Journal Contents: International Journal of Digital Crime and Forensics (IJDCF)

View the International Journal of Digital Crime and Forensics (IJDCF) home page for complete details.
Volume 16 (2024)
Issue 1
Article 34
Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm (pages 1-16)
Dawei Zhang (School of Information Engineering, Liao Dong University, China)
Article 82
A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers (pages 1-13)
Fuhai Jia (Xinyang University, China), Yanru Jia (Xinyang University, China), Jing Li (Xinyang University, China), Zhenghui Liu (Xinyang Normal University, China)
Volume 15 (2023)
Issue 1
Article 0
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology (pages 1-16)
Yuwen Zhu (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Lei Yu (Chinese Academy of Sciences, China)
Article 19
MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation (pages 1-24)
Heng Pan (Zhongyuan University of Technology, China), Yaoyao Zhang (Zhongyuan University of Technology, China), Jianmei Liu (Zhongyuan University of Technology, China), Xueming Si (Zhongyuan University of Technology, China), Zhongyuan Yao (Zhongyuan University of Technology, China), Liang Zhao (University of Sao Paulo, Brazil)
Article 24
Article 58
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study (pages 1-20)
Mathew Nicho (Rabdan Academy, UAE), Maha Alblooki (Zayed University, UAE), Saeed AlMutiwei (Zayed University, UAE), Christopher D. McDermott (Robert Gordon University, UK), Olufemi Ilesanmi (Robert Gordon University, UK)
Article 58
Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning (pages 1-18)
Shi Cheng (Nantong University, China), Yan Qu (Nantong University, China), Chuyue Wang (Nantong University, China), Jie Wan (Nantong University, China)
Article 62
The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree (pages 1-20)
Wenjun Yao (Kunming University of Science and Technology, China), Ying Jiang (Kunming University of Science and Technology, China), Yang Yang (Kunming University of Science and Technology, China)
Article 66
Latest Trends in Deep Learning Techniques for Image Steganography (pages 1-14)
Vijay Kumar (Dr. B.R. Ambedkar National Institute of Technology, Jalandhar, India), Sahil Sharma (Jaypee University of Information Technology, India), Chandan Kumar (Amrita Vishwa Vidyapeetham, Amaravati, India), Aditya Kumar Sahu (Amrita Vishwa Vidyapeetham, Amaravati, India)
Article 66
Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution (pages 1-23)
Suzhen Wang (Hebei University of Economics and Business, China), Yongchen Deng (Hebei University of Economics and Business, China), Zhongbo Hu (Hebei University of Economics and Business, China)
Article 74
UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network (pages 1-24)
Wei Wang (Hebei University of Engineering, China), Longxing Xing (Hebei University of Engineering, China), Na Xu (Hebei University of Engineering, China), Jiatao Su (Hebei University of Engineering, China), Wenting Su (Hebei University of Engineering, China), Jiarong Cao (Hebei University of Engineering, China)
Volume 14 (2022)
Issue 1
Article 62
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable (pages 1-26)
Louay Karadsheh (Higher Colleges of Technology, Dubai, UAE), Haroun Alryalat (University of Bahrain, The Kingdom of Bahrain), Ja'far Alqatawna (The University of Jordan, Jordan & Higher Colleges of Technology, Dubai, UAE), Samer Fawaz Alhawari (The World Islamic Sciences and Education University, Jordan), Mufleh Amin AL Jarrah (Amman Arab University, Jordan)
Article 94
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence (pages 1-19)
Chunyan Zeng (Hubei University of Technology, China), Yao Yang (Hubei University of Technology, China), Zhifeng Wang (Central China Normal University, China), Shuai Kong (Hubei University of Technology, China), Shixiong Feng (Hubei University of Technology, China)
Issue 2
Guest Editorial Preface: Special Issue on the Combination of Cyber Security and Artificial Intelligence
Liehuang Zhu (Beijing Institute of Technology, China), Guanglu Sun (Harbin University of Science and Technology, China), Bing Xia (Zhongyuan University of Technology, China), Lei Xu (Beijing Institute of Technology, China)
Article 71
A Model Study on Hierarchical Assisted Exploration of RBAC (pages 1-13)
Wan Chen (Henan University, China), Daojun Han (Henan University, China), Lei Zhang (Henan University, China), Qi Xiao (Henan University, China), Qiuyue Li (Henan University, China), Hongzhen Xiang (Henan University, China)
Article 72
Face Anonymity Based on Facial Pose Consistency (pages 1-12)
Jing Wang (Yunnan Normal University, China), Jianhou Gan (Yunnan Normal University, China), Jun Wang (Yunnan Normal University, China), Juxiang Zhou (Yunnan Normal University, China), Zeguang Lu (National Academy of Guo Ding Institute of Data Science, China)
Article 73
SRGM Decision Model Considering Cost-Reliability (pages 1-19)
Wenqian Jiang (Harbin Institute of Technology (Weihai), China), Ce Zhang (Harbin Institute of Technology (Weihai), China), Di Liu (Harbin Institute of Technology (Weihai), China), Kaiwei Liu (Harbin Institute of Technology (Weihai), China), Zhichao Sun (Harbin Institute of Technology (Weihai), China), Jianyuan Wang (Harbin Institute of Technology (Weihai), China), Zhongyin Qiu (Harbin Institute of Technology, China), Weigong Lv (Harbin Institute of Technology (Weihai), China)
Article 74
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology (pages 1-20)
Shaobo Zhang (Beijing Institute of Technology, China), Yuhang Liu (Peking University, China), Dequan Yang (Beijing Institute of Technology, China)
Article 75
Web Vulnerability Detection Analyzer Based on Python (pages 1-17)
Dawei Xu (Changchun University, China), Tianxin Chen (Changchun University, China), Zhonghua Tan (Hainan Normal University, China), Fudong Wu (Changchun University, China), Jiaqi Gao (Changchun University, China), Yunfan Yang (Changchun University, China)
Article 76
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain (pages 1-20)
Xiubo Liang (Zhejiang University, China), Yu Zhao (Zhejiang University, China), Junhan Wu (Zhejiang University, China), Keting Yin (Zhejiang University, China*)
Article 77
A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA (pages 1-18)
Ran Zhang (Zhengzhou University of Light Industry, China), Zhihan Pan (Zhengzhou University of Light Industry, China), Yifeng Yin (Zhengzhou University of Light Industry, China), Zengyu Cai (Zhengzhou University of Light Industry, China)
Article 78
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning (pages 1-18)
Junchao Wang (National Digital Switching System Engineering Technological R&D Center, Zhengzhou, China), Jin Wei (School of Computer Science, Fudan University, Shanghai, China, Fudan University Data Arena Institute, Shanghai, China), Jianmin Pang (National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China), Fan Zhang (National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China), Shunbin Li (Zhejiang Lab, Hangzhou, China)
Article 79
Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation (pages 1-14)
Ye Hua (Hunan University of Arts and Science, China), Qu Xi Long (Hunan University of Finance and Economics, China), Li Zhen Jin (Hunan University of Finance and Economics, China)
Issue 3
Article 14
An Unhealthy Webpage Discovery System Based on Convolutional Neural Network (pages 1-15)
Zengyu Cai (School of Computer and Communication Engineering, Zhengzhou University of Light Industry, China), Chunchen Tan (School of Computer and Communication Engineering, Zhengzhou University of Light Industry, China), Jianwei Zhang (College of Software Engineering, Zhengzhou University of Light Industry, China), Tengteng Xiao (Hundsun Technologies Inc., China), Yuan Feng (School of Computer and Communication Engineering, Zhengzhou University of Light Industry, China)
Article 15
Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting (pages 1-15)
Shannan Liu (College of Information Science and Technology, Shihezi University, China), Ronghua Zhang (College of Information Science and Technology, Shihezi University, China*), Changzheng Liu (College of Information Science and Technology, Shihezi University, China), Chenxi Xu (School of Economics and Management, Qilu Normal University, China*), Jie Zhou (College of Information Science and Technology, Shihezi University, China), Jiaojiao Wang (College of Information Science and Technology, Shihezi University, China)
Article 45
Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion (pages 1-15)
Guiyan Cai (Guangzhou Medical University, China), Liang Qu (North China Sea Environmental Monitoring Center, State Oceanic Administration, China), Yongdong Li (Guangdong Industry Polytechnic, China), Guoan Cheng (School of Information Electrical Engineering, Qingdao Harbor Vocational Technical College, China), Xin Lu (School of Computer Science and Technology, Ocean University of China, China), Yiqi Wang (School of Computer Science and Technology, Ocean University of China, China), Fengqin Yao (School of Computer Science and Technology, Ocean University of China, China), Shengke Wang (School of Computer Science and Technology, Ocean University of China, China)
Article 88
Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis (pages 1-14)
Dongmei Zang (Hebei Key Laboratory of Data Science and Application, The Key Laboratory of Engineering Computing in Tangshan City, College of Science, North China University of Science and Technology, Tangshan, China), Xinlei Sheng (Hebei Key Laboratory of Data Science and Application, The Key Laboratory of Engineering Computing in Tangshan City, College of Science, North China University of Science and Technology, Tangshan, China), Liya Wang (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, Hebei Key Laboratory of Data Science and Application, College of Science, North China University of Science and Technology, Tangshan, China), Aimin Yang (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan, China & College of Science, North China University of Science and Technology, Tangshan, China), Tao Xue (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, Hebei Key Laboratory of Data Science and Application, College of Science, North China University of Science and Technology, Tangshan, China), Jie Li (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan, China)
Article 93
Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images (pages 1-23)
Fan Zhang (Mathematics and Computer Science School, Wuhan Polytechnic University, China), Wei Chen (Nanjing University of Posts and Telecommunications, China), Yongqiong Zhu (School of Art, Wuhan Business University, China)
Article 96
Design and Implementation of Identity Verification Software Based on Deep Learning (pages 1-15)
Runde Yu (Beijing Institute of Technology, China), Xianwei Zhang (Xi'an Shiyou University, China), Yimeng Zhang (Xidian University, China), Jianfeng Song (Xidian University, China), Kang Liu (Xidian University, China), Qiguang Miao (Xidian University, China)
Volume 13 (2021)
Issue 1
Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices
Guest Editorial Preface
Gulshan Shrivastava (Sharda University, Greater Noida, India), Nhu Nguyen Gia (Duy Tan University, Vietnam), Loredana-Mihaela Stanciu (Politehnica University Timisoara, Romania), Dac-Nhuong Le (Haiphong University, Vietnam)
Article 1
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models (pages 1-25)
Khalifa Al-Room (Zayed University, UAE), Farkhund Iqbal (Zayed University, UAE), Thar Baker (Liverpool John Moores University, UK), Babar Shah (Zayed University, UAE), Benjamin Yankson (University of Ontario Institute of Technology, Canada & Sheridan College, Canada), Aine MacDermott (Liverpool John Moores University, UK), Patrick C. K. Hung (University of Ontario Institute of Technology, Canada)
Article 2
Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method (pages 26-47)
Jyotismita Chaki (VIT University, Vellore, India), Nilanjan Dey (JIS University, Kolkata, India)
Article 3
SafeWomen: A Smart Device to Secure Women's Environment Using ATmega328 With an Android Tracking App (pages 48-64)
Sumit Kumar Yadav (Indira Gandhi Delhi Technical University for Women, India), Kavita Sharma (G. L. Bajaj Institute of Technology and Management, Greater Noida, India), Ananya Gupta (Indira Gandhi Delhi Technical University for Women, India)
Article 4
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card (pages 65-78)
Ajay Kumar Sahu (Department of Information Technology, IMS Engineering College, Ghaziabad, India), Ashish Kumar (ITS Engineering College, India)
Article 5
Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications (pages 79-93)
Ruchi Mittal (Netaji Subhas Institute of Technology, New Delhi, India), M. P. S. Bhatia (Netaji Subhas Institute of Technology, New Delhi, India)
Issue 2
Article 1
Detection of Phishing in Internet of Things Using Machine Learning Approach (pages 1-15)
Sameena Naaz (Jamia Hamdard, India)
Article 2
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform (pages 16-34)
Hanlin Liu (National University of Defense Technology, China), Jingju Liu (National University of Defense Technology, China), Xuehu Yan (National University of Defense Technology, China), Pengfei Xue (National University of Defense Technology, China), Dingwei Tan (National University of Defense Technology, China)
Article 3
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images (pages 35-56)
Rohit Thanki (Prognica Labs, Dubai, UAE), Surekha Borra (K. S. Institute of Technology, India), Ashish Kothari (Atmiya University, India)
Article 4
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis (pages 57-76)
Ning Huang (National University of Defense Technology, China), Shuguang Huang (National University of Defense Technology, China), Chao Chang (National University of Defense Technology, China)
Article 5
An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment (pages 77-93)
Partha Ghosh (Netaji Subhash Engineering College, India), Dipankar Sarkar (Tata Consultancy Service, India), Joy Sharma (Netaji Subhash Engineering College, India), Santanu Phadikar (Maulana Abul Kalam Azad University of Technology, India)
Article 6
