Journal Contents: International Journal of Digital Crime and Forensics (IJDCF)

View the International Journal of Digital Crime and Forensics (IJDCF) home page for complete details.
Volume 9 (2017)
Issue 1
Article 1
Age Detection Through Keystroke Dynamics from User Authentication Failures (pages 1-16)
Ioannis Tsimperidis (Democritus University of Thrace, Komotini, Greece), Shahin Rostami (Bournemouth University, Poole, UK), Vasilios Katos (Bournemouth University, Poole, UK)
Article 2
Investigation Approach for Network Attack Intention Recognition (pages 17-38)
Abdulghani Ali Ahmed (Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Gambang, Malaysia)
Article 3
A Framework of Event-Driven Traffic Ticketing System (pages 39-50)
Jia Wang (Auckland University of Technology, Auckland, New Zealand), Minh Ngueyn (Auckland University of Technology, Auckland, New Zealand), Weiqi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS (pages 51-70)
Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Article 5
Proposed Round Robin CIA Pattern on RTS for Risk Assessment (pages 71-85)
Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Issue 2
Article 1
Speech Content Authentication Scheme based on High-Capacity Watermark Embedding (pages 1-14)
Fang Sun (Xinyang Normal University, College of Computer and Information Technology, Xinyang Henan, China), Zhenghui Liu (Xinyang Normal University, College of Computer and Information Technology, Xinyang Henan, China), Chuanda Qi (Xinyang Normal University, College of Mathematics and Information Science, Xinyang Henan, China)
Article 2
Deception Detection by Hybrid-Pair Wireless fNIRS System (pages 15-24)
Hong Di (University of International Relations, Department of Information Science and Technology, Beijing, China), Xin Zhang (Chinese Academy of Sciences, Institute of Automation, Beijing, China)
Article 3
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping (pages 25-37)
Juan Chen (Hunan Engineering Polytechnic, Department of Information Engineering, Changsha, China), Fei Peng (Hunan University, School of Computer Science and Electronic Engineering, Changsha, China), Jie Li (Hunan University, School of Computer Science and Electronic Engineering, Changsha, China), Min Long (Changsha University of Science and Technology, College of Computer and Communication Engineering, Changsha, China)
Article 4
On the Pixel Expansion of Visual Cryptography Scheme (pages 38-44)
Teng Guo (University of International Relations, School of Information Science and Technology, Beijing, China), Jian Jiao (University of International Relations, School of Information Science and Technology, Beijing, China), Feng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Wen Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 5
Exploiting the Homomorphic Property of Visual Cryptography (pages 45-56)
Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China), Song Wan (Hefei Electronic Engineering Institute, Hefei, China), Wanmeng Ding (Hefei Electronic Engineering Institute, Hefei, China), Hanlin Liu (Hefei Electronic Engineering Institute, Hefei, China)
Issue 3
Article 1
A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS (pages 1-10)
Xin Liu (Harbin Institute of Technology, Harbin, China & Harbin University of Science and Technology, Harbin, China), Shen Wang (Harbin Institute of Technology, Harbin, China), Jianzhi Sang (Harbin Institute of Technology, Harbin, China), Weizhe Zhang (School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China)
Article 2
An Empirical Study for Human Behavior Analysis (pages 11-27)
Jia Lu (Auckland University of Technology, Auckland, New Zealand), Jun Shen (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand), Boris Bačić (Auckland University of Technology, Auckland, New Zealand)
Article 3
A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean (pages 28-37)
Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Song Wan (Hefei Electronic Engineering Institute, Hefei, China)
Article 4
A Novel Visual Secret Sharing Scheme Based on QR Codes (pages 38-48)
Song Wan (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China)
Article 5
A Knowledge Model of Digital Evidence Review Elements Based on Ontology (pages 49-57)
Ning Wang (Hubei University of Police, Wuhan, China)
Article 6
The State-of-the-Art Technology of Currency Identification: A Comparative Study (pages 58-72)
Guangyu Wang (Auckland University of Technology, Auckland, New Zealand), Xiaotian Wu (Jinan University, Guangzhou, China & State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), WeiQi Yan (Auckland University of Technology, School of Computer and Mathematical Sciences, Auckland, New Zealand)
Issue 4
Article 1
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics (pages 1-14)
Jie Zhu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Qingxiao Guan (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Xianfeng Zhao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Yun Cao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Gong Chen (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
Article 2
Performance Evaluation and Scheme Selection of Shot Boundary Detection and Keyframe Extraction in Content-Based Video Retrieval (pages 15-29)
Lingchen Gu (Shandong University, School of Information Science and Engineering, Jinan, China), Ju Liu (Shandong University, School of Information Science and Engineering, Jinan, China), Aixi Qu (Shandong University, School of Information Science and Engineering, Jinan, China)
