EconPapers    
Economics at your fingertips  
 

International Journal of Digital Crime and Forensics (IJDCF)

2009 - 2016

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 8, issue 3, 2016

Design of Mobile Botnet Based on Open Service pp. 1-10 Downloads
Fenggang Sun, Lidong Zhai, Yuejin Du, Peng Wang and Jun Li
A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence pp. 11-33 Downloads
Gyu-Sang Cho
BP-Neural Network for Plate Number Recognition pp. 34-45 Downloads
Jia Wang and Wei Qi Yan
Tampering Localization in Double Compressed Images by Investigating Noise Quantization pp. 46-62 Downloads
Archana Vasant Mire, Sanjay B. Dhok, Naresh J. Mistry and Prakash D. Porey
X_myKarve: Non-Contiguous JPEG File Carver pp. 63-84 Downloads
Nurul Azma Abdullah
Basic Visual Cryptography Using Braille pp. 85-93 Downloads
Guangyu Wang, Feng Liu and Wei Qi Yan

Volume 8, issue 2, 2016

On More Paradigms of Steganalysis pp. 1-15 Downloads
Xianfeng Zhao, Jie Zhu and Haibo Yu
Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems pp. 16-26 Downloads
Zhihai Yang and Zhongmin Cai
Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length pp. 27-35 Downloads
Liang Yang, Tiegang Gao, Yan Xuan and Hang Gao
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling pp. 36-47 Downloads
Ping Wang, Xiangyang Luo, Chunfang Yang and Fenlin Liu
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting pp. 48-61 Downloads
Yuan-Yu Tsai, Yao-Hsien Huang, Ruo-Jhu Lin and Chi-Shiang Chan

Volume 8, issue 1, 2016

Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps pp. 1-25 Downloads
Nana Wang
A Scheme for Face Recognition in Complex Environments pp. 26-36 Downloads
Wei Cui and Wei Qi Yan
A Hybrid NIDS Model Using Artificial Neural Network and D-S Evidence pp. 37-50 Downloads
Chunlin Lu, Yue Li, Mingjie Ma and Na Li
Detection of Seam-Carving Image Based on Benford's Law for Forensic Applications pp. 51-61 Downloads
Guorui Sheng and Tiegang Gao

Volume 7, issue 4, 2015

Reversible Watermarking in Medical Image Using RDWT and Sub-Sample pp. 1-18 Downloads
Lin Gao, Tiegang Gao and Jie Zhao
Semantic System for Attacks and Intrusions Detection pp. 19-32 Downloads
Abdeslam El Azzouzi and Kamal Eddine El Kadiri
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting pp. 33-54 Downloads
Archana V. Mire, Sanjay B. Dhok, Narendra. J. Mistry and Prakash D. Porey
Evaluations of Image Degradation from Multiple Scan-Print pp. 55-65 Downloads
Abhimanyu Singh Garhwal and Wei Qi Yan

Volume 7, issue 3, 2015

A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization pp. 1-18 Downloads
Min Long, Yan Liu and Fei Peng
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform pp. 19-36 Downloads
Fan Zhang, Zhenghui Liu and Hongxia Wang
A Novel Cue based Picture Word Shape Character Password Creation Scheme pp. 37-59 Downloads
Kevin Curran and Andrew Snodgrass
Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication pp. 60-80 Downloads
Nana Wang, Xiangjun Zhao and Han Zhang

Volume 7, issue 2, 2015

The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends pp. 1-19 Downloads
Muhammad Faheem, Tahar Kechadi and Nhien An Le-Khac
Visual Secret Sharing Without Pixel Expansion pp. 20-30 Downloads
Ali Makki Sagheer and Laith Hamid Abed
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot pp. 31-52 Downloads
Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor, Gloria N. Ezeh and Uchenna Hermes Diala
MapExif: An Image Scanning and Mapping Tool for Investigators pp. 53-78 Downloads
Lionel Prat, Cheryl Baker and Nhien An Le-Khac

Volume 7, issue 1, 2015

Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices pp. 1-25 Downloads
Xuejiao Wan, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao and Yonghao Mai
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions pp. 26-50 Downloads
S. Manimurugan and C. Narmatha
Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography pp. 51-68 Downloads
Yuanfang Guo, Oscar C. Au and Ketan Tang
Analysis of a Secure Virtual Desktop Infrastructure System pp. 69-84 Downloads
Yi Jie Tong, Wei Qi Yan and Jin Yu