Research on Threat Information Network Based on Link Prediction (pages 94-102)
Jin Du (Institute of Software, Chinese Academy of Science, Beijing, China & Yunnan Police College, Kunming, China), Feng Yuan (Institute of Software Application Technology, Guangzhou, China & Chinese Academy of Sciences, Guangzhou, China), Liping Ding (Institute of Software Application Technology, Guangzhou, China & Chinese Academy of Sciences, Guangzhou, China), Guangxuan Chen (Institute of Software, Chinese Academy of Science, Beijing, China & Zhejiang Police College, Hangzhou, China), Xuehua Liu (Institute of Software, Chinese Academy of Sciences, Beijing, China & University of Chinese Academy of Sciences, China)
Article 7
Multiple Fusion Strategies in Localization of Local Deformation Tampering (pages 103-114)
Yongzhen Ke (School of Computer Science and Technolgy, Tiangong University, China), Yiping Cui (School of Computer Science and Technolgy, Tiangong University, China)
Article 8
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code (pages 115-133)
Pengcheng Cao (Nanjing University of Science and Technology, China), Weiwei Liu (Nanjing University of Science and Technology, China), Guangjie Liu (Nanjing University of Information Science and Technology, China), Jiangtao Zhai (Nanjing University of Information Science and Technology, China), Xiao-Peng Ji (Nanjing University of Information Science and Technology, China), Yuewei Dai (Nanjing University of Information Science and Technology, China), Huiwen Bai (Nanjing University of Science and Technology, China)
Issue 3
Article 1
Information Hiding Model Based on Channel Construction of Orthogonal Basis (pages 1-18)
Bao Kangsheng (Hefei No.6 High School, China)
Article 2
A HEVC Video Steganalysis Against DCT/DST-Based Steganography (pages 19-33)
Henan Shi (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Tanfeng Sun (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Xinghao Jiang (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Yi Dong (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Ke Xu (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China)
Article 3
Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples (pages 34-46)
Shiqi Wu (Dalian University of Technology, China), Bo Wang (Dalian University of Technology, China), Jianxiang Zhao (Dalian University of Technology, China), Mengnan Zhao (Dalian University of Technology, China), Kun Zhong (Dalian University of Technology, China), Yanqing Guo (Dalian University of Technology, China)
Article 4
A Modification-Free Steganography Algorithm Based on Image Classification and CNN (pages 47-58)
Jian Bin Wu (Central China Normal University, China), Yang Zhang (Central China Normal University, China), Chu Wei Luo (Central China Normal University, China), Lin Feng Yuan (Wuhan Maritime Communication Research Institute, China), Xiao Kang Shen (Central China Normal University, China)
Article 5
Color Image Encryption Using Angular Graph Fourier Transform (pages 59-82)
Liuqing Yang (Beijing Forestry University, Engineering Research Center for Forestry-Oriented Intelligent Information Processing of National Forestry and Grassland Administration, China), Wei Meng (Beijing Forestry University, Engineering Research Center for Forestry-oriented Intelligent Information Processing of National Forestry and Grassland Administration, China), Xudong Zhao (Beijing Institute of Technology, China)
Issue 4
Article 1
An Intra-Prediction Mode-Based Video Steganography With Secure Strategy (pages 1-15)
Xiushi Cao (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Tanfeng Sun (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Xinghao Jiang (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Yi Dong (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China), Ke Xu (School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China)
Article 2
Applying Secret Image Sharing to Economics (pages 16-25)
Xuemei Zhao (Anhui Business and Technology College, Hefei, China), Tongtong Zhang (31433 Institute, China), Jun Liu (National University of Defense Technology, Changsha, China), Canju Lu (National University of Defense Technology, Changsha, China), Huan Lu (National University of Defense Technology, Changsha, China), Xuehu Yan (National University of Defense Technology, Changsha, China)
Article 3
Multi-Layer Fusion Neural Network for Deepfake Detection (pages 26-39)
Zheng Zhao (Xidian University, Xi'an, China), Penghui Wang (National Laboratory of Radar Signal Processing, Xidian University, Xi'an, China), Wei Lu (Sun Yat-Sen University, Guangzhou, China)
Article 4
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF (pages 40-56)
Jiaohua Qin (Central South University of Forestry and Technology, Changsha, China), Zhuo Zhou (Central South University of Forestry and Technology, Changsha, China), Yun Tan (Central South University of Forestry and Technology, Changsha, China), Xuyu Xiang (Central South University of Forestry and Technology, Changsha, China), Zhibin He (Central South University of Forestry and Technology, Changsha, China)
Article 5
Coverless Information Hiding Based on WGAN-GP Model (pages 57-70)
Xintao Duan (Henan Normal University, Xinxiang, China), Baoxia Li (Henan Normal University, Xinxiang, China), Daidou Guo (Henan Normal University, Xinxiang, China), Kai Jia (Henan Normal University, Xinxiang, China), En Zhang (Henan Normal University, Xinxiang, China), Chuan Qin (University of Shanghai for Science and Technology, Shanghai, China)
Article 6
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching (pages 71-89)
Ting-ting Su (College of Cryptography Engineering, Engineering University of PAP, Shanxi, China), Yan Ke (Engineering University of PAP, Shanxi, China), Yi Ding (College of Cryptography Engineering, Engineering University of PAP, Shanxi, China), Jia Liu (College of Cryptography Engineering, Engineering University of PAP, Shanxi, China)
Issue 5
Special Issue on Advanced Digital Forensic Techniques for Digital Traces
Guest Editorial Preface
Mamoun Alazab (College of Engineering, IT, and Environment, Charles Darwin University, Australia), Sivaraman Eswaran (Department of Computer Science and Engineering, PES University, Bangalore, India), Prasad Honnavalli (Department of Computer Science and Engineering, PES University, Bangalore, India)
Article 1
A New Framework for Matching Forensic Composite Sketches With Digital Images (pages 1-19)
Chethana H. T. (Vidyavardhaka College of Engineering, Mysuru, India), Trisiladevi C. Nagavi (S. J. College of Engineering, JSS Science and Technology University, Mysore, India)
Article 2
Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics (pages 20-42)
Barkha Shree (Manav Rachna University, Faridabad, India), Parneeta Dhaliwal (Manav Rachna University, Faridabad, India)
Article 3
Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm (pages 43-64)
M. Sravan Kumar Reddy (Vellore Institute of Technology, India), Dharmendra Singh Rajput (Vellore Institute of Technology, India)
Article 4
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud (pages 65-77)
Rajashree Soman (Jain University, Bengaluru, India), Sukumar R. (Jain University, Bengaluru, India)
Article 5
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model (pages 78-100)
Ashok Kumar Mohan (TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham University, India), Sethumadhavan Madathil (TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham University, India), Lakshmy K. V. (TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham University, India)
Article 6
Multimedia Concealed Data Detection Using Quantitative Steganalysis (pages 101-113)
Rupa Ch. (V. R. Siddhartha Engineering College (Autonomous), Vijayawada, India), Sumaiya Shaikh (V. R. Siddhartha Engineering College (Autonomous), Vijayawada, India), Mukesh Chinta (V. R. Siddhartha Engineering College (Autonomous), Vijayawada, India)
Article 7
A Model of Cloud Forensic Application With Assurance of Cloud Log (pages 114-129)
More Swami Das (Department of CSE, CVR College of Engineering, Hyderabad, India), A. Govardhan (Jawaharlal Nehru Technological University, Hyderabad, India), Vijaya Lakshmi Doddapaneni (Mahatma Gandhi Institute of Technology, Hyderabad, India)
Article 8
Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks (pages 130-144)
Sunitha R. (PES University, Bengaluru, India), Chandrika J. (Malnad College of Engineering, Kamataka, India)
Issue 6
Article 4
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures (pages 1-17)
Kaixi Wang (College of Computer Science and Technology, Qingdao University, China), Xiangmei Yu (College of Computer Science and Technology, Qingdao University, China), Ziyi Zou (College of Computer Science and Technology, Qingdao University, China)
Article 6
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set (pages 1-27)
Rizwan Ur Rahman (SECURE, Center of Excellence for Cyber Security, VIT University Bhopal), Deepak Singh Tomar (Maulana Azad National Institute of Technology, Bhopal, India)
Article 6
Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification (pages 1-15)
Digambar Pawar (University of Hyderabad, India), Mayank Gajpal (University of Hyderabad, India)
Article 7
ROP Defense Using Trie Graph for System Security (pages 1-12)
Alex Yao Chu Zhu (Auckland University of Technology, New Zealand), Wei Qi Yan (Auckland University of Technology, New Zealand), Roopak Sinha (Auckland University of Technology, New Zealand)
Article 8
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses (pages 1-20)
Shane Miller (Ulster University, Coleraine, UK), Kevin Curran (Ulster University, Coleraine, UK), Tom Lunney (Ulster University, Coleraine, UK)
Article 9
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification (pages 1-14)
Lianshan Liu (Shandong University of Science and Technology, Shandong, China), Xiaoli Wang (Shandong University of Science and Technology, Shandong, China), Lingzhuang Meng (Shandong University of Science and Technology, Shandong, China), Gang Tian (Shandong University of Science and Technology, Shandong, China), Ting Wang (Shandong University of Science and Technology, Shandong, China)
Article 10
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN (pages 1-25)
Pankaj Kumar Keserwani (National Institute of Technology, Sikkim, India), Mahesh Chandra Govil (National Institute of Technology, Sikkim, India), E. S. Pilli (Malaviya National Institute of Technology, Jaipur, India), Prajjval Govil (J. K. Lakshmipat University, India)
Article 11
HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding (pages 1-15)
Yong Liu (School of Mathematics and Big Data, Anhui University of Science and Technology, China), Dawen Xu (School of Electronics and Information Engineering, Ningbo University of Technology, China)
Article 12
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing (pages 1-19)
Di Xiao (Chongqing University, China), Jia Liang (Chongqing University, China), Yanping Xiang (Chongqing University, China), Jiaqi Zhou (Chongqing University, China)
Article 13
Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow (pages 1-13)
xiangling ding (Hunan University of Science and Technology, China), Yanming Huang (Hunan University of Science and Technology, China), Dengyong Zhang (Changsha University of Science and Technology, China), Junlin Ouyang (Hunan University of Science and Technology, China)
Article 14
Two-Step Image-in-Image Steganography via GAN (pages 1-12)
Guanzhong Wu (South China University of Technology, China), Xiangyu Yu (South China University of Technology, China), Hui Liang (South China University of Technology, China), Minting Li (South China University of Technology, China)
Article 15
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications (pages 1-23)
Hai Lu (Shaanxi Normal University, China), Liping Shao (Shaanxi Normal University, China), Qinglong Wang (Shaanxi Normal University, China)
Article 16
An Incremental Acquisition Method for Web Forensics (pages 1-13)
Guangxuan Chen (Zhejiang Police College, China), Guangxiao Chen (Wenzhou Public Security Bureau, China), Lei Zhang (Joint Logistics College, National Defence University, China), Qiang Liu (Zhejiang Police College, China)
Article 32
Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications (pages 1-20)
Shantanu Jana (Jadavpur University, India), Nibaran Das (Jadavpur University, India), Subhadip Basu (Jadavpur University, India), Mita Nasipuri (Jadavpur University, India)
Article 47
P2DF: A Privacy-Preserving Digital Forensics Framework (pages 1-15)
Muhammad Abulaish (South Asian University, India), Nur Al Hasan Haldar (The University of Western Australia, Australia), Jahiruddin Jahiruddin (Department of Computer Science, Jamia Millia Islamia, India)
Article 48
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis (pages 1-30)
Yitong Meng (State Key Laboratory of Mathematical Engineering and Advanced Computing, China), Jinlong Fei (State Key Laboratory of Mathematical Engineering and Advanced Computing, China)
Article 55
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis (pages 1-14)
Lei Yu (University of the Chinese Academy of Sciences, China), Haoyu Wang (University of the Chinese Academy of Sciences, China), Linyu Li (University of the Chinese Academy of Sciences, China), Houhua He (University of the Chinese Academy of Sciences, China)
Article 56
Detection of Anonymising Proxies Using Machine Learning (pages 1-17)
Shane Miller (Ulster University, UK), Kevin Curran (Ulster University, UK), Tom Lunney (Ulster University, UK)
Volume 12 (2020)
Issue 1
Article 1
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics (pages 1-13)
Áine MacDermott (Liverpool John Moores University, Merseyside, UK), Thar Baker (Liverpool John Moores University, Merseyside, UK), Paul Buck (Liverpool John Moores University, Merseyside, UK), Farkhund Iqbal (Zayed University, Abu Dhabi, UAE), Qi Shi (Liverpool John Moores University, Merseyside, UK)
Article 2
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification (pages 14-34)
Chee Cheun Huang (Institute for Infocomm Research, A*STAR, Singapore, Singapore), Chien Eao Lee (Institute for Infocomm Research, A*STAR, Singapore, Singapore), Vrizlynn L. L. Thing (Institute for Infocomm Research, A*STAR, Singapore, Singapore)