Article 3
Research on Digital Forensics Based on Uyghur Web Text Classification (pages 30-39)
Yasen Aizezi (Xinjiang Police college, Urumqi, China), Anwar Jamal (Xinjiang Police College, Urumqi, China), Ruxianguli Abudurexiti (Xinjiang Police College, Urumqi, China), Mutalipu Muming (Xinjiang Police College, Urumqi, China)
Article 4
A Cyber Crime Investigation Model Based on Case Characteristics (pages 40-47)
Zhi Jun Liu (Hubei University of Police, Hubei, China)
Article 5
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation (pages 48-61)
Zhe Chen (University of Electronic Science and Technology of China, Chengdu, China), Jicang Lu (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Pengfei Yang (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Xiangyang Luo (Zhengzhou Information Science and Technology Institute, Zhengzhou, China)
Article 6
Exploring Defense of SQL Injection Attack in Penetration Testing (pages 62-71)
Alex Zhu (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, School of Computer and Mathematical Sciences, Auckland, New Zealand)
Volume 8 (2016)
Issue 1
Article 1
Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps (pages 1-25)
Nana Wang (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China)
Article 2
A Scheme for Face Recognition in Complex Environments (pages 26-36)
Wei Cui (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 3
A Hybrid NIDS Model Using Artificial Neural Network and D-S Evidence (pages 37-50)
Chunlin Lu (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Yue Li (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Mingjie Ma (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Na Li (Institute of China Mobile Communication Company Limited, Beijing, China)
Article 4
Detection of Seam-Carving Image Based on Benford's Law for Forensic Applications (pages 51-61)
Guorui Sheng (School on Information and Electronical Engineering, Ludong University, Yantai, China), Tiegang Gao (College of Software, Information Security Technology Lab, Nankai University, Tianjin, China)
Issue 2
Article 1
On More Paradigms of Steganalysis (pages 1-15)
Xianfeng Zhao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jie Zhu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Haibo Yu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 2
Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems (pages 16-26)
Zhihai Yang (Xi'an Jiaotong University, Xi'an, China), Zhongmin Cai (Xi'an Jiaotong University, Xi'an, China)
Article 3
Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length (pages 27-35)
Liang Yang (Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Yan Xuan (Nankai University, Tianjin, China), Hang Gao (Nankai University, Tianjin, China)
Article 4
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling (pages 36-47)
Ping Wang (Zhengzhou Science and Technology Institute, Zhengzhou, China), Xiangyang Luo (Science and Technology on Information Assurance Laboratory, Beijing, China), Chunfang Yang (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China), Fenlin Liu (Zhengzhou Science and Technology Institute, Zhengzhou, China)
Article 5
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting (pages 48-61)
Yuan-Yu Tsai (Department of M-Commerce and Multimedia Applications, Asia University and Department of Medical Research, China Medical University Hospital, Taichung, Taiwan), Yao-Hsien Huang (Department of Information Technology and Management, Shih Chien University, Taipei, Taiwan), Ruo-Jhu Lin (Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan), Chi-Shiang Chan (Department of M-Commerce and Multimedia Applications, Asia University and Department of Medical Research, China Medical University Hospital, Taichung, Taiwan)
Issue 3
Article 1
Design of Mobile Botnet Based on Open Service (pages 1-10)
Fenggang Sun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lidong Zhai (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Yuejin Du (Alibaba Group, Beijing, China), Peng Wang (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Jun Li (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China)
Article 2
A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence (pages 11-33)
Gyu-Sang Cho (Dongyang University, Youngju, Republic of Korea)
Article 3
BP-Neural Network for Plate Number Recognition (pages 34-45)
Jia Wang (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Tampering Localization in Double Compressed Images by Investigating Noise Quantization (pages 46-62)
Archana Vasant Mire (Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India), Sanjay B. Dhok (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India), Naresh J. Mistry (Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India), Prakash D. Porey (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India)
Article 5
X_myKarve: Non-Contiguous JPEG File Carver (pages 63-84)
Nurul Azma Abdullah (Universiti Tun Hussein Onn Malaysia, Batu Pahat, Malaysia)
Article 6
Basic Visual Cryptography Using Braille (pages 85-93)
Guangyu Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and Auckland University of Technology, Auckland, New Zealand), Feng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Wei Qi Yan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and Auckland University of Technology, Auckland, New Zealand)
