


default search action
International Journal of Digital Crime and Forensics, Volume 13
Volume 13, Number 1, 2021
- Khalifa Al-Room, Farkhund Iqbal, Thar Baker

, Babar Shah
, Benjamin Yankson, Áine MacDermott
, Patrick C. K. Hung:
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models. 1-25 - Jyotismita Chaki

, Nilanjan Dey
:
Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method. 26-47 - Sumit Kumar Yadav, Kavita Sharma

, Ananya Gupta:
SafeWomen: A Smart Device to Secure Women's Environment Using ATmega328 With an Android Tracking App. 48-64 - Ajay Kumar Sahu

, Ashish Kumar:
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card. 65-78 - Ruchi Mittal

, Mahinder Pal Singh Bhatia:
Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications. 79-93
Volume 13, Number 2, 2021
- Sameena Naaz

:
Detection of Phishing in Internet of Things Using Machine Learning Approach. 1-15 - Hanlin Liu, Jingju Liu, Xuehu Yan

, Pengfei Xue, Dingwei Tan:
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform. 16-34 - Rohit M. Thanki

, Surekha Borra
, Ashish Kothari
:
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images. 35-56 - Ning Huang, Shuguang Huang, Chao Chang:

Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis. 57-76 - Partha Ghosh

, Dipankar Sarkar, Joy Sharma, Santanu Phadikar:
An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment. 77-93 - Jin Du, Feng Yuan, Liping Ding, Guangxuan Chen, Xuehua Liu:

Research on Threat Information Network Based on Link Prediction. 94-102 - Yongzhen Ke, Yiping Cui:

Multiple Fusion Strategies in Localization of Local Deformation Tampering. 103-114 - Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji

, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. 115-133
Volume 13, Number 3, 2021
- Bao Kangsheng:

Information Hiding Model Based on Channel Construction of Orthogonal Basis. 1-18 - Henan Shi, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu:

A HEVC Video Steganalysis Against DCT/DST-Based Steganography. 19-33 - Shiqi Wu, Bo Wang

, Jianxiang Zhao, Mengnan Zhao, Kun Zhong, Yanqing Guo:
Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples. 34-46 - Jianbin Wu, Yang Zhang, Chuwei Luo, Lin Feng Yuan, Xiao Kang Shen:

A Modification-Free Steganography Algorithm Based on Image Classification and CNN. 47-58 - Liuqing Yang, Wei Meng, Xudong Zhao

:
Color Image Encryption Using Angular Graph Fourier Transform. 59-82
Volume 13, Number 4, 2021
- Xiushi Cao, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu:

An Intra-Prediction Mode-Based Video Steganography With Secure Strategy. 1-15 - Xuemei Zhao, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, Xuehu Yan

:
Applying Secret Image Sharing to Economics. 16-25 - Zheng Zhao, Penghui Wang, Wei Lu

:
Multi-Layer Fusion Neural Network for Deepfake Detection. 26-39 - Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang

, Zhibin He:
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF. 40-56 - Xintao Duan, Baoxia Li, Daidou Guo, Kai Jia, En Zhang, Chuan Qin

:
Coverless Information Hiding Based on WGAN-GP Model. 57-70 - Tingting Su, Yan Ke

, Yi Ding, Jia Liu:
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching. 71-89
Volume 13, Number 5, 2021
- Chethana H. T.

, Trisiladevi C. Nagavi
:
A New Framework for Matching Forensic Composite Sketches With Digital Images. 1-19 - Barkha Shree

, Parneeta Dhaliwal:
Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics. 20-42 - M. Sravan Kumar Reddy

, Dharmendra Singh Rajput:
Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm. 43-64 - Rajashree Soman

, Sukumar R.:
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud. 65-77 - Ashok Kumar Mohan

, Sethumadhavan Madathil, K. V. Lakshmy:
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model. 78-100 - Rupa Ch.

, Sumaiya Shaikh
, Mukesh Chinta
:
Multimedia Concealed Data Detection Using Quantitative Steganalysis. 101-113 - More Swami Das

, A. Govardhan
, Doddapaneni VijayaLakshmi:
A Model of Cloud Forensic Application With Assurance of Cloud Log. 114-129 - Sunitha R.

, Chandrika J.:
Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks. 130-144
Volume 13, Number 6, 2021
- Hai Lu, Liping Shao, Qinglong Wang:

A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications. 1-23 - Yitong Meng

, Jinlong Fei:
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis. 1-30 - Digambar Pawar, Mayank Gajpal:

Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification. 1-15 - Lei Yu, Haoyu Wang

, Linyu Li, Houhua He:
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis. 1-14 - Shantanu Jana, Nibaran Das, Subhadip Basu, Mita Nasipuri:

Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications. 1-20 - Rizwan Ur Rahman, Deepak Singh Tomar

:
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set. 1-27 - Pankaj Kumar Keserwani, Mahesh Chandra Govil, Emmanuel S. Pilli

, Prajjval Govil:
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN. 1-25 - Alex Yao Chu Zhu, Wei-Qi Yan, Roopak Sinha

:
ROP Defense Using Trie Graph for System Security. 1-12 - Guangxuan Chen, Guangxiao Chen, Lei Zhang, Qiang Liu:

An Incremental Acquisition Method for Web Forensics. 1-13 - Xiangling Ding, Yanming Huang, Dengyong Zhang, Junlin Ouyang:

Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow. 1-13 - Shane Miller, Kevin Curran

, Tom Lunney:
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses. 1-20 - Kaixi Wang

, Xiangmei Yu, Ziyi Zou:
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures. 1-17 - Guan-Zhong Wu, Xiangyu Yu, Hui Liang, Minting Li:

Two-Step Image-in-Image Steganography via GAN. 1-12 - Lianshan Liu

, Xiaoli Wang, Lingzhuang Meng, Gang Tian, Ting Wang:
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification. 1-14 - Yong Liu, Dawen Xu

:
HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding. 1-15 - Muhammad Abulaish

, Nur Al Hasan Haldar
, Jahiruddin:
P2DF: A Privacy-Preserving Digital Forensics Framework. 1-15 - Di Xiao, Jia Liang, Yanping Xiang, Jiaqi Zhou:

Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing. 1-19 - Shane Miller, Kevin Curran

, Tom Lunney:
Detection of Anonymising Proxies Using Machine Learning. 1-17

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














