=Paper=
{{Paper
|id=Vol-3963/paper27
|storemode=property
|title=Method for detecting malicious commands transmitted via images
using steganography
|pdfUrl=https://ceur-ws.org/Vol-3963/paper27.pdf
|volume=Vol-3963
|authors=Dmytro Denysiuk,Oleg Savenko,Miroslav Kvassay
}}
==Method for detecting malicious commands transmitted via images
using steganography==
None