Issue 4
Article 1
Exploration of Web Page Structural Patterns Based on Request Dependency Graph Decomposition (pages 1-13)
Cheng Fang (Beijing University of Post and Telecommunications, Beijing, China), Bo Ya Liu (Beijing University of Post and Telecommunications, Beijing, China)
Article 2
An Overview on Passive Image Forensics Technology for Automatic Computer Forgery (pages 14-25)
Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China), Qiuzi Wang (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Jichang Guo (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Fusheng Yang (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China)
Article 3
Cross Models for Twin Recognition (pages 26-36)
Datong Gu (Auckland University of Technology, Auckland, New Zealand), Minh Nguyen (Auckland University of Technology, Auckland, New Zealand), Weiqi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Squint Pixel Steganography: A Novel Approach to Detect Digital Crimes and Recovery of Medical Images (pages 37-47)
Rupa Ch. (V. R. Siddhartha Engineering College, Vijayawada, India)
Volume 7 (2015)
Issue 1
Article 1
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices (pages 1-25)
Xuejiao Wan (School of Software Engineering, Beijing University of Technology, Beijing, China), Jingsha He (School of Software Engineering, Beijing University of Technology, Beijing, China), Gongzheng Liu (School of Software Engineering, Beijing University of Technology, Beijing, China), Na Huang (School of Software Engineering, Beijing University of Technology, Beijing, China), Xingye Zhu (School of Software Engineering, Beijing University of Technology, Beijing, China), Bin Zhao (School of Software Engineering, Beijing University of Technology, Beijing, China), Yonghao Mai (Electronic Forensics Laboratory, Hubei University of Police, Hubei, China)
Article 2
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions (pages 26-50)
S. Manimurugan (Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India), C. Narmatha (Department of Electronics and Communication Engineering, Karpagam University, Coimbatore, India)
Article 3
Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography (pages 51-68)
Yuanfang Guo (HKUST, Hong Kong SAR, China), Oscar C. Au (HKUST, Hong Kong SAR, China), Ketan Tang (HKUST, Hong Kong SAR, China)
Article 4
Analysis of a Secure Virtual Desktop Infrastructure System (pages 69-84)
Yi Jie Tong (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand), Jin Yu (Auckland University of Technology, Auckland, New Zealand)
Issue 2
Article 1
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends (pages 1-19)
Muhammad Faheem (University College Dublin, Dublin, Ireland), Tahar Kechadi (School of Computer Science & Informatics, University College Dublin, Dublin, Ireland), Nhien An Le-Khac (University College Dublin, Dublin, Ireland)
Article 2
Visual Secret Sharing Without Pixel Expansion (pages 20-30)
Ali Makki Sagheer (Information Systems Department, University of Anbar, Ramadi, Iraq), Laith Hamid Abed (Computer Systems Department, Anbar Technical Institute, Middle Technical University, Fallujha, Anbar, Iraq)
Article 3
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot (pages 31-52)
Ifeyinwa Eucharia Achumba (Federal University of Technology, Owerri, Nigeria), Kennedy Chinedu Okafor (Federal University of Technology, Owerri, Nigeria), Gloria N. Ezeh (Federal University of Technology, Owerri, Nigeria), Uchenna Hermes Diala (Federal University of Technology, Owerri, Nigeria)
Article 4
MapExif: An Image Scanning and Mapping Tool for Investigators (pages 53-78)
Lionel Prat (French Gendarmerie Forensics Research Institute (IRCGN), Rosny-sous-Bois, France), Cheryl Baker (University College Dublin, Dublin, Ireland), Nhien An Le-Khac (University College Dublin, Dublin, Ireland)
Issue 3
Article 1
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization (pages 1-18)
Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China), Yan Liu (Hunan University, Changsha, China), Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China)
Article 2
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform (pages 19-36)
Fan Zhang (Xinyang Normal University, Xinyang, China), Zhenghui Liu (Xinyang Normal University, Xinyang, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 3
A Novel Cue based Picture Word Shape Character Password Creation Scheme (pages 37-59)
Kevin Curran (Ulster University, Londonderry, UK), Andrew Snodgrass (Ulster University, Londonderry, UK)
Article 4
Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication (pages 60-80)
Nana Wang (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China), Xiangjun Zhao (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China), Han Zhang (Computer and Information Engineering Department, Heze University, Heze, China)
Issue 4
Article 1
Reversible Watermarking in Medical Image Using RDWT and Sub-Sample (pages 1-18)
Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China)
Article 2
Semantic System for Attacks and Intrusions Detection (pages 19-32)
Abdeslam El Azzouzi (Abdelmalek Essaâdi University, Tetuan, Morocco), Kamal Eddine El Kadiri (Abdelmalek Essaâdi University, Tetuan, Morocco)
Article 3
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting (pages 33-54)