Article 3
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0 (pages 35-57)
Hana Bouafif (ESPRIT School of Engineering, Tunis, Tunisia), Faouzi Kamoun (ESPRIT School of Engineering, Tunis, Tunisia), Farkhund Iqbal (College of Technical Innovation, Zayed University, Abu Dhabi, UAE)
Article 4
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study (pages 58-89)
Ahmed Almutairi (Concordia University, Quebec, Canada), Behzad Shoarian Satari (Concordia University, Quebec, Canada), Carlos Rivas (Concordia University, Quebec, Canada), Cristian Florin Stanciu (Concordia University, Quebec, Canada), Mozhdeh Yamani (Concordia University, Quebec, Canada), Zahra Zohoorsaadat (Concordia University, Quebec, Canada), Serguei A. Mokhov (Concordia University, Quebec, Canada)
Article 5
A Deep Learning Framework for Malware Classification (pages 90-108)
Mahmoud Kalash (University of Manitoba, Winnipeg, Canada), Mrigank Rochan (University of Manitoba, Winnipeg, Canada), Noman Mohammed (University of Manitoba, Winnipeg, Canada), Neil Bruce (Ryerson University, Toronto, Canada), Yang Wang (University of Manitoba, Winnipeg, Canada), Farkhund Iqbal (Zayed University, Abu Dhabi, UAE)
Article 6
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources (pages 109-130)
Chao Wu (Chongqing Vehicle Test & Research Institute Co. Ltd., Chongqing, China), Yuan'an Liu (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China), Fan Wu (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China), Feng Liu (SKLOIS, IIE & SCS UCAS, CAS, Beijing, China), Hui Lu (Institute of Microelectronics of the Chinese Academy of Sciences, Beijing, China), Wenhao Fan (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China), Bihua Tang (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China)
Article 7
ENF Based Video Forgery Detection Algorithm (pages 131-156)
Yufei Wang (South China University of Technology, Guangzhou, China), Yongjian Hu (South China University of Technology, Guangzhou, China & Sino-Singapore International Joint Research Institute, Guangzhou, China), Alan Wee-Chung Liew (Griffith University, Gold Coast Campus, Australia), Chang-Tsun Li (Deakin University, Geelong Campus, Australia)
Article 8
Reversible Data Hiding Based on Adaptive Block Selection Strategy (pages 157-168)
Dan Huang (Guangdong Provincial Key Laboratory of Information, Security Technology, Sun Yat-sen University, Guangzhou, China), Fangjun Huang (School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China)
Issue 2
Special Issue on Image and Video Based Intelligent Surveillance and Forensics
Guest Editorial Preface
Xinguo Yu (National Engineering Research Center for E-Learning, Central China Normal University, Wuhan, China), Chao Sun (National Engineering Research Center for E-Learning, Central China Normal University, Wuhan, China)
Article 1
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter (pages 1-20)
Jinsheng Xiao (School of Electronic Information, Wuhan University, Wuhan, China), Wenxin Xiong (School of Electronic Information, Wuhan University, Wuhan, China), Yuan Yao (College of Physical Science and Technology, Central China Normal University, Wuhan, China), Liang Li (School of Electronic Information, Wuhan University, Wuhan, China), Reinhard Klette (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Article 2
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning (pages 21-39)
Xinguo Yu (Central China Normal University, Wuhan, China), Wu Song (Central China Normal University, Wuhan, China), Xiaopan Lyu (Central China Normal University, Wuhan, China), Bin He (Central China Normal University, Wuhan, China), Nan Ye (University of Queensland, Brisbane, Australia)
Article 3
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification (pages 40-58)
Raouia Mokni (College of Computer Engineering and Science, Sattam Prince Bin Abdulaziz University, Kharj, Saudi Arabia & Faculty of Economics and Management of Sfax, University of Sfax, Sfax, Tunisia), Hassen Drira (IMT Lille Douai, Univ. Lille, CNRS, UMR 9189 -CRIStAL, Lille, France), Monji Kherallah (Faculty of Sciences of Sfax, University of Sfax, Sfax, Tunisia)
Article 4
Video-Based Person Re-Identification With Unregulated Sequences (pages 59-76)
Wenjun Huang (National Engineering Research Center for Multimedia Software, Wuhan University, Wuhan, China), Chao Liang (National Engineering Research Center for Multimedia Software, Wuhan University, Wuhan, China), Chunxia Xiao (School of Computer Science, Wuhan University, Wuhan, China), Zhen Han (School of Computer Science, Wuhan University, Wuhan, China)
Issue 3
Article 1
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks (pages 1-14)
Jingyuan Rao (Nanchang University School of Software, China), Min Tu (Jiangxi Police College, China), Xuanjin Yang (Southeast University, China)
Article 2
User Identity Hiding Method of Android (pages 15-26)
Yi Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Article 3
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features (pages 27-44)
Gulivindala Suresh (GMR Institute of Technology, India), Chanamallu Srinivasa Rao (Jawaharlal Nehru Technological University, Kakinada, India)
Article 4
Anti-Forensics of Double Compressed MP3 Audio (pages 45-57)
Biaoli Tao (Ningbo University, China), Rangding Wang (Ningbo University, China), Diqun Yan (Ningbo University, China), Chao Jin (Ningbo University, China)
Article 5
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications (pages 58-76)
Puneet Sharma (Amity University, India), Deepak Arora (Amity University, India), T. Sakthivel (Firstsoft Technologies Pvt. Ltd., India)
Article 6
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution (pages 77-95)
Amar B. Deshmukh (Vignan University, Guntur, India), N. Usha Rani (Vignan University, Guntur, India)
Article 7
A Common General Access Structure Construction Approach in Secret Image Sharing (pages 96-110)
Xuehu Yan (National University of Defense Technology, Hefei, China), Yuliang Lu (National University of Defense Technology, Hefei, China), Lintao Liu (National University of Defense Technology, Hefei, China)
Article 8
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings (pages 111-121)
Jin Du (Digital Forensics Lab, Institute of Software Application Technology, Guangzhou, China & Yunnan Police College, Kunming, China), Liping Ding (Digital Forensics Lab, Institute of Software Application Technology, Guangzhou, China & CAS, Guangzhou, China), Guangxuan Chen (Zhejiang Police College & Institute of Software, Chinese Academy of Sciences, Beijing, China)
Issue 4
Special Issue of Big Data and Computing Security
Guest Editorial Preface
Lidong Zhai (Institute of Computing Technology, Chinese Academy of Science, China), Tao Han (University of North Carolina, Charlotte, USA), Ning Zang (Texas A&M University at Corpus Christi, USA)
Article 1
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context (pages 1-19)
Prathap Rudra Boppuru (Christ University (Deemed), India), Ramesha K. (Dr. Ambedkar Institute of Technology, India)
Article 2
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory (pages 20-31)
Yang Zhao (JiLin University, China), Yaqin Fan (JiLin University, China), Mingrui Yin (Beijing University of Posts and Telecommunications, China), Cheng Fang (Civil Aviation University of China, China)
Article 3
Joint Model-Based Attention for Spoken Language Understanding Task (pages 32-43)
Xin Liu (Dalian University of Foreign Languages, China), RuiHua Qi (Dalian University of Foreign Languages, China), Lin Shao (Dalian University of Foreign Languages, China)
Article 4
Design of Cyberspace Security Talents Training System Based on Knowledge Graph (pages 44-53)
Xi Chen (Guizhou Normal University, China), Fangming Ruan (Guizhou Normal University, China), Lvyang Zhang (Yiwu Industrial and Commercial College, China), Yang Zhao (JiLin University, China)
Article 5
A Summary of the Development of Cyber Security Threat Intelligence Sharing (pages 54-67)
Lili Du (JiLin University, China), Yaqin Fan (JiLin University, China), Lvyang Zhang (Yiwu Industrial and Commercial College, China), Lianying Wang (Tencent Security Xuanwu Lab, China), Tianhang Sun (Electrical Engineering and Telecommunications, University of New South Wales, Australia)
Article 6
A Light Recommendation Algorithm of We-Media Articles Based on Content (pages 68-81)
Xin Zheng (Institute of Computing Technology, Chinese Academy of Science, China), Jun Li (Institute of Computing Technology, Chinese Academy of Science, China), Qingrong Wu (Institute of Computing Technology, Chinese Academy of Science, China)
Volume 11 (2019)
Issue 1
Article 1
General Construction for Extended Visual Cryptography Scheme Using QR Codes (pages 1-17)
Yuqiao Cheng (Science and Technology on Information Assurance Laboratory, Beijing, China), Zhengxin Fu (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Bin Yu (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Gang Shen (Zhengzhou Information Science and Technology Institute, Zhengzhou, China)
Article 2
A Universal Image Forensics of Smoothing Filtering (pages 18-28)
Anjie Peng (School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China & Guangdong Key Laboratories of Information Security Technology, Sun Yat-Sen University, Guangzhou China), Gao Yu (School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China), Yadong Wu (School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China), Qiong Zhang (School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, China), Xiangui Kang (School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, China)
Article 3
Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation (pages 29-45)
Yuanxin Wu (CAS Key Laboratory of Electro-Magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Wen Diao (CAS Key Laboratory of Electro-Magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Dongdong Hou (CAS Key Laboratory of Electro-Magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Weiming Zhang (CAS Key Laboratory of Electro-magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China)
Article 4
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image (pages 46-61)
Asad Malik (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hanzhou Wu (Institute of Automation, Chinese Academy of Sciences (CAS), Beijing, China & State Key Laboratory of Cryptology, Beijing, China), Sani M. Abdullahi (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 5
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation (pages 62-77)
Jie Zhu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China), Xianfeng Zhao (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China), Qingxiao Guan (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China)
Article 6
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine (pages 78-89)
Ping Zhong (College of Science, China Agricultural University, Beijing, China), Mengdi Li (College of Information and Electrical Engineering, China Agricultural University, Beijing, China), Kai Mu (College of Information and Electrical Engineering, China Agricultural University, Beijing, China), Juan Wen (College of Information and Electrical Engineering, China Agricultural University, Beijing, China), Yiming Xue (College of Information and Electrical Engineering, China Agricultural University, Beijing, China)
Article 7
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation (pages 90-99)
Zichi Wang (Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China), Zhaoxia Yin (Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Anhui, China), Xinpeng Zhang (Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China)
Article 8
A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation (pages 100-113)
Jian Li (Nanjing University of Information Science & Technology, Nanjing, China), Jinwei Wang (Nanjing University of Information Science & Technology, Nanjing, China), Shuang Yu (Nanjing University of Information Science & Technology, Nanjing, China), Xiangyang Luo (Zhengzhou Science and Technology Institute, Zhengzhou, China)
Article 9
Breaking Steganography: Slight Modification with Distortion Minimization (pages 114-125)
Zhenxing Qian (School of Computer Science, Fudan University, Shanghai, China), Zichi Wang (Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China), Xinpeng Zhang (School of Computer Science, Fudan University, Shanghai, China), Guorui Feng (School of Communication and Information Engineering, Shanghai University, Shanghai, China)
Article 10
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree (pages 126-137)
Min Long (Changsha University of Science and Technology, Changsha, China), You Li (Changsha University of Science and Technology, Changsha, China), Fei Peng (Hunan University, Changsha, China)
Issue 2
Special Issue on Multimedia Security and Forensics
Guest Editorial Preface
Xianfeng Zhao (Chinese Academy of Sciences, Beijing, China)
Article 1
Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model (pages 1-12)
Xinyi Wang (Beijing University of Posts and Telecommunications, Beijing, China), Shaozhang Niu (Beijing University of Posts and Telecommunications, Beijing, China), Jiwei Zhang (Beijing University of Posts and Telecommunications, Beijing, China)
Article 2
A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications (pages 13-33)
Surekah Borra (K. S. Institute of Technology, Bengaluru, India), Rohit Thanki (C. U. Shah University, Wadhwan, India)
Article 3
Exploiting Routing Strategy of DTN for Message Forwarding in Information Hiding Applications (pages 34-46)
Shuangkui Xia (Wuhan University, Wuhan, China), Meihua Liu (Wuhan University, Wuhan, China), Xinchen Zhang (Huazhong Normal University Wuhan, China), Hong Sun (Wuhan University, Wuhan, China), Mao Tian (Wuhan University, Wuhan, China)
Article 4
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment (pages 47-62)
Xinchao Huang (School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China), Zihan Liu (School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China), Wei Lu (School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China), Hongmei Liu (School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China), Shijun Xiang (College of Information Science and Technology, Jinan University, Guangzhou, China.)
