Using extended file information (EXIF) file headers in digital evidence analysis, International Journal of Digital Evidence, vol.2, issue.3, 2004.

A. Developers and . Automator, , 2018.

, Android Open Source Project, Dalvik Bytecode (source.android. com/devices/tech/dalvik/dalvik-bytecode), 2018.

, StegoDB: An Image Dataset for Benchmarking Steganalysis Algorithms, 2017.

A. Cheddad, J. Condell, K. Curran, and P. Mckevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010.

F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, Comparative study of digital audio steganography techniques, vol.2012, 2012.

, F5-Steganography Project, F5 Steganography in Java, p.5, 2017.

J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.

B. Gruver, Smali Home (github, 2017.

G. Project, Pixelknot: Hidden Messages, 2017.

. Herodotus, The Histories, A. Burn (Ed.) and A. de Selincourt (Translator), Penguin Books, 1954.

F. Huang, J. Huang, and Y. Shi, New channel selection rule for JPEG steganography, IEEE Transactions on Information Forensics and Security, vol.7, issue.4, pp.1181-1191, 2012.

J. D. Project and J. Decompiler, Yet Anther Fast Java Decompiler (jd.benow.ca), 2015.

N. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, vol.31, issue.2, pp.26-34, 1998.

I. Lee and W. Tsai, A new approach to covert communications via PDF files, vol.90, pp.557-565, 2010.

S. Lyu and H. Farid, Steganalysis using higher-order image statistics, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, pp.111-119, 2006.

W. Mazurczyk, P. Szaga, and K. Szczypiorski, Using transcoding for hidden communications in IP telephony, Multimedia Tools and Applications, vol.70, issue.3, pp.2139-2165, 2014.

B. Pan, /pxb1988/dex2jar), p.2, 2018.

N. Provos, Outguess (www.outguess.org, p.2017

N. Provos, StegDetect (github.com/abeluck/stegdetect, 2017.

R. and D. , Vinci Secret Image (play.google.com/store/apps/ details?id=jubatus.android.davinci), 2012.

M. Sadek, A. Khalifa, and M. Mostafa, Video steganography: A comprehensive review, Multimedia Tools and Applications, vol.74, pp.7063-7094, 2015.

S. J. Software, Data Stash, p.2017

C. Tumbleson and R. Winsniewski, Apktool: A Tool for Reverse Engineering Android APK Files, 2016.

, Twisted Pear Productions, Camouflage (camouflage.unfiction. com), 2018.

D. Upham, Steganographic Algorithm Jsteg, 1993.

A. Westfeld, F5-A steganographic algorithm, Information Hiding, pp.289-302, 2001.

, WetStone Technologies, 2018.

J. Wikibin, , p.2017