Archana V. Mire (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India), Sanjay B. Dhok (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India), Narendra. J. Mistry (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India), Prakash D. Porey (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India)
Article 4
Evaluations of Image Degradation from Multiple Scan-Print (pages 55-65)
Abhimanyu Singh Garhwal (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Volume 6 (2014)
Issue 1
Article 1
On the Generalization Power of Face and Gait in Gender Recognition (pages 1-8)
Yu Guan (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Xingjie Wei (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Chang-Tsun Li (Department of Computer Science, University of Warwick, Warwick, Coventry, UK)
Article 2
Ruler Detection for Autoscaling Forensic Images (pages 9-27)
Abhir Bhalerao (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Gregory Reynolds (Pattern Analytics Research Ltd, Solihull, UK)
Article 3
Attack Graph Analysis for Network Anti-Forensics (pages 28-50)
Rahul Chandran (Auckland University of Technology, Auckland, New Zealand), Wei Q. Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification (pages 51-64)
Shun Zhang (College of Software, Nankai University, Nankai, Tianjin, China), Tie-gang Gao (College of Software, Nankai University, Nankai, Tianjin, China), Fu-sheng Yang (College of Software, Nankai University, Nankai, Tianjin, China)
Issue 2
Article 1
A Novel Medical Image Tamper Detection and Recovery Scheme using LSB Embedding and PWLCM (pages 1-22)
Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Article 2
Detection of Content-Aware Image Resizing for Forensic Applications (pages 23-39)
Guorui Sheng (College of Information and Electric Engineering, LuDong University, YanTai, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Shun Zhang (College of Software, Nankai University, Tianjin, China)
Article 3
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles (pages 40-51)
Xie Li (School of Communication and Information Engineering, Shanghai University, Shanghai, China), Ren Yanli (School of Communication and Information Engineering, Shanghai University, Shanghai, China)
Article 4
GPU-Based MPEG-2 to Secure Scalable Video Transcoding (pages 52-69)
Yueyun Shang (South Central University for Nationalities, Wuhan, China), Dengpan Ye (Wuhan University, Wuhan, China), Zhuo Wei (Singapore Management University, Singapore), Yajuan Xie (Nanyang Technological University, Singapore)
Issue 3
Article 1
Optimizing Non-Local Pixel Predictors for Reversible Data Hiding (pages 1-15)
Xiaocheng Hu (School of Information Science and Technology, University of Science and Technology of China, Hefei, China), Weiming Zhang (School of Information Science and Technology, University of Science and Technology of China, Hefei, China), Nenghai Yu (School of Information Science and Technology, University of Science and Technology of China, Hefei, China)
Article 2
Reversible Data Hiding in Encrypted Images Based on Image Interpolation (pages 16-29)
Xiyu Han (Shanghai University, Shanghai, China), Zhenxing Qian (Shanghai University, Shanghai, China), Guorui Feng (Shanghai University, Shanghai, China), Xinpeng Zhang (Shanghai University, Shanghai, China)
Article 3
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication (pages 30-46)
Jia-Hong Li (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan), Tzung-Her Chen (Department of Computer Science and Information Engineering, National Chiayi University, Chia-Yi City, Taiwan), Wei-Bin Lee (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan)
Article 4
Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding (pages 47-63)
Shun Zhang (College of Software, Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Issue 4
Article 1
Reversible Data Hiding for DNA Sequences and Its Applications (pages 1-13)
Qi Tang (School of Information Science, University of Science and Technology of China, Hefei, China), Guoli Ma (School of Information Science, University of Science and Technology of China, Hefei, China), Weiming Zhang (School of Information Science, University of Science and Technology of China, Hefei, China), Nenghai Yu (School of Information Science, University of Science and Technology of China, Hefei, China)
Article 2
Robust Reversible Data Hiding Scheme Based on Gravity Center Difference (pages 14-33)
Qunting Yang (College of Air Traffic Management, Civil Aviation University of China, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Article 3
A Methodological Review on Copy-Move Forgery Detection for Image Forensics (pages 34-49)
Resmi Sekhar (Lourdes Matha College of Science and Technology, Thiruvananthapuram, India), R. S. Shaji (Noorul Islam University, Thuckalay, India)
Article 4
An Overview of Penetration Testing (pages 50-74)
Chiem Trieu Phong (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Volume 5 (2013)
Issue 1
Article 1
A Review of Current Research in Network Forensic Analysis (pages 1-26)
Ikuesan R. Adeyemi (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia), Shukor Abd Razak (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia), Nor Amira Nor Azhan (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia)
Article 2
On the Reliability of Cryptopometry (pages 27-38)
