Return to Article Details Identifying the Places of Data Hiding and Ways of Digital Evidence Collection in Different Types of File Systems Download Download PDF