default search action
International Journal of Electronic Security and Digital Forensics, Volume 11
Volume 11, Number 1, 2019
- Hassan M. Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud:
ArMTFr: a new permutation-based image encryption scheme. 1-28 - Fernando Molina Granja, Glen Dario Rodriguez Rafael, Edmundo Cabezas Heredia, Raúl Lozada Yánez:
Implementation of the PREDECI model in the prosecution of Chimborazo in Ecuador: a case study evaluation. 29-45 - Motlhaleemang Moalosi, Hlomani Hlomani, Othusitse S. D. Phefo:
Combating credit card fraud with online behavioural targeting and device fingerprinting. 46-69 - Sunil K. Moon, Rajeshree D. Raut:
Information security model using data embedding technique for enhancing perceptibility and robustness. 70-95 - Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. 96-117
Volume 11, Number 2, 2019
- Darpan Anand, Vineeta Khemchandani:
Study of e-governance in India: a survey. 119-144 - Xian Wang, Bing-Zhao Li:
A novel median filtering forensics based on principal component analysis network. 145-159 - Heloise Pieterse, Martin Olivier, Renier van Heerden:
Evaluation of smartphone data using a reference architecture. 160-182 - Malik F. Saleh:
Malware detection model based on classifying system calls and code attributes: a proof of concept. 183-193 - Reza Montasari, Victoria Carpenter, Richard Hill:
A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. 194-224 - Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar Rajpoot:
A cryptographic data hiding algorithm with high cover text capacity. 225-244
Volume 11, Number 3, 2019
- Farkhund Iqbal, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah, Thar Baker:
Drone forensics: examination and analysis. 245-264 - Hamed Barzamini, Mona Ghassemian:
Comparison analysis of electricity theft detection methods for advanced metering infrastructure in smart grid. 265-280 - Jayanta Mondal, Debabala Swain, Devee Darshani Panda:
A novel LSB-based RDH with dual embedding for encrypted images. 281-293 - Reza Montasari, Richard Hill, Amin Hosseinian Far, Farshad Montaseri:
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. 294-320 - Li Li, Siqin Zhou, Hang Tu:
Fingerprint authentication based on fuzzy extractor in the mobile device. 321-337 - A. Vyasa Bharadwaja, V. Ganesan:
A survey on security analysis and privacy issues of wireless multimedia communication system. 338-346 - Karthikeyan Balasubramanian, Venkata Keerthy S, G. Hariharan:
Secure Gray code-based reversible data hiding scheme in radiographic images. 347-362 - Jong-Min Sin, Hye-Ryon Son:
Dealing with the problem of collection and analysis of electronic evidence. 363-377
Volume 11, Number 4, 2019
- Garima Mehta, Malay Kishore Dutta, Pyung Soo Kim:
Biometric data security using joint encryption and watermarking. 379-394 - Yudi Prayudi, Ahmad Ashari, Tri Kuntoro Priyambodo:
The pseudo metadata concept for the chain of custody of digital evidence. 395-419 - Bilal Attallah, Amina Serir, Youssef Chahir, Abdelwahhab Boudjelal:
Superpixel-based Zernike moments for palm-print recognition. 420-433 - Konstantinos Kardaras, George I. Lambrou, Dimitrios D. Koutsouris:
Security methods and approaches for internal and external network hospital information systems with single sign-on. 434-446 - Hieu Cuong Nguyen, Duc Thang Vo:
Using machine learning and the first digit law to detect forgeries in digital images. 447-457 - Aditya Kumar Sahu, Gandharba Swain:
Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. 458-476 - Xiaojun Zhang, Jie Zhao, Liming Mu, Xinpeng Zhang:
Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS. 477-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.