Thomas Martin (Information Security Program, Khalifa University, Abu Dhabi, UAE), Laurence O’Toole (Information Security Group, Royal Holloway, University of London, London, UK), Andrew Jones (Information Security Program, Khalifa University, Abu Dhabi, UAE)
Article 3
Detecting Pornographic Images by Localizing Skin ROIs (pages 39-53)
Sotiris Karavarsamis (Artificial Intelligence and Information Analysis Group, Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece), Nikos Ntarmos (School of Computing Science, University of Glasgow, Glasgow, Scotland), Konstantinos Blekas (Department of Computer Science, University of Ioannina, Ioannina, Greece), Ioannis Pitas (Artificial Intelligence and Information Analysis Group, Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece)
Article 4
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels (pages 54-69)
Bilal Shebaro (Department of Computer Science, University of New Mexico, Albuquerque, NM, USA), Fernando Pérez-González (Signal Theory and Communications Department, University of Vigo, Vigo, Pontevedra, Spain), Jedidiah R. Crandall (Department of Computer Science, University of New Mexico, Albuquerque, NM, USA)
Issue 2
Article 1
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach (pages 1-22)
Benjamin Aziz (School of Computing, University of Portsmouth, Portsmouth, UK), Clive Blackwell (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Shareeful Islam (School of Architecture, Computing and Engineering, University of East London, London, UK)
Article 2
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters (pages 23-34)
Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China), Hao Wang (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China)
Article 3
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System (pages 35-49)
Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China), Xiao-wen Zhu (School of Information Science and Engineering, Hunan University, Changsha, China), Min Long (College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China)
Article 4
E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents (pages 50-62)
Selvi Salome Gnasigamoney (School of Business Infrastructure, Infrastructure University Kuala Lumpur, Kajang, Malaysia), Manjit Singh Sidhu (Department of Graphics and Multimedia, College of Information Technology, University Tenaga Nasional (UNITEN), Selangor, Malaysia)
Computer Forensics: Cybercriminals, Laws, and Evidence
Book Review
Szde Yu (Department of Criminal Justice, Wichita State University, Wichita, KS, USA)
Issue 3
Article 1
Bitstream-Based JPEG Encryption in Real-time (pages 1-14)
Stefan Auer (Salzburg University of Applied Sciences, Salzburg, Austria), Alexander Bliem (Salzburg University of Applied Sciences, Salzburg, Austria), Dominik Engel (Salzburg University of Applied Sciences, Salzburg, Austria), Andreas Uhl (Department of Computer Sciences, University of Salzburg, Salzburg, Austria), Andreas Unterweger (Department of Computer Sciences, University of Salzburg, Salzburg, Austria)
Article 2
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain (pages 15-34)
Zhenghui Liu (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 3
A Universal Attack Against Histogram-Based Image Forensics (pages 35-52)
Mauro Barni (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Marco Fontani (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Benedetta Tondi (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy)
Article 4
Anti-Forensics for Unsharp Masking Sharpening in Digital Images (pages 53-65)
Lu Laijie (School of Information Science and Engineering, Hunan University, Changsha, China), Yang Gaobo (School of Information Science and Engineering, Hunan University, Changsha, China), Xia Ming (School of Information Science and Engineering, Hunan University, Changsha, China, & College of Electrical & Information Engineering, Southwest University for Nationalities, Chengdu, China)
Issue 4
Article 1
Telephone Handset Identification by Collaborative Representations (pages 1-14)
Yannis Panagakis (Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece), Constantine Kotropoulos (Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece)
Article 2
A Forensic Tool for Investigating Image Forgeries (pages 15-33)
Marco Fontani (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Tiziano Bianchi (Department of Electronics and Telecommunications, Politecnico di Torino, Torino, Italy), Alessia De Rosa (National Inter-University Consortium for Telecommunications, University of Florence, Firenze, Italy), Alessandro Piva (Department of Information Engineering, University of Florence, Firenze, Italy), Mauro Barni (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy)
Article 3
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data (pages 34-54)
Panagiotis Andriotis (University of Bristol, Bristol, UK), Zacharias Tzermias (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), Anthi Mparmpaki (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), Sotiris Ioannidis (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), George Oikonomou (University of Bristol, Bristol, UK)
Article 4
Audio Watermarking Scheme Using IMFs and HHT for Forensic Applications (pages 55-67)
Saif alZahir (Department of Computer Science, University of Northern British Columbia, Prince George, Canada), Md Wahedul Islam (Department of Computer Science, University of Northern British Columbia, Prince George, Canada)
Volume 4 (2012)
Issue 1
Article 1
