Data hiding analysis can be useful in
A.
determining the level of encryption used to encrypt the data.
B.
detecting and recovering data that may indicate knowledge,ownership or intent.
C.
identifying the amount of central processing unit (cpu) usage over time to process the data.
D.
preventing a denial of service attack on a set of enterprise servers to prevent users from
accessing the data.