Article 5
CBC-Based Synthetic Speech Detection (pages 63-74)
Jichen Yang (School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China), Qianhua He (School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China), Yongjian Hu (School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China), Weiqiang Pan (Information and Network Engineering and Research Centre, South China University of Technology, Guangzhou, China)
Issue 3
Special Issue on Recent Advances in Cyber Security and Privacy for Cloud-of-Things
Guest Editorial Preface
Yassine Maleh (Hassan 1st University, Casablanca, Morocco), Ghita Mezzour (International University of Rabat, Rabat, Morocco), Marinella Petrocchi (Institute for Informatics and Telematics IIT, Pisa, Italy), Abdelkrim Haqiq (Hassan 1st University, Casablanca, Morocco)
Article 1
CloudIoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things (pages 1-22)
Junaid Latief Shah (Sri Pratap College Cluster University Srinagar, Srinagar, India), Heena Farooq Bhat (Department of Computer Science University of Kashmir, Srinagar, India), Asif Iqbal Khan (Department of Computer Science University of Kashmir, Srinagar, India)
Article 2
Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities: Computing Platforms for Platforms for Electric Vehicle Integration in Smart Cities (pages 23-42)
Md Muzakkir Hussain (Aligarh Muslim University, Aligarh, India), M.M. Sufyan Beg (Aligarh Muslim University, Aligarh, India), Mohammad Saad Alam (Aligarh Muslim University, Aligarh, India), Shahedul Haque Laskar (NIT SILCHAR, Silchar, India)
Article 3
Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform (pages 43-64)
S. J. Sheela (Siddaganga Institute of Technology, Tumakuru, India), K. V. Suresh (Siddaganga Institute of Technology, Tumakuru, India), Deepaknath Tandur (ABB, Bengaluru, India)
Article 4
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs (pages 65-89)
Vinayakumar R (Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India), Soman KP (Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India), Prabaharan Poornachandran (Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, India)
Article 5
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing (pages 90-102)
Khalid El Makkaoui (LAVETE Laboratory, FST, Univ Hassan 1, Settat, Morocco), Abderrahim Beni-Hssane (Department of Computer Science, Faculty of Sciences, Chouaïb Doukkali University, El Jadida, Morocco), Abdellah Ezzati (LAVETE Laboratory, FST, Univ Hassan 1, Settat, Morocco)
Issue 4
Article 1
A Highly Efficient Remote Access Trojan Detection Method (pages 1-13)
Wei Jiang (Beijing University of Technology, Chinese Academy of Cyberspace Studies, Beijing, China), Xianda Wu (Beijing University of Technology, Beijing, China), Xiang Cui (Guangzhou University, Guangzhou, China), Chaoge Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 2
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud (pages 14-27)
Dawei Xie (Shandong University, Jinan, China), Haining Yang (School of Mathematics, Shandong University, Jinan, China), Jing Qin (Shandong University, Jinan, China), Jixin Ma (Greenwich University, London, UK)
Article 3
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution (pages 28-49)
Mengmeng Zhang (Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China), Rongrong Ni (Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China), Yao Zhao (Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China)
Article 4
Performance Evaluation and Scheme Selection of Person Re-Identification Algorithms in Video Surveillance (pages 50-65)
Yu Lu (School of Information Science and Engineering, Shandong University, Qingdao, China), Lingchen Gu (School of Information Science and Engineering, Shandong University, Qingdao, China), Ju Liu (School of Information Science and Engineering, Shandong University, Qingdao, China), Peng Lan (School of Information Science and Engineering, Shandong Agricultural University, Tai'an, China)
Article 5
Steganalysis of AMR Based on Statistical Features of Pitch Delay (pages 66-81)
Yanpeng Wu (Xiamen Meiya Pico Information Co., Ltd., Xiamen, China), Huiji Zhang (Xiamen Meiya Pico Information Co., Ltd., Xiamen, China), Yi Sun (Xiamen Meiya Pico Information Co., Ltd., Xiamen, China), Minghui Chen (Xiamen Meiya Pico Information Co., Ltd., Xiamen, China)
Article 6
Applying Horner's Rule to Optimize Lightweight MDS Matrices (pages 82-96)
Jian Bai (Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China), Yao Sun (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Ting Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Dingkang Wang (Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China)
Article 7
A Novel Behavior Steganography Model Based on Secret Sharing (pages 97-117)
Hanlin Liu (National University of Defense Technology, Hefei, China), Jingju Liu (National University of Defense Technology, Hefei, China), Xuehu Yan (National University of Defense Technology, Hefei, China), Lintao Liu (National University of Defense Technology, Hefei, China), Wanmeng Ding (National University of Defense Technology, Hefei, China), Yue Jiang (National University of Defense Technology, Hefei, China)
Article 8
A New Kind of High Capacity and Security Reversible Data Hiding Scheme (pages 118-129)
Bin Ma (College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China), Xiao-Yu Wang (College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China), Bing Li (College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China)
Article 9
Analysis of WeChat Subscription Influence Based on Topic Diffusion (pages 130-148)
Cong Zhang (Beijing University of Posts and Telecommunications, Beijing, China), Yuan'An Liu (Beijing University of Posts and Telecommunications, Beijing, China), Fan Wu (Beijing University of Posts and Telecommunications, Beijing, China), Lidong Zhai (Institute of Computing Technology of the Chinese Academy of Sciences, Beijing, China), Hui Lu (Guangzhou University, Guangzhou, China)
Volume 10 (2018)
Issue 1
Article 1
Trust Evaluation Strategy for Single Sign-on Solution in Cloud (pages 1-11)
Guangxuan Chen (Zhejiang Police College, Institute of Software Application Technology, CAS, Guangzhou, China), Liping Ding (Digital Forensics Lab, Institute of Software Application Technology, CAS, Guangzhou, China), Jin Du (Digital Forensics Lab, Institute of Software Application Technology, CAS, Guangzhou, China), Guomin Zhou (Zhejiang Police College, Guangzhou, China), Panke Qin (Henan Polytechnic University, Jiaozuo, China), Guangxiao Chen (Universidad Carlos III de Madrid, Madrid, Spain), Qiang Liu (Zhejiang Police College, Guangzhou, China)
Article 2
Reliable Security Strategy for Message-Oriented Middleware (pages 12-23)
Guangxuan Chen (Zhejiang Police College, Institute of Software Application Technology, CAS, Guangzhou, China), Liping Ding (Digital Forensics Lab, Institute of Software Application Technology, CAS, Guangzhou, China), Guangxiao Chen (Universidad Carlos III de Madrid, Madrid, Spain), Panke Qin (Henan Polytechnic University, Jiaozuo, China)
Article 3
Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud (pages 24-39)
Hang Gao (College of Computer and Control Engineering, Nankai University, Tianjin, China), Mengting Hu (College of Computer and Control Engineering, Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Renhong Cheng (College of Computer and Control Engineering, Nankai University, Tianjin, China)
Article 4
Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System (pages 40-53)
Shun Zhang (College of Software, Nankai University, Tianjin, China), Liang Yang (College of Software, Nankai University, Tianjin, China), Xihao Xu (College of Software, Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Article 5
Geometrically Invariant Image Watermarking Using Histogram Adjustment (pages 54-66)
Zhuoqian Liang (College of Information Science and Technology, Jinan University, Guangzhou, China), Bingwen Feng (College of Information Science and Technology, Jinan University, Guangzhou, China), Xuba Xu (College of Information Science and Technology, Jinan University, Guangzhou, China), Xiaotian Wu (Department of Computer Science, Jinan University, Guangzhou, China, and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Tao Yang (Key Lab of Information Network Security, Ministry of Public Security, Shanghai, China)
Article 6
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression (pages 67-78)
Juan Chen (Department of Information Engineering, Hunan Engineering Polytechnic, Changsha, China), Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China)
Article 7
CVSS: A Cloud-Based Visual Surveillance System (pages 79-91)
Lei Zhou (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand), Yun Shu (Auckland University of Technology, Auckland, New Zealand), Jian Yu (Auckland University of Technology, Auckland, New Zealand)
Article 8
Evaluation of the Attack Effect Based on Improved Grey Clustering Model (pages 92-100)
Chen Yue (School of Information Technology and Network Security, People's Public Security University of China, Beijing, China), Lu Tianliang (Collaborative Innovation Center of Security and Law for Cyberspace, People's Public Security University of China, Beijing, China), Cai Manchun (Collaborative Innovation Center of Security and Law for Cyberspace, People's Public Security University of China, Beijing, China), Li Jingying (School of Information Technology and Network Security, People's Public Security University of China, Beijing, China)
Issue 2
Article 1
An Efficient Reversible Data Hiding Scheme for Encrypted Images (pages 1-22)
Kai Chen (School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo, China), Dawen Xu (School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo, China)
Article 2
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network (pages 23-39)
Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China), Fei Peng (School of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Xiaoqing Gong (School of Computer Science and Electronic Engineering, Hunan University, Changsha, China)
Article 3
Reversible Watermarking in Digital Image Using PVO and RDWT (pages 40-55)
Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China), Yonglei Liu (School of Electric and Information Engineering, Tianjin University, Tianjin, China)
Article 4
Progressive Scrambling for Social Media (pages 56-73)
Wei Qi Yan (Department of Computer Science, Auckland University of Technology, Auckland, New Zealand), Xiaotian Wu (Department of Computer Science, Jinan University, Guangzhou, China, and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Feng Liu (State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences Beijing, China)
Article 5
Detecting the Use of Anonymous Proxies (pages 74-94)
Jonathan McKeague (Ulster University, Londonderry, United Kingdom), Kevin Curran (Faculty of Computing and Engineering, Ulster University, Londonderry, United Kingdom)
Article 6
Advances in Digital Forensics Frameworks and Tools: A Comparative Insight and Ranking (pages 95-119)
Muhammad Abulaish (Department of Computer Science, South Asian University, New Delhi, India), Nur Al Hasan Haldar (Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia)
Article 7
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery (pages 120-136)
Wanmeng Ding (National University of Defense Technology,Hefei,China), Kesheng Liu (National University of Defense Technology,Hefei,China), Xuehu Yan (National University of Defense Technology,Hefei,China), Lintao Liu (National University of Defense Technology,Hefei,China)
Article 8
Fraud Track on Secure Electronic Check System (pages 137-144)
Ping Zhang (Guangdong Police College, Guangzhou, China), Yijun He (Computer Science and Technology, East China University of Political Science and Law, Shanghai, China), Kam-Pui Chow (Department of Computer Science, The University of Hong Kong, Hong Kong, Hong Kong)
Issue 3
Article 1
Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation (pages 1-14)
Sun Yuting (Tianjin Polytechnic University, Tianjin, China), Guo Jing (Tianjin Polytechnic University, Tianjin, China), Du Ling (Tianjin Polytechnic University, Tianjin, China), Ke Yongzhen (Tianjin Polytechnic University, Tianjin, China)
Article 2
Models for the Detection of Malicious Intent People in Society (pages 15-26)
Preetish Ranjan (Indian Institute of Information Technology, Allahabad, India), Vrijendra Singh (Indian Institute of Information Technology, Allahabad, India), Prabhat Kumar (National Institute of Technology, Patna, India), Satya Prakash (Indian Institute of Information Technology, Allahabad, India)