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features (pages 1-16)
Fei Peng (Hunan University, China), Juan Liu (Hunan University, China), Min Long (Changsha University of Science and Technology, China)
Article 2
Spam 2.0 State of the Art (pages 17-36)
Pedram Hayati (Curtin University, Australia), Vidyasagar Potdar (Curtin University, Australia)
Article 3
A Study on Embedding Efficiency of Matrix Encoding (pages 37-48)
Lifang Yu (Beijing Jiaotong University, China), Yun Q. Shi (New Jersey Institute of Technology, USA), Yao Zhao (Beijing Jiaotong University, China), Rongrong Ni (Beijing Jiaotong University, China), Gang Cao (Beijing Jiaotong University, China)
Article 4
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection (pages 49-62)
Likai Chen (Sun Yat-sen University, China), Wei Lu (Sun Yat-sen University, China), Jiangqun Ni (Sun Yat-sen University, China)
Issue 2
Article 1
The Need for Digital Evidence Standardisation (pages 1-12)
Marthie Grobler (Council for Scientific and Industrial Research, and University of Johannesburg, South Africa)
Article 2
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients (pages 13-27)
Chang Wang (Sun Yat-sen University, China), Jiangqun Ni (Sun Yat-sen University, China), Chuntao Wang (South China Agricultural University, China), Ruiyu Zhang (Sun Yat-sen University, China)
Article 3
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics (pages 28-48)
George Grispos (University of Glasgow, Scotland), Tim Storer (University of Glasgow, Scotland), William Bradley Glisson (University of Glasgow, Scotland)
Article 4
Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval (pages 49-69)
Wei Sun (Zhejiang University, China), Zhe-Ming Lu (Zhejiang University, China), Fa-Xin Yu (Zhejiang University, China), Rong-Jun Shen (Zhejiang University, China)
Issue 3
Article 1
Fingerprint Liveness Detection Based on Fake Finger Characteristics (pages 1-19)
Gian Luca Marcialis (University of Cagliari, Italy), Pietro Coli (University of Cagliari, Italy), Fabio Roli (University of Cagliari, Italy)
Article 2
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery (pages 20-32)
Yongjian Hu (University of Warwick, UK, & South China University of Technology, China), Chang-Tsun Li (University of Warwick, UK), Yufei Wang (South China University of Technology, China), Bei-bei Liu (South China University of Technology, China)
Article 3
A Comprehensive Survey of Event Analytics (pages 33-46)
T. Gidwani (AUT University, New Zealand), M. J. Argano (AUT University, New Zealand), W. Yan (AUT University, New Zealand), F. Issa (AUT University, New Zealand)
Article 4
Issue 4
Article 1
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations (pages 1-14)
Lynn Batten (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia), Lei Pan (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia), Nisar Khan (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia)
Article 2
A Framework for the Forensic Analysis of User Interaction with Social Media (pages 15-30)
John Haggerty (School of Computing, Science and Engineering, University of Salford, Manchester, UK), Mark C. Casson (Henley Business School, University of Reading, Reading, UK), Sheryllynne Haggerty (School of Humanities, University of Nottingham, Nottingham, UK), Mark J. Taylor (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK)
Article 3
Pypette: A Platform for the Evaluation of Live Digital Forensics (pages 31-46)
Brett Lempereur (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Madjid Merabti (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Qi Shi (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK)
Article 4
A Model for Hybrid Evidence Investigation (pages 47-62)
Konstantinos Vlachopoulos (Department of Informatics, Ionian University, Corfu, Greece), Emmanouil Magkos (Department of Informatics, Ionian University, Corfu, Greece), Vassileios Chrissikopoulos (Department of Informatics, Ionian University, Corfu, Greece)
Volume 3 (2011)
Issue 1
Article 1
On the Performance of Li’s Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations (pages 1-13)
Ahmad Ryad Soobhany (Keele University and Forensic Pathways Ltd., UK), Richard Leary (Forensic Pathways Ltd., UK), KP Lam (Keele University, UK)
Article 2
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks (pages 14-36)
Antonis Michalas (Athens Information Technology, Greece), Nikos Komninos (Athens Information Technology, Greece), Neeli R. Prasad (Aalborg University, Denmark)
Article 3
Microsoft Excel File: A Steganographic Carrier File (pages 37-52)
Rajesh Kumar Tiwari (GLA Institute of Technology & Management, India), G. Sahoo (BIT Mesra, India)
Article 4
An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM (pages 53-69)
Fei Peng (Hunan University, China), Yu-Zhou Lei (Hunan University, China)
Issue 2
Article 1
An Approach for Hand Vein Representation and Indexing (pages 1-15)
D S Guru (University of Mysore, India), K B Nagasundara (University of Mysore, India), S Manjunath (University of Mysore, India), R Dinesh (LG Soft India Limited, India)
Article 2
Towards the Ordering of Events from Multiple Textual Evidence Sources (pages 16-34)
Sarabjot Singh Anand (University of Warwick, UK), Arshad Jhumka (University of Warwick, UK), Kimberley Wade (University of Warwick, UK)
Article 3
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features (pages 35-40)
