Login / Signup
Suspects' data hiding at remaining registry values of uninstalled programs.
Young-Soo Kim
Sang-Su Lee
Dowon Hong
Published in:
e-Forensics (2008)
Keyphrases
</>
data hiding
error correction
spread spectrum
reversible data hiding
spatial domain
secret data
metadata
data hiding scheme
tamper detection
information hiding
high capacity
cover image
data embedding
secret message
watermarking technique
computer vision
binary images
co occurrence
image processing