{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:20Z","timestamp":1742914100760,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953874"},{"type":"electronic","value":"9783030953881"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95388-1_16","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"240-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Anti-forensic Method Based on\u00a0RS Coding and\u00a0Distributed Storage"],"prefix":"10.1007","author":[{"given":"Xuhang","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Huiyong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"16_CR1","unstructured":"AccessData. https:\/\/accessdata.com\/product-download\/ftk-tools-7-4-2. Accessed 14 Aug 2021"},{"key":"16_CR2","unstructured":"CAINE Linux. https:\/\/www.caine-live.net\/. Accessed 15 Aug 2021"},{"key":"16_CR3","unstructured":"east-tec InvisibleSecrets. https:\/\/www.east-tec.com\/invisiblesecrets\/. Accessed 16 Aug 2021"},{"key":"16_CR4","unstructured":"Hex workshop. http:\/\/www.hexworkshop.com\/. Accessed 14 Aug 2021"},{"key":"16_CR5","unstructured":"Kali Linux. https:\/\/www.kali.org\/. Accessed 15 Aug 2021"},{"key":"16_CR6","unstructured":"Killdisk User Manual. https:\/\/www.killdisk.com\/manual\/index.html#erase-methods.html. Accessed 15 Aug 2021"},{"key":"16_CR7","unstructured":"Metasploit. https:\/\/github.com\/rapid7\/metasploit-framework\/. Accessed 16 Aug 2021"},{"key":"16_CR8","unstructured":"U.S. Air Force System Security Instruction 5020 (September 2000). https:\/\/cryptome.org\/afssi5020.htm. Accessed 16 Aug 2021"},{"key":"16_CR9","unstructured":"DoD 5220.22-M National Industry Security Program Operating Manual (NISPOM) (May 2016). https:\/\/www.esd.whs.mil\/portals\/54\/documents\/dd\/issuances\/dodm\/522022m.pdf. Accessed 16 Aug 2021"},{"key":"16_CR10","unstructured":"Andreas, S.: strongSwan. https:\/\/github.com\/strongswan\/strongswan. Accessed 14 Aug 2021"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Banakh, R., Piskozub, A.: Attackers\u2019 wi-fi devices metadata interception for their location identification. In: 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), pp. 112\u2013116 (2018). https:\/\/doi.org\/10.1109\/IDAACS-SWS.2018.8525538","DOI":"10.1109\/IDAACS-SWS.2018.8525538"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Chandramouli, S.P., et al.: Measuring e-mail header injections on the world wide web. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1647\u20131656. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3167132.3167308","DOI":"10.1145\/3167132.3167308"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"S66","DOI":"10.1016\/j.diin.2016.04.006","volume":"18","author":"K Conlan","year":"2016","unstructured":"Conlan, K., Baggili, I., Breitinger, F.: Anti-forensics: furthering digital forensic science through a new extended, granular taxonomy. Digital Invest. 18, S66\u2013S75 (2016). https:\/\/doi.org\/10.1016\/j.diin.2016.04.006","journal-title":"Digital Invest."},{"issue":"6","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/LCOMM.2013.040913.130419","volume":"17","author":"M Cristea","year":"2013","unstructured":"Cristea, M., Groza, B.: Fingerprinting smartphones remotely via ICMP timestamps. IEEE Commun. Lett. 17(6), 1081\u20131083 (2013). https:\/\/doi.org\/10.1109\/LCOMM.2013.040913.130419","journal-title":"IEEE Commun. Lett."},{"issue":"01","key":"16_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MC.2001.10008","volume":"34","author":"L Garber","year":"2001","unstructured":"Garber, L.: Computer Forensics: high-tech law enforcement. Computer 34(01), 22\u201327 (2001). https:\/\/doi.org\/10.1109\/MC.2001.10008","journal-title":"Computer"},{"key":"16_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-99277-8_6","volume-title":"Advances in Digital Forensics XIV","author":"T G\u00f6bel","year":"2018","unstructured":"G\u00f6bel, T., Baier, H.: Anti-forensic capacity and detection rating of hidden data in the ext4 filesystem. In: DigitalForensics 2018. IAICT, vol. 532, pp. 87\u2013110. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99277-8_6"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"S111","DOI":"10.1016\/j.diin.2018.01.014","volume":"24","author":"T G\u00f6bel","year":"2018","unstructured":"G\u00f6bel, T., Baier, H.: Anti-forensics in ext4: on secrecy and usability of timestamp-based data hiding. Digital Invest. 24, S111\u2013S120 (2018). https:\/\/doi.org\/10.1016\/j.diin.2018.01.014","journal-title":"Digital Invest."},{"key":"16_CR18","unstructured":"Grugq, T.: Defeating forensic analysis on unix. Phrack Mag. 11(58) (2002). http:\/\/phrack.org\/issues\/59\/6.html"},{"key":"16_CR19","unstructured":"Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: 6th USENIX Security Symposium (USENIX Security 96). USENIX Association, San Jose, CA (July 1996)"},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Hitefield, S.D., Fowler, M., Clancy, T.C.: Exploiting buffer overflow vulnerabilities in software defined radios. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1921\u20131927 (2018). https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00318","DOI":"10.1109\/Cybermatics_2018.2018.00318"},{"key":"16_CR21","unstructured":"Jeitner, P., Shulman, H.: Injection attacks reloaded: tunnelling malicious payloads over DNS. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3165\u20133182. USENIX Association (August 2021)"},{"key":"16_CR22","doi-asserted-by":"publisher","unstructured":"Kakde, Y., Gonnade, P., Dahiwale, P.: Audio-video steganography. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/ICIIECS.2015.7192885","DOI":"10.1109\/ICIIECS.2015.7192885"},{"issue":"5","key":"16_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3390\/info12050181","volume":"12","author":"C Karagiannis","year":"2021","unstructured":"Karagiannis, C., Vergidis, K.: Digital evidence and cloud forensics: contemporary legal challenges and the power of disposal. Information 12(5), 181 (2021)","journal-title":"Information"},{"key":"16_CR24","unstructured":"Kessler, G.C.: GCK\u2019S File Signatures Table (June 2021). https:\/\/www.garykessler.net\/library\/file_sigs.html. Accessed 15 Aug 2021"},{"key":"16_CR25","unstructured":"Kissel, R., Regenscheid, A., Scholl, M., Stine, K.: NIST Special Publication 800\u201388 Revision 1: sGuidelines for Media Sanitization (December 2014). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-88r1.pdf. Accessed 16 Aug 2021"},{"issue":"18","key":"16_CR26","doi-asserted-by":"publisher","first-page":"25427","DOI":"10.1007\/s11042-019-7734-x","volume":"78","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Kansal, A., Singh, K.: An improved anti-forensic technique for jpeg compression. Multimedia Tools Appl. 78(18), 25427\u201325453 (2019)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"16_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1361-3723(10)70112-3","volume":"2010","author":"S Mansfield-Devine","year":"2010","unstructured":"Mansfield-Devine, S.: Fighting forensics. Comput. Fraud Secur. 2010(1), 17\u201320 (2010). https:\/\/doi.org\/10.1016\/S1361-3723(10)70112-3","journal-title":"Comput. Fraud Secur."},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/10719724_32","volume-title":"Information Hiding","author":"AD McDonald","year":"2000","unstructured":"McDonald, A.D., Kuhn, M.G.: StegFS: a steganographic file system for Linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 463\u2013477. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10719724_32"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"S76","DOI":"10.1016\/j.diin.2016.04.010","volume":"18","author":"S Neuner","year":"2016","unstructured":"Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S., Weippl, E.R.: Time is on my side: steganography in filesystem metadata. Digital Invest. 18, S76\u2013S86 (2016). https:\/\/doi.org\/10.1016\/j.diin.2016.04.010","journal-title":"Digital Invest."},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Perez, B., Musolesi, M., Stringhini, G.: You are your metadata: identification and obfuscation of social media users using metadata information. In: Proceedings of the 12th International Conference on Web and Social Media, ICWSM 2018, Stanford, California, USA, 25\u201328 June 2018. pp. 241\u2013250. AAAI Press (2018)","DOI":"10.1609\/icwsm.v12i1.15010"},{"key":"16_CR31","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/0-387-31163-7_20","volume-title":"Advances in Digital Forensics","author":"S Piper","year":"2006","unstructured":"Piper, S., Davis, M., Manes, G., Shenoi, S.: Detecting hidden data in Ext2\/Ext3 file systems. In: Pollitt, M., Shenoi, S. (eds.) DigitalForensics 2005. ITIFIP, vol. 194, pp. 245\u2013256. Springer, Boston, MA (2006). https:\/\/doi.org\/10.1007\/0-387-31163-7_20"},{"issue":"2","key":"16_CR32","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960)","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"16_CR33","unstructured":"Rogers, M.: Anti-forensics (September 2005). https:\/\/www.researchgate.net\/profile\/Marcus-Rogers-2\/publication\/268290676_Anti-Forensics_Anti-Forensics\/links\/575969a908aec91374a3656c\/Anti-Forensics-Anti-Forensics.pdf"},{"issue":"2","key":"16_CR34","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2(2), 159\u2013176 (1999). https:\/\/doi.org\/10.1145\/317087.317089","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR35","unstructured":"Walters, A.: Volatility Foundation. https:\/\/www.volatilityfoundation.org\/. Accessed 14 Aug 2021"},{"issue":"9","key":"16_CR36","doi-asserted-by":"publisher","first-page":"6083","DOI":"10.1109\/TII.2019.2955152","volume":"16","author":"T Wang","year":"2020","unstructured":"Wang, T., Wang, P., Cai, S., Ma, Y., Liu, A., Xie, M.: A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Trans. Ind. Inf. 16(9), 6083\u20136091 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2955152","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"16_CR37","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(20)30030-0","volume":"2020","author":"MA Wani","year":"2020","unstructured":"Wani, M.A., AlZahrani, A., Bhat, W.A.: File system anti-forensics - types, techniques and tools. Comput. Fraud Secur. 2020(3), 14\u201319 (2020). https:\/\/doi.org\/10.1016\/S1361-3723(20)30030-0","journal-title":"Comput. Fraud Secur."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95388-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T17:18:16Z","timestamp":1674839896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95388-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953874","9783030953881"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95388-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}