Economics at your fingertips  

International Journal of Digital Crime and Forensics (IJDCF)

2009 - 2016

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 4, issue 4, 2012

Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations pp. 1-14 Downloads
Lynn Batten, Lei Pan and Nisar Khan
A Framework for the Forensic Analysis of User Interaction with Social Media pp. 15-30 Downloads
John Haggerty, Mark C. Casson, Sheryllynne Haggerty and Mark J. Taylor
Pypette: A Platform for the Evaluation of Live Digital Forensics pp. 31-46 Downloads
Brett Lempereur, Madjid Merabti and Qi Shi
A Model for Hybrid Evidence Investigation pp. 47-62 Downloads
Konstantinos Vlachopoulos, Emmanouil Magkos and Vassileios Chrissikopoulos

Volume 4, issue 3, 2012

Fingerprint Liveness Detection Based on Fake Finger Characteristics pp. 1-19 Downloads
Gian Luca Marcialis, Pietro Coli and Fabio Roli
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery pp. 20-32 Downloads
Yongjian Hu, Chang-Tsun Li, Yufei Wang and Bei-bei Liu
A Comprehensive Survey of Event Analytics pp. 33-46 Downloads
T. Gidwani, M. J. Argano, W. Yan and F. Issa
Probabilistic Evaluation of SMS Messages as Forensic Evidence: Likelihood Ratio Based Approach with Lexical Features pp. 47-57 Downloads
Shunichi Ishihara

Volume 4, issue 2, 2012

The Need for Digital Evidence Standardisation pp. 1-12 Downloads
Marthie Grobler
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients pp. 13-27 Downloads
Chang Wang, Jiangqun Ni, Chuntao Wang and Ruiyu Zhang
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics pp. 28-48 Downloads
George Grispos, Tim Storer and William Bradley Glisson
Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval pp. 49-69 Downloads
Wei Sun, Zhe-Ming Lu, Fa-Xin Yu and Rong-Jun Shen

Volume 4, issue 1, 2012

Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features pp. 1-16 Downloads
Fei Peng, Juan Liu and Min Long
Spam 2.0 State of the Art pp. 17-36 Downloads
Pedram Hayati and Vidyasagar Potdar
A Study on Embedding Efficiency of Matrix Encoding pp. 37-48 Downloads
Lifang Yu, Yun Q. Shi, Yao Zhao, Rongrong Ni and Gang Cao
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection pp. 49-62 Downloads
Likai Chen, Wei Lu and Jiangqun Ni

Volume 3, issue 4, 2011

Source Camera Identification Issues: Forensic Features Selection and Robustness pp. 1-15 Downloads
Yongjian Hu, Chang-Tsun Li, Changhui Zhou and Xufeng Lin
Microsoft Power Point Files: A Secure Steganographic Carrier pp. 16-28 Downloads
Rajesh Kumar Tiwari and G. Sahoo
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis pp. 29-41 Downloads
Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis and G. Pangalos
A Blind Image Watermarking Scheme Utilizing BTC Bitplanes pp. 42-53 Downloads
Chun-Ning Yang and Zhe-Ming Lu

Volume 3, issue 3, 2011

A Framework for the Forensic Investigation of Unstructured Email Relationship Data pp. 1-18 Downloads
John Haggerty, Alexander J. Karran, David J. Lamb and Mark Taylor
Requirements for a Forensically Ready Cloud Storage Service pp. 19-36 Downloads
Theodoros Spyridopoulos and Vasilios Katos
LUARM: An Audit Engine for Insider Misuse Detection pp. 37-49 Downloads
G. Magklaras, S. Furnell and M. Papadaki
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs pp. 50-60 Downloads
Kenan Kalajdzic, Ahmed Patel and Mona Taghavi

Volume 3, issue 2, 2011

An Approach for Hand Vein Representation and Indexing pp. 1-15 Downloads
D S. Guru, K B. Nagasundara, S Manjunath and R Dinesh
Towards the Ordering of Events from Multiple Textual Evidence Sources pp. 16-34 Downloads
Sarabjot Singh Anand, Arshad Jhumka and Kimberley Wade
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features pp. 35-40 Downloads
Fei Peng and Honglin Li
An Enhanced Fuzzy ARM Approach for Intrusion Detection pp. 41-61 Downloads
Nasser S. Abouzakhar, Huankai Chen and Bruce Christianson

Volume 3, issue 1, 2011

On the Performance of Li’s Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations pp. 1-13 Downloads
Ahmad Ryad Soobhany, Richard Leary and Lam Kp
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks pp. 14-36 Downloads
Antonis Michalas, Nikos Komninos and Neeli R. Prasad
Microsoft Excel File: A Steganographic Carrier File pp. 37-52 Downloads
Rajesh Kumar Tiwari and G. Sahoo
An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM pp. 53-69 Downloads
Fei Peng and Yu-Zhou Lei

Volume 2, issue 4, 2010

Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank pp. 1-15 Downloads
Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu and WeiQi Yan
Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking pp. 16-36 Downloads
Yaqing Niu, Sridhar Krishnan and Qin Zhang
Digital Image Forensics Using Multi-Resolution Histograms pp. 37-50 Downloads
Jin Liu, Hefei Ling, Fuhao Zou, WeiQi Yan and Zhengding Lu
Secure Robust Hash Functions and Their Applications in Non-interactive Communications pp. 51-62 Downloads
Qiming Li and Sujoy Roy
Digital Image Splicing Using Edges pp. 63-75 Downloads
Jonathan Weir, Raymond Lau and WeiQi Yan

Volume 2, issue 3, 2010

A Biologically Inspired Smart Camera for Use in Surveillance Applications pp. 1-14 Downloads
Kosta Haltis, Matthew Sorell and Russell Brinkworth
Mobile Phone Forensic Analysis pp. 15-27 Downloads
Kevin Curran, Andrew Robinson, Stephen Peacocke and Sean Cassidy
Source Camera Identification Based on Sensor Readout Noise pp. 28-42 Downloads
H. R. Chennamma and Lalitha Rangarajan
Steganography in Thai Text pp. 43-64 Downloads
Natthawut Samphaiboon and Matthew N. Dailey

Volume 2, issue 2, 2010

Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking pp. 1-20 Downloads
Xi Zhao, Anthony T. S. Ho and Yun Q. Shi
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification pp. 21-33 Downloads
Irene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni and Alessandro Piva
Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain pp. 34-46 Downloads
Roland Kwitt, Peter Meerwald and Andreas Uhl
A Conceptual Methodology for Dealing with Terrorism "Narratives" pp. 47-63 Downloads
Gian Piero Zarri
Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing pp. 64-87 Downloads
B. R. Matam and David Lowe

Volume 2, issue 1, 2010

Cryptopometry as a Methodology for Investigating Encrypted Material pp. 1-20 Downloads
Niall McGrath, Pavel Gladyshev and Joe Carthy
A DFT-Based Analysis to Discern Between Camera and Scanned Images pp. 21-29 Downloads
Roberto Caldelli, Irene Amerini and Francesco Picchioni
Grey Areas - The Legal Dimensions of Cloud Computing pp. 30-39 Downloads
Michael Davis and Alice Sedsman
Suspect sciences? Evidentiary Problems with Emerging Technologies pp. 40-72 Downloads
Gary Edmond
Page updated 2019-11-24