Methodologies for Detecting Covert Database | IEEE Conference Publication | IEEE Xplore