XXXXXXXX,A. (XXXX). Forensic detective control using hardware steganography XXX XX XXXX protection. XXXXXXXXX in Securing IP XXXXX: Forensic XXXXXXXXX control and XXXXXXXXXXX techniques, 25-XX. https://doi.XXX/XX.1049/XXXXXXXXXXXX