Article 3
Survey on the Indoor Localization Technique of Wi-Fi Access Points (pages 27-42)
Yimin Liu (Zhengzhou Science and Technology Institute, China), Wenyan Liu (Zhengzhou Science and Technology Institute, China), Xiangyang Luo (Zhengzhou Science and Technology Institute, China)
Article 4
Visual Gambling (pages 43-49)
Teng Guo (School of Information Science and Technology, University of International Relations, Beijing, China), Feng Liu (State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China), Wen Wang (State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China)
Article 5
Real-Time Recognition of Series Seven New Zealand Banknotes (pages 50-65)
Yueqiu Ren (Department of Computer Science, Auckland University of Technology, Auckland, New Zealand), Minh Nguyen (Department of Computer Science, Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Department of Computer Science, Auckland University of Technology, Auckland, New Zealand)
Article 6
Image Secret Sharing Construction for General Access Structure with Meaningful Share (pages 66-77)
Xuehu Yan (National University of Defense Technology, China), Yuliang Lu (National University of Defense Technology, China), Lintao Liu (National University of Defense Technology, China), Duohe Ma (Institute of Information Engineering, Chinese Academy of Sciences, China)
Article 7
An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size (pages 78-94)
Peng Li (Department of Mathematics and Physics, North China Electric Power University, China), Zuquan Liu (Department of Mathematics and Physics, North China Electric Power University, Baoding, China)
Article 8
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control (pages 1-19)
Fan Wu (Beijing University of Posts and Telecommunications, Beijing, China), Ran Sun (Beijing University of Posts and Telecommunications, Beijing, China), Wenhao Fan (Beijing University of Posts and Telecommunications, Beijing, China), Yuan'An Liu (Beijing University of Posts and Telecommunications, Beijing, China), Feng Liu (State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China), Feng Liu (University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China), Hui Lu (Guangzhou University, Guangzhou, China)
Issue 4
Article 1
Fingerprint Image Hashing Based on Minutiae Points and Shape Context (pages 1-20)
Sani M. Abdullahi (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Asad Malik (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 2
An Improved Encryption Scheme for Traitor Tracing from Lattice (pages 21-35)
Qing Ye (College of Computer Sciences and Technology, Henan Polytechnic University, Jiaozuo, China), Mingxing Hu (College of Computer Sciences and Technology, Henan Polytechnic University, Jiaozuo, China), Guangxuan Chen (Institute of Software Application Technology, Guangzhou & CAS; Zhejiang Police College, Hangzhou, China), Panke Qin (College of Computer Sciences and Technology, Henan Polytechnic University, Jiaozuo, China)
Article 3
Evaluation Method of Public Transportation System Based on Fuzzy Cloud Model (pages 36-51)
Min Tu (Department of Security Management, Jiangxi Police Institute, Nanchang, 330103, China), Shiyang Xu (Software College, Nanchang University, Nanchang, 330047, China), Jianfeng Xu (Software College, Nanchang University, Nanchang, 330047, China)
Article 4
Keyframe-Based Vehicle Surveillance Video Retrieval (pages 52-61)
Xiaoxi Liu (School of Information Science and Engineering, Shandong University, Qingdao, China), Ju Liu (School of Information Science and Engineering, Shandong University, Qingdao, China), Lingchen Gu (School of Information Science and Engineering, Shandong University, Qingdao, China), Yannan Ren (School of Information Science and Engineering, Shandong University, Qingdao, China)
Article 5
Using Weighted Similarity to Assess Risk of Illegal Fund Raising in Online P2P Lending (pages 62-79)
Jianying Xiong (JiangXi Police Institute, Nanchang, China), Min Tu (Jiangxi police Institute, Nanchang, China), Ying Zhou (JiangXi Police Institute, Nanchang, China)
Article 6
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling (pages 80-89)
Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China), Shuai-ping Wang (Hunan University, Changsha, China), Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China)
Article 7
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain (pages 90-107)
Ruxin Wang (School of Data and Computer Science, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China), Wei Lu (School of Data and Computer Science, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China), Jixian Li (School of Data and Computer Science, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China), Shijun Xiang (College of Information Science and Technology, Jinan University, Guangzhou, China), Xianfeng Zhao (The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jinwei Wang (School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China)
Article 8
A Framework for Dark Web Threat Intelligence Analysis (pages 108-117)
Xuan Zhang (Criminal Investigation Department of Shandong Police College, Jinan, China), KP Chow (Department of Computer Science University of Hong Kong, Hong Kong, China)
Article 9
A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images (pages 118-139)
Xiaojuan Dong (CAS Key Laboratory of Electro-magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Weiming Zhang (CAS Key Laboratory of Electro-magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Xianjun Hu (CAS Key Laboratory of Electro-magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China), Keyang Liu (CAS Key Laboratory of Electro-magnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China)
Article 10
Copy-Move Forgery Localization Using Convolutional Neural Networks and CFA Features (pages 140-155)
Lu Liu (Institute of Information Science, Beijing Jiaotong University, Beijing, China), Yao Zhao (Institute of Information Science, Beijing Jiaotong University, Beijing, China), Rongrong Ni (Institute of Information Science, Beijing Jiaotong University, Beijing, China), Qi Tian (Department of Computer Science, University of Texas at San Antonio, San Antonio, US)
Volume 9 (2017)
Issue 1
Article 1
Age Detection Through Keystroke Dynamics from User Authentication Failures (pages 1-16)
Ioannis Tsimperidis (Democritus University of Thrace, Komotini, Greece), Shahin Rostami (Bournemouth University, Poole, UK), Vasilios Katos (Bournemouth University, Poole, UK)
Article 2
Investigation Approach for Network Attack Intention Recognition (pages 17-38)
Abdulghani Ali Ahmed (Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Gambang, Malaysia)
Article 3
A Framework of Event-Driven Traffic Ticketing System (pages 39-50)
Jia Wang (Auckland University of Technology, Auckland, New Zealand), Minh Ngueyn (Auckland University of Technology, Auckland, New Zealand), Weiqi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS (pages 51-70)
Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Article 5
Proposed Round Robin CIA Pattern on RTS for Risk Assessment (pages 71-85)
Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Issue 2
Article 1
Speech Content Authentication Scheme based on High-Capacity Watermark Embedding (pages 1-14)
Fang Sun (Xinyang Normal University, College of Computer and Information Technology, Xinyang Henan, China), Zhenghui Liu (Xinyang Normal University, College of Computer and Information Technology, Xinyang Henan, China), Chuanda Qi (Xinyang Normal University, College of Mathematics and Information Science, Xinyang Henan, China)
Article 2
Deception Detection by Hybrid-Pair Wireless fNIRS System (pages 15-24)
Hong Di (University of International Relations, Department of Information Science and Technology, Beijing, China), Xin Zhang (Chinese Academy of Sciences, Institute of Automation, Beijing, China)
Article 3
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping (pages 25-37)
Juan Chen (Hunan Engineering Polytechnic, Department of Information Engineering, Changsha, China), Fei Peng (Hunan University, School of Computer Science and Electronic Engineering, Changsha, China), Jie Li (Hunan University, School of Computer Science and Electronic Engineering, Changsha, China), Min Long (Changsha University of Science and Technology, College of Computer and Communication Engineering, Changsha, China)
Article 4
On the Pixel Expansion of Visual Cryptography Scheme (pages 38-44)
Teng Guo (University of International Relations, School of Information Science and Technology, Beijing, China), Jian Jiao (University of International Relations, School of Information Science and Technology, Beijing, China), Feng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Wen Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 5
Exploiting the Homomorphic Property of Visual Cryptography (pages 45-56)
Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China), Song Wan (Hefei Electronic Engineering Institute, Hefei, China), Wanmeng Ding (Hefei Electronic Engineering Institute, Hefei, China), Hanlin Liu (Hefei Electronic Engineering Institute, Hefei, China)
Issue 3
Article 1
A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS (pages 1-10)
Xin Liu (Harbin Institute of Technology, Harbin, China & Harbin University of Science and Technology, Harbin, China), Shen Wang (Harbin Institute of Technology, Harbin, China), Jianzhi Sang (Harbin Institute of Technology, Harbin, China), Weizhe Zhang (School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China)
Article 2
An Empirical Study for Human Behavior Analysis (pages 11-27)
Jia Lu (Auckland University of Technology, Auckland, New Zealand), Jun Shen (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand), Boris Bačić (Auckland University of Technology, Auckland, New Zealand)
Article 3
A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean (pages 28-37)
Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Song Wan (Hefei Electronic Engineering Institute, Hefei, China)
Article 4
A Novel Visual Secret Sharing Scheme Based on QR Codes (pages 38-48)
Song Wan (Hefei Electronic Engineering Institute, Hefei, China), Yuliang Lu (Hefei Electronic Engineering Institute, Hefei, China), Xuehu Yan (Hefei Electronic Engineering Institute, Hefei, China), Lintao Liu (Hefei Electronic Engineering Institute, Hefei, China)
Article 5
A Knowledge Model of Digital Evidence Review Elements Based on Ontology (pages 49-57)
Ning Wang (Hubei University of Police, Wuhan, China)
Article 6
The State-of-the-Art Technology of Currency Identification: A Comparative Study (pages 58-72)
Guangyu Wang (Auckland University of Technology, Auckland, New Zealand), Xiaotian Wu (Jinan University, Guangzhou, China & State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), WeiQi Yan (Auckland University of Technology, School of Computer and Mathematical Sciences, Auckland, New Zealand)
Issue 4
Article 1
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics (pages 1-14)
Jie Zhu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Qingxiao Guan (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Xianfeng Zhao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Yun Cao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Gong Chen (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
Article 2
Performance Evaluation and Scheme Selection of Shot Boundary Detection and Keyframe Extraction in Content-Based Video Retrieval (pages 15-29)
Lingchen Gu (Shandong University, School of Information Science and Engineering, Jinan, China), Ju Liu (Shandong University, School of Information Science and Engineering, Jinan, China), Aixi Qu (Shandong University, School of Information Science and Engineering, Jinan, China)
Article 3
Research on Digital Forensics Based on Uyghur Web Text Classification (pages 30-39)
Yasen Aizezi (Xinjiang Police college, Urumqi, China), Anwar Jamal (Xinjiang Police College, Urumqi, China), Ruxianguli Abudurexiti (Xinjiang Police College, Urumqi, China), Mutalipu Muming (Xinjiang Police College, Urumqi, China)
Article 4
A Cyber Crime Investigation Model Based on Case Characteristics (pages 40-47)
Zhi Jun Liu (Hubei University of Police, Hubei, China)
Article 5
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation (pages 48-61)
Zhe Chen (University of Electronic Science and Technology of China, Chengdu, China), Jicang Lu (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Pengfei Yang (Zhengzhou Information Science and Technology Institute, Zhengzhou, China), Xiangyang Luo (Zhengzhou Information Science and Technology Institute, Zhengzhou, China)
