All Stories

  1. Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification
  2. Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks
  3. A Systematic Analysis of Covert Channels in the Network Time Protocol
  4. A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis
  5. A Revised Taxonomy of Steganography Embedding Patterns
  6. Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks
  7. Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features
  8. General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations
  9. Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset
  10. Steganography by synthesis
  11. Extended StirTrace Benchmarking of Biometric and Forensic Qualities of Morphed Face Images