All Stories

  1. Identifying Overlapping Ideas and Concepts of Methods that Hide Information
  2. Combining Different Existing Methods for Describing Steganography Hiding Methods
  3. Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification
  4. GAN-based Minutiae-driven Fingerprint Morphing
  5. A Generic Taxonomy for Steganography Methods
  6. A Generic Taxonomy for Steganography Methods
  7. A Generic Taxonomy for Steganography Methods
  8. Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection
  9. The Threat of Covert Channels in Network Time Synchronisation Protocols
  10. Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks
  11. A Systematic Analysis of Covert Channels in the Network Time Protocol
  12. A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis
  13. A Revised Taxonomy of Steganography Embedding Patterns
  14. Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks
  15. Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features
  16. General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations
  17. Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset
  18. Steganography by synthesis
  19. Extended StirTrace Benchmarking of Biometric and Forensic Qualities of Morphed Face Images