Article 6
Exploring Defense of SQL Injection Attack in Penetration Testing (pages 62-71)
Alex Zhu (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, School of Computer and Mathematical Sciences, Auckland, New Zealand)
Volume 8 (2016)
Issue 1
Article 1
Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps (pages 1-25)
Nana Wang (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China)
Article 2
A Scheme for Face Recognition in Complex Environments (pages 26-36)
Wei Cui (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 3
A Hybrid NIDS Model Using Artificial Neural Network and D-S Evidence (pages 37-50)
Chunlin Lu (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Yue Li (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Mingjie Ma (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Na Li (Institute of China Mobile Communication Company Limited, Beijing, China)
Article 4
Detection of Seam-Carving Image Based on Benford's Law for Forensic Applications (pages 51-61)
Guorui Sheng (School on Information and Electronical Engineering, Ludong University, Yantai, China), Tiegang Gao (College of Software, Information Security Technology Lab, Nankai University, Tianjin, China)
Issue 2
Article 1
On More Paradigms of Steganalysis (pages 1-15)
Xianfeng Zhao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jie Zhu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Haibo Yu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 2
Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems (pages 16-26)
Zhihai Yang (Xi'an Jiaotong University, Xi'an, China), Zhongmin Cai (Xi'an Jiaotong University, Xi'an, China)
Article 3
Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length (pages 27-35)
Liang Yang (Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Yan Xuan (Nankai University, Tianjin, China), Hang Gao (Nankai University, Tianjin, China)
Article 4
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling (pages 36-47)
Ping Wang (Zhengzhou Science and Technology Institute, Zhengzhou, China), Xiangyang Luo (Science and Technology on Information Assurance Laboratory, Beijing, China), Chunfang Yang (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China), Fenlin Liu (Zhengzhou Science and Technology Institute, Zhengzhou, China)
Article 5
An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting (pages 48-61)
Yuan-Yu Tsai (Department of M-Commerce and Multimedia Applications, Asia University and Department of Medical Research, China Medical University Hospital, Taichung, Taiwan), Yao-Hsien Huang (Department of Information Technology and Management, Shih Chien University, Taipei, Taiwan), Ruo-Jhu Lin (Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan), Chi-Shiang Chan (Department of M-Commerce and Multimedia Applications, Asia University and Department of Medical Research, China Medical University Hospital, Taichung, Taiwan)
Issue 3
Article 1
Design of Mobile Botnet Based on Open Service (pages 1-10)
Fenggang Sun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lidong Zhai (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Yuejin Du (Alibaba Group, Beijing, China), Peng Wang (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Jun Li (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China)
Article 2
A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence (pages 11-33)
Gyu-Sang Cho (Dongyang University, Youngju, Republic of Korea)
Article 3
BP-Neural Network for Plate Number Recognition (pages 34-45)
Jia Wang (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Tampering Localization in Double Compressed Images by Investigating Noise Quantization (pages 46-62)
Archana Vasant Mire (Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India), Sanjay B. Dhok (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India), Naresh J. Mistry (Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India), Prakash D. Porey (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India)
Article 5
X_myKarve: Non-Contiguous JPEG File Carver (pages 63-84)
Nurul Azma Abdullah (Universiti Tun Hussein Onn Malaysia, Batu Pahat, Malaysia), Kamaruddin Malik Mohamad (Universiti Tun Hussein Onn Malaysia, Batu Pahat, Malaysia), Rosziati Ibrahim (Universiti Tun Hussein Onn Malaysia, Batu Pahat, Malaysia), Mustafa Mat Deris (Universiti Tun Hussein Onn Malaysia, Batu Pahat, Malaysia)
Article 6
Basic Visual Cryptography Using Braille (pages 85-93)
Guangyu Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and Auckland University of Technology, Auckland, New Zealand), Feng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Wei Qi Yan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and Auckland University of Technology, Auckland, New Zealand)
Issue 4
Article 1
Exploration of Web Page Structural Patterns Based on Request Dependency Graph Decomposition (pages 1-13)
Cheng Fang (Beijing University of Post and Telecommunications, Beijing, China), Bo Ya Liu (Beijing University of Post and Telecommunications, Beijing, China)
Article 2
An Overview on Passive Image Forensics Technology for Automatic Computer Forgery (pages 14-25)
Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China), Qiuzi Wang (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Jichang Guo (School of Electronic Information Engineering, Tianjin University, Tianjin, China), Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Fusheng Yang (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China)
Article 3
Cross Models for Twin Recognition (pages 26-36)
Datong Gu (Auckland University of Technology, Auckland, New Zealand), Minh Nguyen (Auckland University of Technology, Auckland, New Zealand), Weiqi Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
Squint Pixel Steganography: A Novel Approach to Detect Digital Crimes and Recovery of Medical Images (pages 37-47)
Rupa Ch. (V. R. Siddhartha Engineering College, Vijayawada, India)
Volume 7 (2015)
Issue 1
Article 1
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices (pages 1-25)
Xuejiao Wan (School of Software Engineering, Beijing University of Technology, Beijing, China), Jingsha He (School of Software Engineering, Beijing University of Technology, Beijing, China), Gongzheng Liu (School of Software Engineering, Beijing University of Technology, Beijing, China), Na Huang (School of Software Engineering, Beijing University of Technology, Beijing, China), Xingye Zhu (School of Software Engineering, Beijing University of Technology, Beijing, China), Bin Zhao (School of Software Engineering, Beijing University of Technology, Beijing, China), Yonghao Mai (Electronic Forensics Laboratory, Hubei University of Police, Hubei, China)
Article 2
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions (pages 26-50)
S. Manimurugan (Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India), C. Narmatha (Department of Electronics and Communication Engineering, Karpagam University, Coimbatore, India)
Article 3
Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography (pages 51-68)
Yuanfang Guo (HKUST, Hong Kong SAR, China), Oscar C. Au (HKUST, Hong Kong SAR, China), Ketan Tang (HKUST, Hong Kong SAR, China)
Article 4
Analysis of a Secure Virtual Desktop Infrastructure System (pages 69-84)
Yi Jie Tong (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand), Jin Yu (Auckland University of Technology, Auckland, New Zealand)
Issue 2
Article 1
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends (pages 1-19)
Muhammad Faheem (University College Dublin, Dublin, Ireland), Tahar Kechadi (School of Computer Science & Informatics, University College Dublin, Dublin, Ireland), Nhien An Le-Khac (University College Dublin, Dublin, Ireland)
Article 2
Visual Secret Sharing Without Pixel Expansion (pages 20-30)
Ali Makki Sagheer (Information Systems Department, University of Anbar, Ramadi, Iraq), Laith Hamid Abed (Computer Systems Department, Anbar Technical Institute, Middle Technical University, Fallujha, Anbar, Iraq)
Article 3
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot (pages 31-52)
Ifeyinwa Eucharia Achumba (Federal University of Technology, Owerri, Nigeria), Kennedy Chinedu Okafor (Federal University of Technology, Owerri, Nigeria), Gloria N. Ezeh (Federal University of Technology, Owerri, Nigeria), Uchenna Hermes Diala (Federal University of Technology, Owerri, Nigeria)
Article 4
MapExif: An Image Scanning and Mapping Tool for Investigators (pages 53-78)
Lionel Prat (French Gendarmerie Forensics Research Institute (IRCGN), Rosny-sous-Bois, France), Cheryl Baker (University College Dublin, Dublin, Ireland), Nhien An Le-Khac (University College Dublin, Dublin, Ireland)
Issue 3
Article 1
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization (pages 1-18)
Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China), Yan Liu (Hunan University, Changsha, China), Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China)
Article 2
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform (pages 19-36)
Fan Zhang (Xinyang Normal University, Xinyang, China), Zhenghui Liu (Xinyang Normal University, Xinyang, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 3
A Novel Cue based Picture Word Shape Character Password Creation Scheme (pages 37-59)
Kevin Curran (Ulster University, Londonderry, UK), Andrew Snodgrass (Ulster University, Londonderry, UK)
Article 4
Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication (pages 60-80)
Nana Wang (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China), Xiangjun Zhao (School of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China), Han Zhang (Computer and Information Engineering Department, Heze University, Heze, China)
Issue 4
Article 1
Reversible Watermarking in Medical Image Using RDWT and Sub-Sample (pages 1-18)
Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Jie Zhao (School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China)
Article 2
Semantic System for Attacks and Intrusions Detection (pages 19-32)
Abdeslam El Azzouzi (Abdelmalek Essaâdi University, Tetuan, Morocco), Kamal Eddine El Kadiri (Abdelmalek Essaâdi University, Tetuan, Morocco)
Article 3
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting (pages 33-54)
Archana V. Mire (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India), Sanjay B. Dhok (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India), Narendra. J. Mistry (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India), Prakash D. Porey (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India)
Article 4
Evaluations of Image Degradation from Multiple Scan-Print (pages 55-65)
Abhimanyu Singh Garhwal (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Volume 6 (2014)
Issue 1
Article 1
On the Generalization Power of Face and Gait in Gender Recognition (pages 1-8)
Yu Guan (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Xingjie Wei (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Chang-Tsun Li (Department of Computer Science, University of Warwick, Warwick, Coventry, UK)
Article 2
Ruler Detection for Autoscaling Forensic Images (pages 9-27)
Abhir Bhalerao (Department of Computer Science, University of Warwick, Warwick, Coventry, UK), Gregory Reynolds (Pattern Analytics Research Ltd, Solihull, UK)
Article 3
Attack Graph Analysis for Network Anti-Forensics (pages 28-50)
Rahul Chandran (Auckland University of Technology, Auckland, New Zealand), Wei Q. Yan (Auckland University of Technology, Auckland, New Zealand)
Article 4
A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification (pages 51-64)
Shun Zhang (College of Software, Nankai University, Nankai, Tianjin, China), Tie-gang Gao (College of Software, Nankai University, Nankai, Tianjin, China), Fu-sheng Yang (College of Software, Nankai University, Nankai, Tianjin, China)
Issue 2
Article 1
A Novel Medical Image Tamper Detection and Recovery Scheme using LSB Embedding and PWLCM (pages 1-22)
Lin Gao (College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Article 2
Detection of Content-Aware Image Resizing for Forensic Applications (pages 23-39)
Guorui Sheng (College of Information and Electric Engineering, LuDong University, YanTai, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China), Shun Zhang (College of Software, Nankai University, Tianjin, China)
Article 3
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles (pages 40-51)
Xie Li (School of Communication and Information Engineering, Shanghai University, Shanghai, China), Ren Yanli (School of Communication and Information Engineering, Shanghai University, Shanghai, China)
