


default search action
International Journal of Digital Crime and Forensics, Volume 11
Volume 11, Number 1, 2019
- Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen:

General Construction for Extended Visual Cryptography Scheme Using QR Codes. 1-17 - Anjie Peng, Gao Yu, Yadong Wu, Qiong Zhang, Xiangui Kang:

A Universal Image Forensics of Smoothing Filtering. 18-28 - Yuanxin Wu, Wen Diao, Dongdong Hou, Weiming Zhang:

Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation. 29-45 - Asad Malik

, Hongxia Wang, Hanzhou Wu
, Sani M. Abdullahi
:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. 46-61 - Jie Zhu, Xianfeng Zhao

, Qingxiao Guan:
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation. 62-77 - Ping Zhong, Mengdi Li

, Kai Mu, Juan Wen, Yiming Xue:
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine. 78-89 - Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:

Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. 90-99 - Jian Li, Jinwei Wang, Shuang Yu, Xiangyang Luo:

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation. 100-113 - Zhenxing Qian

, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. 114-125 - Min Long, You Li, Fei Peng

:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. 126-137
Volume 11, Number 2, 2019
- Xinyi Wang

, Shaozhang Niu, Jiwei Zhang
:
Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model. 1-12 - Surekha Borra

, Rohit M. Thanki
:
A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications. 13-33 - Shuangkui Xia, Meihua Liu, Xinchen Zhang, Hong Sun, Mao Tian:

Exploiting Routing Strategy of DTN for Message Forwarding in Information Hiding Applications. 34-46 - Xinchao Huang, Zihan Liu, Wei Lu

, Hongmei Liu, Shijun Xiang:
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment. 47-62 - Jichen Yang, Qianhua He, Yongjian Hu, Weiqiang Pan:

CBC-Based Synthetic Speech Detection. 63-74
Volume 11, Number 3, 2019
- Junaid Latief Shah

, Heena Farooq Bhat, Asif Iqbal Khan:
CloudIoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things. 1-22 - Md. Muzakkir Hussain

, M. M. Sufyan Beg
, Mohammad Saad Alam, Shahedul Haque Laskar
:
Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities: Computing Platforms for Platforms for Electric Vehicle Integration in Smart Cities. 23-42 - S. J. Sheela

, K. V. Suresh, Deepaknath Tandur:
Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform. 43-64 - R. Vinayakumar

, K. P. Soman, Prabaharan Poornachandran
:
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. 65-89 - Khalid El Makkaoui

, Abderrahim Beni Hssane, Abdellah Ezzati
:
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing. 90-102
Volume 11, Number 4, 2019
- Wei Jiang, Xianda Wu, Xiang Cui, Chaoge Liu:

A Highly Efficient Remote Access Trojan Detection Method. 1-13 - Dawei Xie, Haining Yang

, Jing Qin, Jixin Ma
:
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud. 14-27 - Mengmeng Zhang, Rongrong Ni, Yao Zhao:

A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution. 28-49 - Yu Lu, Lingchen Gu, Ju Liu, Peng Lan:

Performance Evaluation and Scheme Selection of Person Re-Identification Algorithms in Video Surveillance. 50-65 - Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen:

Steganalysis of AMR Based on Statistical Features of Pitch Delay. 66-81 - Jian Bai, Yao Sun, Ting Li, Dingkang Wang:

Applying Horner's Rule to Optimize Lightweight MDS Matrices. 82-96 - Hanlin Liu, Jingju Liu, Xuehu Yan

, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. 97-117 - Bin Ma, Xiao-Yu Wang, Bing Li:

A New Kind of High Capacity and Security Reversible Data Hiding Scheme. 118-129 - Cong Zhang, Yuanan Liu, Fan Wu, Lidong Zhai, Hui Lu:

Analysis of WeChat Subscription Influence Based on Topic Diffusion. 130-148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














