default search action
International Journal of Digital Crime and Forensics, Volume 11
Volume 11, Number 1, 2019
- Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen:
General Construction for Extended Visual Cryptography Scheme Using QR Codes. 1-17 - Anjie Peng, Gao Yu, Yadong Wu, Qiong Zhang, Xiangui Kang:
A Universal Image Forensics of Smoothing Filtering. 18-28 - Yuanxin Wu, Wen Diao, Dongdong Hou, Weiming Zhang:
Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation. 29-45 - Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. 46-61 - Jie Zhu, Xianfeng Zhao, Qingxiao Guan:
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation. 62-77 - Ping Zhong, Mengdi Li, Kai Mu, Juan Wen, Yiming Xue:
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine. 78-89 - Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. 90-99 - Jian Li, Jinwei Wang, Shuang Yu, Xiangyang Luo:
A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation. 100-113 - Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. 114-125 - Min Long, You Li, Fei Peng:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. 126-137
Volume 11, Number 2, 2019
- Xinyi Wang, Shaozhang Niu, Jiwei Zhang:
Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model. 1-12 - Surekha Borra, Rohit M. Thanki:
A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications. 13-33 - Shuangkui Xia, Meihua Liu, Xinchen Zhang, Hong Sun, Mao Tian:
Exploiting Routing Strategy of DTN for Message Forwarding in Information Hiding Applications. 34-46 - Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang:
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment. 47-62 - Jichen Yang, Qianhua He, Yongjian Hu, Weiqiang Pan:
CBC-Based Synthetic Speech Detection. 63-74
Volume 11, Number 3, 2019
- Junaid Latief Shah, Heena Farooq Bhat, Asif Iqbal Khan:
CloudIoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things. 1-22 - Md. Muzakkir Hussain, M. M. Sufyan Beg, Mohammad Saad Alam, Shahedul Haque Laskar:
Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities: Computing Platforms for Platforms for Electric Vehicle Integration in Smart Cities. 23-42 - S. J. Sheela, K. V. Suresh, Deepaknath Tandur:
Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform. 43-64 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. 65-89 - Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing. 90-102
Volume 11, Number 4, 2019
- Wei Jiang, Xianda Wu, Xiang Cui, Chaoge Liu:
A Highly Efficient Remote Access Trojan Detection Method. 1-13 - Dawei Xie, Haining Yang, Jing Qin, Jixin Ma:
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud. 14-27 - Mengmeng Zhang, Rongrong Ni, Yao Zhao:
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution. 28-49 - Yu Lu, Lingchen Gu, Ju Liu, Peng Lan:
Performance Evaluation and Scheme Selection of Person Re-Identification Algorithms in Video Surveillance. 50-65 - Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen:
Steganalysis of AMR Based on Statistical Features of Pitch Delay. 66-81 - Jian Bai, Yao Sun, Ting Li, Dingkang Wang:
Applying Horner's Rule to Optimize Lightweight MDS Matrices. 82-96 - Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. 97-117 - Bin Ma, Xiao-Yu Wang, Bing Li:
A New Kind of High Capacity and Security Reversible Data Hiding Scheme. 118-129 - Cong Zhang, Yuanan Liu, Fan Wu, Lidong Zhai, Hui Lu:
Analysis of WeChat Subscription Influence Based on Topic Diffusion. 130-148
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.