First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-16 19:06:35Steganography tools Steganalysis Anti-computer forensics -graphy OpenPuff BPCS-Steganography Cryptography Espionage Steganography | Source URL: www.blackhat.comDownload Document from Source WebsiteFile Size: 807,22 KBShare Document on Facebook |
![]() | Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation Przemyslaw Pajek and Elias Pimenidis School of Computing IT and Engineering, University of East London, United Kingdom ,DocID: 1qqxY - View Document |
![]() | The Art of Defiling Defeating Forensic Analysis the grugq Overview DocID: 1pEFg - View Document |
![]() | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector SpaceDocID: 1ppWe - View Document |
![]() | AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASEDDocID: 1mvD3 - View Document |
![]() | Information at all.net12b http://all.net/DocID: 18WCp - View Document |