Article 4
GPU-Based MPEG-2 to Secure Scalable Video Transcoding (pages 52-69)
Yueyun Shang (South Central University for Nationalities, Wuhan, China), Dengpan Ye (Wuhan University, Wuhan, China), Zhuo Wei (Singapore Management University, Singapore), Yajuan Xie (Nanyang Technological University, Singapore)
Issue 3
Article 1
Optimizing Non-Local Pixel Predictors for Reversible Data Hiding (pages 1-15)
Xiaocheng Hu (School of Information Science and Technology, University of Science and Technology of China, Hefei, China), Weiming Zhang (School of Information Science and Technology, University of Science and Technology of China, Hefei, China), Nenghai Yu (School of Information Science and Technology, University of Science and Technology of China, Hefei, China)
Article 2
Reversible Data Hiding in Encrypted Images Based on Image Interpolation (pages 16-29)
Xiyu Han (Shanghai University, Shanghai, China), Zhenxing Qian (Shanghai University, Shanghai, China), Guorui Feng (Shanghai University, Shanghai, China), Xinpeng Zhang (Shanghai University, Shanghai, China)
Article 3
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication (pages 30-46)
Jia-Hong Li (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan), Tzung-Her Chen (Department of Computer Science and Information Engineering, National Chiayi University, Chia-Yi City, Taiwan), Wei-Bin Lee (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan)
Article 4
Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding (pages 47-63)
Shun Zhang (College of Software, Nankai University, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Issue 4
Article 1
Reversible Data Hiding for DNA Sequences and Its Applications (pages 1-13)
Qi Tang (School of Information Science, University of Science and Technology of China, Hefei, China), Guoli Ma (School of Information Science, University of Science and Technology of China, Hefei, China), Weiming Zhang (School of Information Science, University of Science and Technology of China, Hefei, China), Nenghai Yu (School of Information Science, University of Science and Technology of China, Hefei, China)
Article 2
Robust Reversible Data Hiding Scheme Based on Gravity Center Difference (pages 14-33)
Qunting Yang (College of Air Traffic Management, Civil Aviation University of China, Tianjin, China), Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Article 3
A Methodological Review on Copy-Move Forgery Detection for Image Forensics (pages 34-49)
Resmi Sekhar (Lourdes Matha College of Science and Technology, Thiruvananthapuram, India), R. S. Shaji (Noorul Islam University, Thuckalay, India)
Article 4
An Overview of Penetration Testing (pages 50-74)
Chiem Trieu Phong (Auckland University of Technology, Auckland, New Zealand), Wei Qi Yan (Auckland University of Technology, Auckland, New Zealand)
Volume 5 (2013)
Issue 1
Article 1
A Review of Current Research in Network Forensic Analysis (pages 1-26)
Ikuesan R. Adeyemi (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia), Shukor Abd Razak (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia), Nor Amira Nor Azhan (Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia)
Article 2
On the Reliability of Cryptopometry (pages 27-38)
Thomas Martin (Information Security Program, Khalifa University, Abu Dhabi, UAE), Laurence O’Toole (Information Security Group, Royal Holloway, University of London, London, UK), Andrew Jones (Information Security Program, Khalifa University, Abu Dhabi, UAE)
Article 3
Detecting Pornographic Images by Localizing Skin ROIs (pages 39-53)
Sotiris Karavarsamis (Artificial Intelligence and Information Analysis Group, Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece), Nikos Ntarmos (School of Computing Science, University of Glasgow, Glasgow, Scotland), Konstantinos Blekas (Department of Computer Science, University of Ioannina, Ioannina, Greece), Ioannis Pitas (Artificial Intelligence and Information Analysis Group, Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece)
Article 4
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels (pages 54-69)
Bilal Shebaro (Department of Computer Science, University of New Mexico, Albuquerque, NM, USA), Fernando Pérez-González (Signal Theory and Communications Department, University of Vigo, Vigo, Pontevedra, Spain), Jedidiah R. Crandall (Department of Computer Science, University of New Mexico, Albuquerque, NM, USA)
Issue 2
Article 1
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach (pages 1-22)
Benjamin Aziz (School of Computing, University of Portsmouth, Portsmouth, UK), Clive Blackwell (Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK), Shareeful Islam (School of Architecture, Computing and Engineering, University of East London, London, UK)
Article 2
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters (pages 23-34)
Min Long (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China), Hao Wang (School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China)
Article 3
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System (pages 35-49)
Fei Peng (School of Information Science and Engineering, Hunan University, Changsha, China), Xiao-wen Zhu (School of Information Science and Engineering, Hunan University, Changsha, China), Min Long (College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China)
Article 4
E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents (pages 50-62)
Selvi Salome Gnasigamoney (School of Business Infrastructure, Infrastructure University Kuala Lumpur, Kajang, Malaysia), Manjit Singh Sidhu (Department of Graphics and Multimedia, College of Information Technology, University Tenaga Nasional (UNITEN), Selangor, Malaysia)
Computer Forensics: Cybercriminals, Laws, and Evidence
Book Review
Szde Yu (Department of Criminal Justice, Wichita State University, Wichita, KS, USA)
Issue 3
Article 1
Bitstream-Based JPEG Encryption in Real-time (pages 1-14)
Stefan Auer (Salzburg University of Applied Sciences, Salzburg, Austria), Alexander Bliem (Salzburg University of Applied Sciences, Salzburg, Austria), Dominik Engel (Salzburg University of Applied Sciences, Salzburg, Austria), Andreas Uhl (Department of Computer Sciences, University of Salzburg, Salzburg, Austria), Andreas Unterweger (Department of Computer Sciences, University of Salzburg, Salzburg, Austria)
Article 2
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain (pages 15-34)
Zhenghui Liu (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Article 3
A Universal Attack Against Histogram-Based Image Forensics (pages 35-52)
Mauro Barni (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Marco Fontani (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Benedetta Tondi (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy)
Article 4
Anti-Forensics for Unsharp Masking Sharpening in Digital Images (pages 53-65)
Lu Laijie (School of Information Science and Engineering, Hunan University, Changsha, China), Yang Gaobo (School of Information Science and Engineering, Hunan University, Changsha, China), Xia Ming (School of Information Science and Engineering, Hunan University, Changsha, China, & College of Electrical & Information Engineering, Southwest University for Nationalities, Chengdu, China)
Issue 4
Article 1
Telephone Handset Identification by Collaborative Representations (pages 1-14)
Yannis Panagakis (Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece), Constantine Kotropoulos (Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece)
Article 2
A Forensic Tool for Investigating Image Forgeries (pages 15-33)
Marco Fontani (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy), Tiziano Bianchi (Department of Electronics and Telecommunications, Politecnico di Torino, Torino, Italy), Alessia De Rosa (National Inter-University Consortium for Telecommunications, University of Florence, Firenze, Italy), Alessandro Piva (Department of Information Engineering, University of Florence, Firenze, Italy), Mauro Barni (Department of Information Engineering and Mathematical Sciences, University of Siena, Siena, Italy)
Article 3
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data (pages 34-54)
Panagiotis Andriotis (University of Bristol, Bristol, UK), Zacharias Tzermias (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), Anthi Mparmpaki (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), Sotiris Ioannidis (Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece), George Oikonomou (University of Bristol, Bristol, UK)
Article 4
Audio Watermarking Scheme Using IMFs and HHT for Forensic Applications (pages 55-67)
Saif alZahir (Department of Computer Science, University of Northern British Columbia, Prince George, Canada), Md Wahedul Islam (Department of Computer Science, University of Northern British Columbia, Prince George, Canada)
Volume 4 (2012)
Issue 1
Article 1
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features (pages 1-16)
Fei Peng (Hunan University, China), Juan Liu (Hunan University, China), Min Long (Changsha University of Science and Technology, China)
Article 2
Spam 2.0 State of the Art (pages 17-36)
Pedram Hayati (Curtin University, Australia), Vidyasagar Potdar (Curtin University, Australia)
Article 3
A Study on Embedding Efficiency of Matrix Encoding (pages 37-48)
Lifang Yu (Beijing Jiaotong University, China), Yun Q. Shi (New Jersey Institute of Technology, USA), Yao Zhao (Beijing Jiaotong University, China), Rongrong Ni (Beijing Jiaotong University, China), Gang Cao (Beijing Jiaotong University, China)
Article 4
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection (pages 49-62)
Likai Chen (Sun Yat-sen University, China), Wei Lu (Sun Yat-sen University, China), Jiangqun Ni (Sun Yat-sen University, China)
Issue 2
Article 1
The Need for Digital Evidence Standardisation (pages 1-12)
Marthie Grobler (Council for Scientific and Industrial Research, and University of Johannesburg, South Africa)
Article 2
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients (pages 13-27)
Chang Wang (Sun Yat-sen University, China), Jiangqun Ni (Sun Yat-sen University, China), Chuntao Wang (South China Agricultural University, China), Ruiyu Zhang (Sun Yat-sen University, China)
Article 3
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics (pages 28-48)
George Grispos (University of Glasgow, Scotland), Tim Storer (University of Glasgow, Scotland), William Bradley Glisson (University of Glasgow, Scotland)
Article 4
Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval (pages 49-69)
Wei Sun (Zhejiang University, China), Zhe-Ming Lu (Zhejiang University, China), Fa-Xin Yu (Zhejiang University, China), Rong-Jun Shen (Zhejiang University, China)
Issue 3
Article 1
Fingerprint Liveness Detection Based on Fake Finger Characteristics (pages 1-19)
Gian Luca Marcialis (University of Cagliari, Italy), Pietro Coli (University of Cagliari, Italy), Fabio Roli (University of Cagliari, Italy)
Article 2
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery (pages 20-32)
Yongjian Hu (University of Warwick, UK, & South China University of Technology, China), Chang-Tsun Li (University of Warwick, UK), Yufei Wang (South China University of Technology, China), Bei-bei Liu (South China University of Technology, China)
Article 3
A Comprehensive Survey of Event Analytics (pages 33-46)
T. Gidwani (AUT University, New Zealand), M. J. Argano (AUT University, New Zealand), W. Yan (AUT University, New Zealand), F. Issa (AUT University, New Zealand)
Article 4
Issue 4
Article 1
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations (pages 1-14)
Lynn Batten (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia), Lei Pan (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia), Nisar Khan (Faculty of Science and Technology, School of IT, Deakin University, Burwood, Melbourne, VIC, Australia)
Article 2
A Framework for the Forensic Analysis of User Interaction with Social Media (pages 15-30)
John Haggerty (School of Computing, Science and Engineering, University of Salford, Manchester, UK), Mark C. Casson (Henley Business School, University of Reading, Reading, UK), Sheryllynne Haggerty (School of Humanities, University of Nottingham, Nottingham, UK), Mark J. Taylor (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK)
Article 3
Pypette: A Platform for the Evaluation of Live Digital Forensics (pages 31-46)
Brett Lempereur (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Madjid Merabti (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Qi Shi (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK)