Volume 6, issue 4, 2014

Reversible Data Hiding for DNA Sequences and Its Applications pp. 1-13 Downloads
Qi Tang, Guoli Ma, Weiming Zhang and Nenghai Yu
Robust Reversible Data Hiding Scheme Based on Gravity Center Difference pp. 14-33 Downloads
Qunting Yang and Tiegang Gao
A Methodological Review on Copy-Move Forgery Detection for Image Forensics pp. 34-49 Downloads
Resmi Sekhar and R. S. Shaji
An Overview of Penetration Testing pp. 50-74 Downloads
Chiem Trieu Phong and Wei Qi Yan

Volume 6, issue 3, 2014

Optimizing Non-Local Pixel Predictors for Reversible Data Hiding pp. 1-15 Downloads
Xiaocheng Hu, Weiming Zhang and Nenghai Yu
Reversible Data Hiding in Encrypted Images Based on Image Interpolation pp. 16-29 Downloads
Xiyu Han, Zhenxing Qian, Guorui Feng and Xinpeng Zhang
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication pp. 30-46 Downloads
Jia-Hong Li, Tzung-Her Chen and Wei-Bin Lee
Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding pp. 47-63 Downloads
Shun Zhang and Tiegang Gao

Volume 6, issue 2, 2014

A Novel Medical Image Tamper Detection and Recovery Scheme using LSB Embedding and PWLCM pp. 1-22 Downloads
Lin Gao and Tiegang Gao
Detection of Content-Aware Image Resizing for Forensic Applications pp. 23-39 Downloads
Guorui Sheng, Tiegang Gao and Shun Zhang
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles pp. 40-51 Downloads
Xie Li and Ren Yanli
GPU-Based MPEG-2 to Secure Scalable Video Transcoding pp. 52-69 Downloads
Yueyun Shang, Dengpan Ye, Zhuo Wei and Yajuan Xie

Volume 6, issue 1, 2014

On the Generalization Power of Face and Gait in Gender Recognition pp. 1-8 Downloads
Yu Guan, Xingjie Wei and Chang-Tsun Li
Ruler Detection for Autoscaling Forensic Images pp. 9-27 Downloads
Abhir Bhalerao and Gregory Reynolds
Attack Graph Analysis for Network Anti-Forensics pp. 28-50 Downloads
Rahul Chandran and Wei Q. Yan
A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification pp. 51-64 Downloads
Shun Zhang, Tie-gang Gao and Fu-sheng Yang

Volume 5, issue 4, 2013

Telephone Handset Identification by Collaborative Representations pp. 1-14 Downloads
Yannis Panagakis and Constantine Kotropoulos
A Forensic Tool for Investigating Image Forgeries pp. 15-33 Downloads
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva and Mauro Barni
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data pp. 34-54 Downloads
Panagiotis Andriotis, Zacharias Tzermias, Anthi Mparmpaki, Sotiris Ioannidis and George Oikonomou
Audio Watermarking Scheme Using IMFs and HHT for Forensic Applications pp. 55-67 Downloads
Saif alZahir and Md Wahedul Islam

Volume 5, issue 3, 2013

Bitstream-Based JPEG Encryption in Real-time pp. 1-14 Downloads
Stefan Auer, Alexander Bliem, Dominik Engel, Andreas Uhl and Andreas Unterweger
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain pp. 15-34 Downloads
Zhenghui Liu and Hongxia Wang
A Universal Attack Against Histogram-Based Image Forensics pp. 35-52 Downloads
Mauro Barni, Marco Fontani and Benedetta Tondi
Anti-Forensics for Unsharp Masking Sharpening in Digital Images pp. 53-65 Downloads
Lu Laijie, Yang Gaobo and Xia Ming

Volume 5, issue 2, 2013

A Framework for Digital Forensics and Investigations: The Goal-Driven Approach pp. 1-22 Downloads
Benjamin Aziz, Clive Blackwell and Shareeful Islam
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters pp. 23-34 Downloads
Min Long and Hao Wang
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System pp. 35-49 Downloads
Fei Peng, Xiao-wen Zhu and Min Long
E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents pp. 50-62 Downloads
Selvi Salome Gnasigamoney and Manjit Singh Sidhu

Volume 5, issue 1, 2013

A Review of Current Research in Network Forensic Analysis pp. 1-26 Downloads
Ikuesan R. Adeyemi, Shukor Abd Razak and Nor Amira Nor Azhan
On the Reliability of Cryptopometry pp. 27-38 Downloads
Thomas Martin, Laurence O’Toole and Andrew Jones
Detecting Pornographic Images by Localizing Skin ROIs pp. 39-53 Downloads
Sotiris Karavarsamis, Nikos Ntarmos, Konstantinos Blekas and Ioannis Pitas
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels pp. 54-69 Downloads
Bilal Shebaro, Fernando Pérez-González and Jedidiah R. Crandall
Page updated 2019-11-24