Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling tech...

متن کامل

Catheter related artifacts on bone scans: report of two cases

Bone scanning using the 99mTc-phosphate analogs is an established diagnostic modality and a commonly requested radioisotope examination for a variety of pathologies involving the skeleton, such as osteomyelitis, bony metastases, and occult fractures. The bone scan is one of the most commonly requested procedure in most nuclear medicine department. The images show areas of increased and de...

متن کامل

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

On-Site Synchronization of Software Artifacts

Software development often involves multiple artifacts, such as feature models, UML models and code, which are in different formats but share a certain amount of information. When users change one artifact or change several artifacts simultaneously, we need to propagate these changes across all artifacts to ensure them consistent. Existing approaches focus on off-site synchronization, that is, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Digital Forensics, Security and Law

سال: 2009

ISSN: 1558-7223

DOI: 10.15394/jdfsl.2009.1055