default search action
International Journal of Digital Crime and Forensics, Volume 13
Volume 13, Number 1, 2021
- Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung:
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models. 1-25 - Jyotismita Chaki, Nilanjan Dey:
Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method. 26-47 - Sumit Kumar Yadav, Kavita Sharma, Ananya Gupta:
SafeWomen: A Smart Device to Secure Women's Environment Using ATmega328 With an Android Tracking App. 48-64 - Ajay Kumar Sahu, Ashish Kumar:
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card. 65-78 - Ruchi Mittal, Mahinder Pal Singh Bhatia:
Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications. 79-93
Volume 13, Number 2, 2021
- Sameena Naaz:
Detection of Phishing in Internet of Things Using Machine Learning Approach. 1-15 - Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Dingwei Tan:
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform. 16-34 - Rohit M. Thanki, Surekha Borra, Ashish Kothari:
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images. 35-56 - Ning Huang, Shuguang Huang, Chao Chang:
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis. 57-76 - Partha Ghosh, Dipankar Sarkar, Joy Sharma, Santanu Phadikar:
An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment. 77-93 - Jin Du, Feng Yuan, Liping Ding, Guangxuan Chen, Xuehua Liu:
Research on Threat Information Network Based on Link Prediction. 94-102 - Yongzhen Ke, Yiping Cui:
Multiple Fusion Strategies in Localization of Local Deformation Tampering. 103-114 - Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. 115-133
Volume 13, Number 3, 2021
- Bao Kangsheng:
Information Hiding Model Based on Channel Construction of Orthogonal Basis. 1-18 - Henan Shi, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu:
A HEVC Video Steganalysis Against DCT/DST-Based Steganography. 19-33 - Shiqi Wu, Bo Wang, Jianxiang Zhao, Mengnan Zhao, Kun Zhong, Yanqing Guo:
Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples. 34-46 - Jianbin Wu, Yang Zhang, Chuwei Luo, Lin Feng Yuan, Xiao Kang Shen:
A Modification-Free Steganography Algorithm Based on Image Classification and CNN. 47-58 - Liuqing Yang, Wei Meng, Xudong Zhao:
Color Image Encryption Using Angular Graph Fourier Transform. 59-82
Volume 13, Number 4, 2021
- Xiushi Cao, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu:
An Intra-Prediction Mode-Based Video Steganography With Secure Strategy. 1-15 - Xuemei Zhao, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, Xuehu Yan:
Applying Secret Image Sharing to Economics. 16-25 - Zheng Zhao, Penghui Wang, Wei Lu:
Multi-Layer Fusion Neural Network for Deepfake Detection. 26-39 - Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He:
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF. 40-56 - Xintao Duan, Baoxia Li, Daidou Guo, Kai Jia, En Zhang, Chuan Qin:
Coverless Information Hiding Based on WGAN-GP Model. 57-70 - Tingting Su, Yan Ke, Yi Ding, Jia Liu:
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching. 71-89
Volume 13, Number 5, 2021
- Chethana H. T., Trisiladevi C. Nagavi:
A New Framework for Matching Forensic Composite Sketches With Digital Images. 1-19 - Barkha Shree, Parneeta Dhaliwal:
Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics. 20-42 - M. Sravan Kumar Reddy, Dharmendra Singh Rajput:
Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm. 43-64 - Rajashree Soman, Sukumar R.:
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud. 65-77 - Ashok Kumar Mohan, Sethumadhavan Madathil, K. V. Lakshmy:
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model. 78-100 - Rupa Ch., Sumaiya Shaikh, Mukesh Chinta:
Multimedia Concealed Data Detection Using Quantitative Steganalysis. 101-113 - More Swami Das, A. Govardhan, Doddapaneni VijayaLakshmi:
A Model of Cloud Forensic Application With Assurance of Cloud Log. 114-129 - Sunitha R., Chandrika J.:
Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks. 130-144
Volume 13, Number 6, 2021
- Hai Lu, Liping Shao, Qinglong Wang:
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications. 1-23 - Yitong Meng, Jinlong Fei:
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis. 1-30 - Digambar Pawar, Mayank Gajpal:
Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification. 1-15 - Lei Yu, Haoyu Wang, Linyu Li, Houhua He:
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis. 1-14 - Shantanu Jana, Nibaran Das, Subhadip Basu, Mita Nasipuri:
Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications. 1-20 - Rizwan Ur Rahman, Deepak Singh Tomar:
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set. 1-27 - Pankaj Kumar Keserwani, Mahesh Chandra Govil, Emmanuel S. Pilli, Prajjval Govil:
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN. 1-25 - Alex Yao Chu Zhu, Wei-Qi Yan, Roopak Sinha:
ROP Defense Using Trie Graph for System Security. 1-12 - Guangxuan Chen, Guangxiao Chen, Lei Zhang, Qiang Liu:
An Incremental Acquisition Method for Web Forensics. 1-13 - Xiangling Ding, Yanming Huang, Dengyong Zhang, Junlin Ouyang:
Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow. 1-13 - Shane Miller, Kevin Curran, Tom Lunney:
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses. 1-20 - Kaixi Wang, Xiangmei Yu, Ziyi Zou:
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures. 1-17 - Guan-Zhong Wu, Xiangyu Yu, Hui Liang, Minting Li:
Two-Step Image-in-Image Steganography via GAN. 1-12 - Lianshan Liu, Xiaoli Wang, Lingzhuang Meng, Gang Tian, Ting Wang:
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification. 1-14 - Yong Liu, Dawen Xu:
HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding. 1-15 - Muhammad Abulaish, Nur Al Hasan Haldar, Jahiruddin:
P2DF: A Privacy-Preserving Digital Forensics Framework. 1-15 - Di Xiao, Jia Liang, Yanping Xiang, Jiaqi Zhou:
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing. 1-19 - Shane Miller, Kevin Curran, Tom Lunney:
Detection of Anonymising Proxies Using Machine Learning. 1-17
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.