IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 5, May 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Steganography On Internet And Its Forensic Analysis

[Full Text]

 

AUTHOR(S)

Sadhana Rathore, Arundhati Walia

 

KEYWORDS

 

ABSTRACT

 

REFERENCES

[1] http://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer-forensic-analysis-1014

[2] http://www.ijcta.com/documents/volumes/vol2issue3/ijcta2011020338.pdf

[3] http://www.garykessler.net/library/fsc_stego.html

[4] http://cs.wellesley.edu/~crypto/lectures/tr10.pdf

[5] http://omicsonline.org/open-access/an-alternative-approach-of-steganography-using-reference-image-0976-4860-1-95-102.pdf?aid=35426

[6] Alharbi, S., Weber-Jahnke, J., &Traore, I. (2011). The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. International Journal of Security and Its Applications, 5(4), 59–72. Retrieved from http://www.earticle.net/article.aspx?sn=158919

[7] Ashok, J., Raju, Y., Munishankaraiah, S., & Srinivas, K. (2010). Steganography: An overview. International Journal of Engineering Science and Technology, 2(10), 5985–5992. Retrieved from http://www.ijest.info/docs/IJEST10-02-10-100.pdf

[8] Castiglione, A., Cattaneo, G., & De Santis, A. (2011). A forensic analysis of images on online social networks. 2011 Third International Conference on Intelligent Networking and Collaborative Systems, 679–684. doi: 10. 1109 / IN CoS. 2011.17

[9] Castiglione, A., D‘Alessio, B., & De Santis, A. (2011). Steganography and secure communication on online social networks and online photo sharing. 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, 363–368.

[10] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. doi : 10. 1016 / j. sigpro. 2009. 08. 010