Fei Peng (Hunan University, China), Honglin Li (Hunan University, China)
Article 4
An Enhanced Fuzzy ARM Approach for Intrusion Detection (pages 41-61)
Nasser S. Abouzakhar (The University of Hertfordshire, UK), Huankai Chen (The University of Hertfordshire, UK), Bruce Christianson (The University of Hertfordshire, UK)
Issue 3
Article 1
A Framework for the Forensic Investigation of Unstructured Email Relationship Data (pages 1-18)
John Haggerty (University of Salford, UK), Alexander J. Karran (Liverpool John Moores University, UK), David J. Lamb (Liverpool John Moores University, UK), Mark Taylor (Liverpool John Moores University, UK)
Article 2
Requirements for a Forensically Ready Cloud Storage Service (pages 19-36)
Theodoros Spyridopoulos (Democritus University of Thrace, Greece), Vasilios Katos (Democritus University of Thrace, Greece)
Article 3
LUARM: An Audit Engine for Insider Misuse Detection (pages 37-49)
G. Magklaras (University of Plymouth, UK), S. Furnell (University of Plymouth, UK), M. Papadaki (University of Plymouth, UK)
Article 4
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs (pages 50-60)
Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK), Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia)
Issue 4
Article 1
Source Camera Identification Issues: Forensic Features Selection and Robustness (pages 1-15)
Yongjian Hu (South China University of Technology, China, and University of Warwick, UK), Chang-Tsun Li (University of Warwick, UK), Changhui Zhou (South China University of Technology, China), Xufeng Lin (South China University of Technology, China)
Article 2
Microsoft Power Point Files: A Secure Steganographic Carrier (pages 16-28)
Rajesh Kumar Tiwari (RVS College of Engineering & Technology, India), G. Sahoo (Birla Institute of Technology (BIT) Mesra, India)
Article 3
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis (pages 29-41)
Alexandros Zaharis (University of Thessaly, Greece), Adamantini Martini (SIEMENS SA, Greece), Theo Tryfonas (University of Bristol, UK), Christos Ilioudis (ATEI of Thessaloniki, Greece), G. Pangalos (Aristotle University of Thessaloniki, Greece)
Article 4
A Blind Image Watermarking Scheme Utilizing BTC Bitplanes (pages 42-53)
Chun-Ning Yang (Zhejiang University, China), Zhe-Ming Lu (Zhejiang University, China)
Volume 2 (2010)
Issue 1
Article 1
Cryptopometry as a Methodology for Investigating Encrypted Material (pages 1-20)
Niall McGrath (University College Dublin, Ireland), Pavel Gladyshev (University College Dublin, Ireland), Joe Carthy (University College Dublin, Ireland)
Article 2
A DFT-Based Analysis to Discern Between Camera and Scanned Images (pages 21-29)
Roberto Caldelli (University of Florence, Italy), Irene Amerini (University of Florence, Italy), Francesco Picchioni (University of Florence, Italy)
Article 3
Grey Areas - The Legal Dimensions of Cloud Computing (pages 30-39)
Michael Davis (Adelta Legal, Adelaide, Australia), Alice Sedsman (Adelta Legal, Adelaide, Australia)
Article 4
Suspect sciences? Evidentiary Problems with Emerging Technologies (pages 40-72)
Gary Edmond (University of New South Wales, Australia)
Issue 2
Article 1
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking (pages 1-20)
Xi Zhao (University of Surrey, UK), Anthony T. S. Ho (University of Surrey, UK), Yun Q. Shi (New Jersey Institute of Technology, USA)
Article 2
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification (pages 21-33)
Irene Amerini (University of Florence, Italy), Roberto Caldelli (University of Florence, Italy), Vito Cappellini (University of Florence, Italy), Francesco Picchioni (University of Florence, Italy), Alessandro Piva (University of Florence, Italy)
Article 3
Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain (pages 34-46)
Roland Kwitt (University of Salzburg, Austria), Peter Meerwald (University of Salzburg, Austria), Andreas Uhl (University of Salzburg, Austria)
Article 4
A Conceptual Methodology for Dealing with Terrorism "Narratives" (pages 47-63)
Gian Piero Zarri (University Paris Est/Créteil/Val de Marne (UPEC), France)
Article 5
Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing (pages 64-87)
B. R. Matam (Aston University, UK), David Lowe (Aston University, UK)
Issue 3
Article 1
A Biologically Inspired Smart Camera for Use in Surveillance Applications (pages 1-14)
Kosta Haltis (University of Adelaide, Australia), Matthew Sorell (University of Adelaide, Australia), Russell Brinkworth (University of Adelaide, Australia)
Article 2
Mobile Phone Forensic Analysis (pages 15-27)
Kevin Curran (University of Ulster, UK), Andrew Robinson (University of Ulster, UK), Stephen Peacocke (University of Ulster, UK), Sean Cassidy (University of Ulster, UK)
Article 3
Source Camera Identification Based on Sensor Readout Noise (pages 28-42)
H. R. Chennamma (University of Mysore, India), Lalitha Rangarajan (University of Mysore, India)
Article 4
Steganography in Thai Text (pages 43-64)
Natthawut Samphaiboon (Asian Institute of Technology, Thailand), Matthew N. Dailey (Asian Institute of Technology, Thailand)
Issue 4
Article 1
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank (pages 1-15)
Moussadek Laadjel (Algerian National Centre for Research and Development, Algeria), Ahmed Bouridane (Northumbria University, UK), Fatih Kurugollu (Queen’s University Belfast, UK), WeiQi Yan (Queen’s University Belfast, UK)
Article 2
Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking (pages 16-36)
Yaqing Niu (Communication University of China, China), Sridhar Krishnan (Ryerson University, Canada), Qin Zhang (Communication University of China, China)
Article 3
Digital Image Forensics Using Multi-Resolution Histograms (pages 37-50)
Jin Liu (Huazhong University of Science and Technology, China), Hefei Ling (Huazhong University of Science and Technology, China), Fuhao Zou (Huazhong University of Science and Technology, China), WeiQi Yan (Queen’s University Belfast, UK), Zhengding Lu (Huazhong University of Science and Technology, China)
Article 4
Secure Robust Hash Functions and Their Applications in Non-interactive Communications (pages 51-62)
Qiming Li (Institute for Infocomm Research, Singapore), Sujoy Roy (Institute for Infocomm Research, Singapore)
Article 5
Digital Image Splicing Using Edges (pages 63-75)
Jonathan Weir (Queen’s University Belfast, UK), Raymond Lau (Queen’s University Belfast, UK), WeiQi Yan (Queen’s University Belfast, UK)
Volume 1 (2009)
Issue 1
Article 1
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools (pages 1-28)
Simson L. Garfinkel (Naval Postgraduate School and Harvard University, USA)
Article 2
Locally Square Distortion and Batch Steganographic Capacity (pages 29-44)
Andrew D. Ker (Oxford University Computing Laboratory, UK)
Article 3
Unexpected Artifacts in a Digital Photograph (pages 45-58)
Matthew J. Sorell (University of Adelaide, Australia)
Article 4
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution (pages 59-74)
Hongxia Jin (IBM Almaden Research Center, USA)
Article 5
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques (pages 75-88)
Chang-Tsun Li (University of Warwick, UK), Yue Li (University of Warwick, UK), Chia-Hung Wei (Ching Yun University, Taiwan)
Article 6
Voice Over IP: Privacy and Forensic Implications (pages 89-101)
Jill Slay (University of South Australia, Australia), Matthew Simon (University of South Australia, Australia)
Issue 2
Article 1
A Model Based Approach to Timestamp Evidence Interpretation (pages 1-12)
Svein Yngvar Willassen (Norwegian University of Science and Technology, Norway)
Article 2
Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized JPEG Images (pages 13-27)
Matthew James Sorell (University of Adelaide, Australia)
Article 3
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks (pages 28-41)
Dennis K. Nilsson (Chalmers University of Technology, Sweden), Ulf E. Larson (Chalmers University of Technology, Sweden)
Article 4
Reversible and Blind Database Watermarking Using Difference Expansion (pages 42-54)
Gaurav Gupta (Macquarie University, Australia), Josef Pieprzyk (Macquarie University, Australia)
Article 5
Methods to Identify Spammers (pages 55-68)
Tobias Eggendorfer (Universitat der Bundeswehr Munchen, Germany)
Article 6
Dealing with Multiple Truths in Online Virtual Worlds (pages 69-82)
Jan Sablatnig (Technische Universitat Berlin, Germany), Fritz Lehmann-Grube (Technische Universitat Berlin, Germany), Sven Grottke (University of Stuttgart, Germany), Sabine Cikic (Technische Universitat Berlin, Germany)
Issue 3
Article 1
Spam Image Clustering for Identifying Common Sources of Unsolicited Emails (pages 1-20)
Chengcui Zhang (University of Alabama at Birmingham, USA), Xin Chen (University of Alabama at Birmingham, USA), Wei-Bang Chen (University of Alabama at Birmingham, USA), Lin Yang (University of Alabama at Birmingham, USA), Gary Warner (University of Alabama at Birmingham, USA)
Article 2
Dynamic Structural Statistical Model Based Online Signature Verification (pages 21-41)
Yan Chen (Tsinghua University, China), Xiaoqing Ding (Tsinghua University, China), Patrick S.P. Wang (Northeastern University, USA)
Article 3
Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems (pages 42-61)
Antonio Savoldi (University of Brescia, Italy), Paolo Gubian (University of Brescia, Italy)
Article 4
Robust Near Duplicate Image Matching for Digital Image Forensics (pages 62-79)
H.R. Chennamma (University of Mysore, India), Lalitha Rangarajan (University of Mysore, India), M.S. Rao (Indian Academy of Forensic Sciences, India)
Article 5
Evidentiary Implications of Potential Security Weaknesses in Forensic Software (pages 80-91)
Chris K. Ridder (Stanford University, USA)
Issue 4
Article 1
Understanding the Process of Online Grooming: The Behavior of Men who Target Young People Online in Norway (pages 1-18)
Petter Gottschalk (Norwegian School of Management BI, Norway), Ragnar Kristoffersen (Correctional Service of Norway Staff Academy KRUS, Norway)
Article 2
Reliable Motion Detection, Location and Audit in Surveillance Video (pages 19-31)
Amirsaman Poursoltanmohammadi (University of Adelaide, Australia), Matthew Sorell (University of Adelaide, Australia)
Article 3
Medical Images Authentication through Repetitive Index Modulation Based Watermarking (pages 32-39)
Chang-Tsun Li (University of Warwick, UK), Yue Li (University of Warwick, UK)
Article 4
Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification (pages 40-57)
Emanuele Maiorana (Università degli Studi Roma TRE, Italy), Patrizio Campisi (Università degli Studi Roma TRE, Italy), Alessandro Neri (Università degli Studi Roma TRE, Italy)
Article 5
Web-Based Child Pornography: Quantification and Qualification of Demand (pages 58-69)
Chad M.S. Steel (Virginia Polytechnic Institute and State University, USA)