2Shin DM, Kim Y, Byun KD. Data Hiding in Windows Executable Files. Australian Digital Forensics Conference, 2008.
3Gupta MR, Hoeschele MD, M.K.R. Hidden disk areas: Hpa and dco. International Journal of Digital Evidence, 2006,5(1).
4Berghel.Hiding Data, forensics,and anti-forensics.Communi- cations of ACM, 2007, 50(4): 15-20.
5Huebner E, Bem D, Wee CK. Data Hiding in the NTFS File System. Digital Investigation 3, 2006:2 l 1-226.
6Brian Carrier, Eugene H Spafford."Getting Physical with the Digital Investigation Process".International Journal of Digital Evidence ,2013 ( 12 ) : 308-309.
7Reith M, Cart C, Gunsch G.An Examination of Digital Forensic Models.International Journal of Digital Evidence ,2011 ( 10 ) : 390-391.
8T Y Liu, W H Tsai. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique [ J ]. IEEE Transactions on Information Forensics And Security, 2007,2 ( 1 ) :247 - 254.