Steffen Wendzel<p>A Generic Taxonomy for <a href="https://dju.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>. Published today by ACM Comp. Surveys (CSUR). Joint-work w/ W. Mazurczyk , <span class="h-card" translate="no"><a href="https://mastodon.uno/@lucacav" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lucacav</span></a></span>, A. Mileva, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@Jana_Dittmann" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jana_Dittmann</span></a></span>, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@kraetzer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kraetzer</span></a></span>, K. Lamshöft, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@THB_Security_Research" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>THB_Security_Research</span></a></span>, L. Hartmann, J. Keller, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@TN_THB" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TN_THB</span></a></span> and <span class="h-card" translate="no"><a href="https://mastodon.social/@niosat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>niosat</span></a></span> </p><p>Paper: <a href="https://dl.acm.org/doi/10.1145/3729165" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dl.acm.org/doi/10.1145/3729165</span><span class="invisible"></span></a></p><p><a href="https://dju.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://dju.social/tags/surveys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveys</span></a> <a href="https://dju.social/tags/taxonomy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxonomy</span></a> <a href="https://dju.social/tags/informationhiding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationhiding</span></a> <a href="https://dju.social/tags/covertchannels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>covertchannels</span></a> <a href="https://dju.social/tags/stego" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stego</span></a></p><p>There's supplemental material available (just scroll down on the linked page). It also features the description method for steganography techniques.</p>