default search action
International Journal of Digital Crime and Forensics, Volume 2
Volume 2, Number 1, 2010
- Niall McGrath, Pavel Gladyshev, Joe Carthy:
Cryptopometry as a Methodology for Investigating Encrypted Material. 1-20 - Roberto Caldelli, Irene Amerini, Francesco Picchioni:
A DFT-Based Analysis to Discern Between Camera and Scanned Images. 21-29 - Michael Davis, Alice Sedsman:
Grey Areas - The Legal Dimensions of Cloud Computing. 30-39 - Gary Edmond:
Suspect sciences? Evidentiary Problems with Emerging Technologies. 40-72
Volume 2, Number 2, 2010
- Xi Zhao, Anthony Tung Shuen Ho, Yun Q. Shi:
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking. 1-20 - Irene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni, Alessandro Piva:
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification. 21-33 - Roland Kwitt, Peter Meerwald, Andreas Uhl:
Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain. 34-46 - Gian Piero Zarri:
A Conceptual Methodology for Dealing with Terrorism "Narratives". 47-63 - B. R. Matam, David Lowe:
Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing. 64-87
Volume 2, Number 3, 2010
- Kosta Haltis, Matthew Sorell, Russell S. A. Brinkworth:
A Biologically Inspired Smart Camera for Use in Surveillance Applications. 1-14 - Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy:
Mobile Phone Forensic Analysis. 15-27 - H. R. Chennamma, Lalitha Rangarajan:
Source Camera Identification Based on Sensor Readout Noise. 28-42 - Natthawut Samphaiboon, Matthew M. Dailey:
Steganography in Thai Text. 43-64
Volume 2, Number 4, 2010
- Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu, WeiQi Yan:
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank. 1-15 - Yaqing Niu, Sridhar Krishnan, Qin Zhang:
Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking. 16-36 - Jin Liu, Hefei Ling, Fuhao Zou, WeiQi Yan, Zhengding Lu:
Digital Image Forensics Using Multi-Resolution Histograms. 37-50 - Qiming Li, Sujoy Roy:
Secure Robust Hash Functions and Their Applications in Non-interactive Communications. 51-62 - Jonathan Weir, Raymond Lau, WeiQi Yan:
Digital Image Splicing Using Edges. 63-75
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.