Article 4
A Model for Hybrid Evidence Investigation (pages 47-62)
Konstantinos Vlachopoulos (Department of Informatics, Ionian University, Corfu, Greece), Emmanouil Magkos (Department of Informatics, Ionian University, Corfu, Greece), Vassileios Chrissikopoulos (Department of Informatics, Ionian University, Corfu, Greece)
Volume 3 (2011)
Issue 1
Article 1
On the Performance of Li’s Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations (pages 1-13)
Ahmad Ryad Soobhany (Keele University and Forensic Pathways Ltd., UK), Richard Leary (Forensic Pathways Ltd., UK), KP Lam (Keele University, UK)
Article 2
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks (pages 14-36)
Antonis Michalas (Athens Information Technology, Greece), Nikos Komninos (Athens Information Technology, Greece), Neeli R. Prasad (Aalborg University, Denmark)
Article 3
Microsoft Excel File: A Steganographic Carrier File (pages 37-52)
Rajesh Kumar Tiwari (GLA Institute of Technology & Management, India), G. Sahoo (BIT Mesra, India)
Article 4
An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM (pages 53-69)
Fei Peng (Hunan University, China), Yu-Zhou Lei (Hunan University, China)
Issue 2
Article 1
An Approach for Hand Vein Representation and Indexing (pages 1-15)
D S Guru (University of Mysore, India), K B Nagasundara (University of Mysore, India), S Manjunath (University of Mysore, India), R Dinesh (LG Soft India Limited, India)
Article 2
Towards the Ordering of Events from Multiple Textual Evidence Sources (pages 16-34)
Sarabjot Singh Anand (University of Warwick, UK), Arshad Jhumka (University of Warwick, UK), Kimberley Wade (University of Warwick, UK)
Article 3
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features (pages 35-40)
Fei Peng (Hunan University, China), Honglin Li (Hunan University, China)
Article 4
An Enhanced Fuzzy ARM Approach for Intrusion Detection (pages 41-61)
Nasser S. Abouzakhar (The University of Hertfordshire, UK), Huankai Chen (The University of Hertfordshire, UK), Bruce Christianson (The University of Hertfordshire, UK)
Issue 3
Article 1
A Framework for the Forensic Investigation of Unstructured Email Relationship Data (pages 1-18)
John Haggerty (University of Salford, UK), Alexander J. Karran (Liverpool John Moores University, UK), David J. Lamb (Liverpool John Moores University, UK), Mark Taylor (Liverpool John Moores University, UK)
Article 2
Requirements for a Forensically Ready Cloud Storage Service (pages 19-36)
Theodoros Spyridopoulos (Democritus University of Thrace, Greece), Vasilios Katos (Democritus University of Thrace, Greece)
Article 3
LUARM: An Audit Engine for Insider Misuse Detection (pages 37-49)
G. Magklaras (University of Plymouth, UK), S. Furnell (University of Plymouth, UK), M. Papadaki (University of Plymouth, UK)
Article 4
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs (pages 50-60)
Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK), Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia)
Issue 4
Article 1
Source Camera Identification Issues: Forensic Features Selection and Robustness (pages 1-15)
Yongjian Hu (South China University of Technology, China, and University of Warwick, UK), Chang-Tsun Li (University of Warwick, UK), Changhui Zhou (South China University of Technology, China), Xufeng Lin (South China University of Technology, China)
Article 2
Microsoft Power Point Files: A Secure Steganographic Carrier (pages 16-28)
Rajesh Kumar Tiwari (RVS College of Engineering & Technology, India), G. Sahoo (Birla Institute of Technology (BIT) Mesra, India)
Article 3
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis (pages 29-41)
Alexandros Zaharis (University of Thessaly, Greece), Adamantini Martini (SIEMENS SA, Greece), Theo Tryfonas (University of Bristol, UK), Christos Ilioudis (ATEI of Thessaloniki, Greece), G. Pangalos (Aristotle University of Thessaloniki, Greece)
Article 4
A Blind Image Watermarking Scheme Utilizing BTC Bitplanes (pages 42-53)
Chun-Ning Yang (Zhejiang University, China), Zhe-Ming Lu (Zhejiang University, China)
Volume 2 (2010)
Issue 1
Article 1
Cryptopometry as a Methodology for Investigating Encrypted Material (pages 1-20)
Niall McGrath (University College Dublin, Ireland), Pavel Gladyshev (University College Dublin, Ireland), Joe Carthy (University College Dublin, Ireland)
Article 2
A DFT-Based Analysis to Discern Between Camera and Scanned Images (pages 21-29)
Roberto Caldelli (University of Florence, Italy), Irene Amerini (University of Florence, Italy), Francesco Picchioni (University of Florence, Italy)
Article 3
Grey Areas - The Legal Dimensions of Cloud Computing (pages 30-39)
Michael Davis (Adelta Legal, Adelaide, Australia), Alice Sedsman (Adelta Legal, Adelaide, Australia)
Article 4
Suspect sciences? Evidentiary Problems with Emerging Technologies (pages 40-72)
Gary Edmond (University of New South Wales, Australia)
Issue 2
Article 1
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking (pages 1-20)
Xi Zhao (University of Surrey, UK), Anthony T. S. Ho (University of Surrey, UK), Yun Q. Shi (New Jersey Institute of Technology, USA)
Article 2
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification (pages 21-33)
Irene Amerini (University of Florence, Italy), Roberto Caldelli (University of Florence, Italy), Vito Cappellini (University of Florence, Italy), Francesco Picchioni (University of Florence, Italy), Alessandro Piva (University of Florence, Italy)
Article 3
Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain (pages 34-46)
Roland Kwitt (University of Salzburg, Austria), Peter Meerwald (University of Salzburg, Austria), Andreas Uhl (University of Salzburg, Austria)
Article 4
A Conceptual Methodology for Dealing with Terrorism "Narratives" (pages 47-63)
Gian Piero Zarri (University Paris Est/Créteil/Val de Marne (UPEC), France)
Article 5
Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing (pages 64-87)
B. R. Matam (Aston University, UK), David Lowe (Aston University, UK)
Issue 3
Article 1
A Biologically Inspired Smart Camera for Use in Surveillance Applications (pages 1-14)
Kosta Haltis (University of Adelaide, Australia), Matthew Sorell (University of Adelaide, Australia), Russell Brinkworth (University of Adelaide, Australia)
Article 2
Mobile Phone Forensic Analysis (pages 15-27)
Kevin Curran (University of Ulster, UK), Andrew Robinson (University of Ulster, UK), Stephen Peacocke (University of Ulster, UK), Sean Cassidy (University of Ulster, UK)
Article 3
Source Camera Identification Based on Sensor Readout Noise (pages 28-42)
H. R. Chennamma (University of Mysore, India), Lalitha Rangarajan (University of Mysore, India)
Article 4
Steganography in Thai Text (pages 43-64)
Natthawut Samphaiboon (Asian Institute of Technology, Thailand), Matthew N. Dailey (Asian Institute of Technology, Thailand)
Issue 4
Article 1
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank (pages 1-15)
Moussadek Laadjel (Algerian National Centre for Research and Development, Algeria), Ahmed Bouridane (Northumbria University, UK), Fatih Kurugollu (Queen’s University Belfast, UK), WeiQi Yan (Queen’s University Belfast, UK)
Article 2
Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking (pages 16-36)
Yaqing Niu (Communication University of China, China), Sridhar Krishnan (Ryerson University, Canada), Qin Zhang (Communication University of China, China)
Article 3
Digital Image Forensics Using Multi-Resolution Histograms (pages 37-50)
Jin Liu (Huazhong University of Science and Technology, China), Hefei Ling (Huazhong University of Science and Technology, China), Fuhao Zou (Huazhong University of Science and Technology, China), WeiQi Yan (Queen’s University Belfast, UK), Zhengding Lu (Huazhong University of Science and Technology, China)
Article 4
Secure Robust Hash Functions and Their Applications in Non-interactive Communications (pages 51-62)
Qiming Li (Institute for Infocomm Research, Singapore), Sujoy Roy (Institute for Infocomm Research, Singapore)
Article 5
Digital Image Splicing Using Edges (pages 63-75)
Jonathan Weir (Queen’s University Belfast, UK), Raymond Lau (Queen’s University Belfast, UK), WeiQi Yan (Queen’s University Belfast, UK)
Volume 1 (2009)
Issue 1
Article 1
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools (pages 1-28)
Simson L. Garfinkel (Naval Postgraduate School and Harvard University, USA)
Article 2
Locally Square Distortion and Batch Steganographic Capacity (pages 29-44)
Andrew D. Ker (Oxford University Computing Laboratory, UK)
Article 3
Unexpected Artifacts in a Digital Photograph (pages 45-58)
Matthew J. Sorell (University of Adelaide, Australia)
Article 4
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution (pages 59-74)
Hongxia Jin (IBM Almaden Research Center, USA)
Article 5
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques (pages 75-88)
Chang-Tsun Li (University of Warwick, UK), Yue Li (University of Warwick, UK), Chia-Hung Wei (Ching Yun University, Taiwan)
Article 6
Voice Over IP: Privacy and Forensic Implications (pages 89-101)
Jill Slay (University of South Australia, Australia), Matthew Simon (University of South Australia, Australia)
Issue 2
Article 1
A Model Based Approach to Timestamp Evidence Interpretation (pages 1-12)
Svein Yngvar Willassen (Norwegian University of Science and Technology, Norway)
Article 2
Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized JPEG Images (pages 13-27)
Matthew James Sorell (University of Adelaide, Australia)
Article 3
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks (pages 28-41)
Dennis K. Nilsson (Chalmers University of Technology, Sweden), Ulf E. Larson (Chalmers University of Technology, Sweden)
Article 4
Reversible and Blind Database Watermarking Using Difference Expansion (pages 42-54)
Gaurav Gupta (Macquarie University, Australia), Josef Pieprzyk (Macquarie University, Australia)
Article 5
Methods to Identify Spammers (pages 55-68)
Tobias Eggendorfer (Universitat der Bundeswehr Munchen, Germany)
Article 6
Dealing with Multiple Truths in Online Virtual Worlds (pages 69-82)
Jan Sablatnig (Technische Universitat Berlin, Germany), Fritz Lehmann-Grube (Technische Universitat Berlin, Germany), Sven Grottke (University of Stuttgart, Germany), Sabine Cikic (Technische Universitat Berlin, Germany)
Issue 3
Article 1
Spam Image Clustering for Identifying Common Sources of Unsolicited Emails (pages 1-20)
Chengcui Zhang (University of Alabama at Birmingham, USA), Xin Chen (University of Alabama at Birmingham, USA), Wei-Bang Chen (University of Alabama at Birmingham, USA), Lin Yang (University of Alabama at Birmingham, USA), Gary Warner (University of Alabama at Birmingham, USA)
Article 2
Dynamic Structural Statistical Model Based Online Signature Verification (pages 21-41)
Yan Chen (Tsinghua University, China), Xiaoqing Ding (Tsinghua University, China), Patrick S.P. Wang (Northeastern University, USA)
Article 3
Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems (pages 42-61)
Antonio Savoldi (University of Brescia, Italy), Paolo Gubian (University of Brescia, Italy)
Article 4
Robust Near Duplicate Image Matching for Digital Image Forensics (pages 62-79)
H.R. Chennamma (University of Mysore, India), Lalitha Rangarajan (University of Mysore, India), M.S. Rao (Indian Academy of Forensic Sciences, India)
Article 5
Evidentiary Implications of Potential Security Weaknesses in Forensic Software (pages 80-91)
Chris K. Ridder (Stanford University, USA)
Issue 4
Article 1
Understanding the Process of Online Grooming: The Behavior of Men who Target Young People Online in Norway (pages 1-18)
Petter Gottschalk (Norwegian School of Management BI, Norway), Ragnar Kristoffersen (Correctional Service of Norway Staff Academy KRUS, Norway)
Article 2
Reliable Motion Detection, Location and Audit in Surveillance Video (pages 19-31)
Amirsaman Poursoltanmohammadi (University of Adelaide, Australia), Matthew Sorell (University of Adelaide, Australia)
Article 3
Medical Images Authentication through Repetitive Index Modulation Based Watermarking (pages 32-39)
Chang-Tsun Li (University of Warwick, UK), Yue Li (University of Warwick, UK)
Article 4
Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification (pages 40-57)
Emanuele Maiorana (Università degli Studi Roma TRE, Italy), Patrizio Campisi (Università degli Studi Roma TRE, Italy), Alessandro Neri (Università degli Studi Roma TRE, Italy)
Article 5
Web-Based Child Pornography: Quantification and Qualification of Demand (pages 58-69)
Chad M.S. Steel (Virginia Polytechnic Institute and State University, USA)