


default search action
International Journal of Electronic Security and Digital Forensics, Volume 11
Volume 11, Number 1, 2019
- Hassan M. Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud
:
ArMTFr: a new permutation-based image encryption scheme. 1-28 - Fernando Molina Granja
, Glen Dario Rodriguez Rafael
, Edmundo Cabezas Heredia, Raúl Lozada Yánez:
Implementation of the PREDECI model in the prosecution of Chimborazo in Ecuador: a case study evaluation. 29-45 - Motlhaleemang Moalosi, Hlomani Hlomani
, Othusitse S. D. Phefo:
Combating credit card fraud with online behavioural targeting and device fingerprinting. 46-69 - Sunil K. Moon, Rajeshree D. Raut:
Information security model using data embedding technique for enhancing perceptibility and robustness. 70-95 - Cheng-Chi Lee
, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen
, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. 96-117
Volume 11, Number 2, 2019
- Darpan Anand
, Vineeta Khemchandani:
Study of e-governance in India: a survey. 119-144 - Xian Wang, Bing-Zhao Li:
A novel median filtering forensics based on principal component analysis network. 145-159 - Heloise Pieterse
, Martin Olivier, Renier van Heerden:
Evaluation of smartphone data using a reference architecture. 160-182 - Malik F. Saleh:
Malware detection model based on classifying system calls and code attributes: a proof of concept. 183-193 - Reza Montasari
, Victoria Carpenter
, Richard Hill
:
A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. 194-224 - Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar Rajpoot
:
A cryptographic data hiding algorithm with high cover text capacity. 225-244
Volume 11, Number 3, 2019
- Farkhund Iqbal
, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah
, Thar Baker
:
Drone forensics: examination and analysis. 245-264 - Hamed Barzamini
, Mona Ghassemian:
Comparison analysis of electricity theft detection methods for advanced metering infrastructure in smart grid. 265-280 - Jayanta Mondal, Debabala Swain, Devee Darshani Panda:
A novel LSB-based RDH with dual embedding for encrypted images. 281-293 - Reza Montasari
, Richard Hill, Amin Hosseinian Far
, Farshad Montaseri:
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. 294-320 - Li Li, Siqin Zhou, Hang Tu:
Fingerprint authentication based on fuzzy extractor in the mobile device. 321-337 - A. Vyasa Bharadwaja
, V. Ganesan:
A survey on security analysis and privacy issues of wireless multimedia communication system. 338-346 - Karthikeyan Balasubramanian
, Venkata Keerthy S
, G. Hariharan:
Secure Gray code-based reversible data hiding scheme in radiographic images. 347-362 - Jong-Min Sin, Hye-Ryon Son:
Dealing with the problem of collection and analysis of electronic evidence. 363-377
Volume 11, Number 4, 2019
- Garima Mehta, Malay Kishore Dutta
, Pyung Soo Kim:
Biometric data security using joint encryption and watermarking. 379-394 - Yudi Prayudi
, Ahmad Ashari
, Tri Kuntoro Priyambodo
:
The pseudo metadata concept for the chain of custody of digital evidence. 395-419 - Bilal Attallah, Amina Serir
, Youssef Chahir, Abdelwahhab Boudjelal:
Superpixel-based Zernike moments for palm-print recognition. 420-433 - Konstantinos Kardaras, George I. Lambrou
, Dimitrios D. Koutsouris:
Security methods and approaches for internal and external network hospital information systems with single sign-on. 434-446 - Hieu Cuong Nguyen, Duc Thang Vo:
Using machine learning and the first digit law to detect forgeries in digital images. 447-457 - Aditya Kumar Sahu
, Gandharba Swain:
Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. 458-476 - Xiaojun Zhang, Jie Zhao, Liming Mu, Xinpeng Zhang:
Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS. 477-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.