April 2016
Intermediate to advanced
300 pages
7h 14m
English
1. Kipper, G., Investigator’s Guide to Steganography, CRS Press LLC, pp. 15–16, 2004.
2. Davern, P. and Scott, M., Steganography its history and its application to computer based data files, Internal Report Working Chapter: CA-0795, School of Computing, Dublin City University 1995, Available: http://computing.dcu.ie/research/chapters/1995/0795.pdf, accessed on August 03, 2006.
3. Johnson, N. F. and Katzenbeisser, S., A survey of steganographic techniques, in S. Katzenbeisser and F. Petitcolas, Eds., Information Hiding, MA: Artech House, Norwood, pp. 43–78, December 1999.
4. Kessler, G. C., An overview of steganography for the computer forensics examiner, An edited version, Forensic Science Communications. Technical Report, Vol. 6, ...