


default search action
International Journal of Digital Crime and Forensics, Volume 7
Volume 7, Number 1, 2015
- Xuejiao Wan, Jingsha He

, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, Yonghao Mai:
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices. 1-25 - Manimurugan Shanmuganathan

, C. Narmatha
:
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions. 26-50 - Yuanfang Guo

, Oscar C. Au, Ketan Tang:
Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography. 51-68 - Yi Jie Tong, Wei Qi Yan, Jin Yu

:
Analysis of a Secure Virtual Desktop Infrastructure System. 69-84
Volume 7, Number 2, 2015
- Muhammad Faheem, M. Tahar Kechadi

, Nhien-An Le-Khac
:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. 1-19 - Ali Makki Sagheer

, Laith Hamid Abed
:
Visual Secret Sharing Without Pixel Expansion. 20-30 - Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor

, Gloria N. Ezeh, Uchenna Hermes Diala:
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot. 31-52 - Lionel Prat, Cheryl Baker, Nhien-An Le-Khac

:
MapExif: An Image Scanning and Mapping Tool for Investigators. 53-78
Volume 7, Number 3, 2015
- Min Long, Yan Liu, Fei Peng

:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. 1-18 - Fan Zhang, Zhenghui Liu, Hongxia Wang:

A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform. 19-36 - Kevin Curran

, Andrew Snodgrass:
A Novel Cue based Picture Word Shape Character Password Creation Scheme. 37-59 - Nana Wang, Xiangjun Zhao, Han Zhang:

Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication. 60-80
Volume 7, Number 4, 2015
- Lin Gao

, Tiegang Gao, Jie Zhao:
Reversible Watermarking in Medical Image Using RDWT and Sub-Sample. 1-18 - Abdeslam El Azzouzi, Kamal Eddine El Kadiri:

Semantic System for Attacks and Intrusions Detection. 19-32 - Archana V. Mire

, Sanjay B. Dhok, Narendra J. Mistry, Prakash D. Porey:
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting. 33-54 - Abhimanyu Singh Garhwal

, Wei Qi Yan:
Evaluations of Image Degradation from Multiple Scan-Print. 55-65

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














