


default search action
International Journal of Digital Crime and Forensics, Volume 7
Volume 7, Number 1, 2015
- Xuejiao Wan, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, Yonghao Mai:
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices. 1-25 - Manimurugan Shanmuganathan
, C. Narmatha
:
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions. 26-50 - Yuanfang Guo, Oscar C. Au, Ketan Tang:
Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography. 51-68 - Yi Jie Tong, Wei Qi Yan, Jin Yu
:
Analysis of a Secure Virtual Desktop Infrastructure System. 69-84
Volume 7, Number 2, 2015
- Muhammad Faheem, M. Tahar Kechadi
, Nhien-An Le-Khac
:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. 1-19 - Ali Makki Sagheer
, Laith Hamid Abed
:
Visual Secret Sharing Without Pixel Expansion. 20-30 - Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor
, Gloria N. Ezeh, Uchenna Hermes Diala:
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot. 31-52 - Lionel Prat, Cheryl Baker, Nhien-An Le-Khac
:
MapExif: An Image Scanning and Mapping Tool for Investigators. 53-78
Volume 7, Number 3, 2015
- Min Long, Yan Liu, Fei Peng
:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. 1-18 - Fan Zhang, Zhenghui Liu, Hongxia Wang:
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform. 19-36 - Kevin Curran
, Andrew Snodgrass:
A Novel Cue based Picture Word Shape Character Password Creation Scheme. 37-59 - Nana Wang, Xiangjun Zhao, Han Zhang:
Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication. 60-80
Volume 7, Number 4, 2015
- Lin Gao
, Tiegang Gao, Jie Zhao:
Reversible Watermarking in Medical Image Using RDWT and Sub-Sample. 1-18 - Abdeslam El Azzouzi, Kamal Eddine El Kadiri:
Semantic System for Attacks and Intrusions Detection. 19-32 - Archana V. Mire
, Sanjay B. Dhok, Narendra J. Mistry, Prakash D. Porey:
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting. 33-54 - Abhimanyu Singh Garhwal
, Wei Qi Yan:
Evaluations of Image Degradation from Multiple Scan-Print. 55-65

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.