International Journal of Digital Crime and Forensics (IJDCF) - Current IssueInternational Journal of Digital Crime and Forensics (IJDCF)https://www.igi-global.com/journal/international-journal-digital-crime-forensics/1112IGI GlobalenInternational Journal of Digital Crime and Forensics (IJDCF)1941-62101941-6229© 2024 IGI Globalecontent@igi-global.comInternational Journal of Digital Crime and Forensics (IJDCF)https://coverimages.igi-global.com/cover-images/covers/ijdcf.pnghttps://www.igi-global.com/journal/international-journal-digital-crime-forensics/1112Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Aalgorithmhttps://www.igi-global.com/article//340934Aiming at the problem that dangerous operation behaviors in the laboratory is difficult to identify by monitoring the video. An algorithm of dangerous operation behavior detection in multi-task laboratory based on improved YOLOv5 structure is proposed,Firstly, the algorithm enhances, adaptively scales and adaptively anchors box computing on the input of YOLO network. Then convolution operation is carried out to strengthen the ability of network feature fusion. Finally, the GIoU_Loss function is used at the output to optimize the network parameters and accelerate the convergence of the model. The experimental results show that the algorithm performs well in real-time head localization, head segmentation, and population regression, with significant innovation and superiority. Compared with traditional methods, this algorithm has better accuracy and real-time performance, and can more effectively achieve human operation behaviors detection in laboratory application environments.10.4018/IJDCF.340934International Journal of Digital Crime and Forensics (IJDCF), Volume: 16, Issue: 1 (2024) Pages: 0-0IT Security and EthicsSecurity & ForensicsDigital Crime & Forensics2024-01-01T05:00:00Z161002024-01-01T05:00:00ZA Novel Watermarking Scheme for Audio Data Stored in Third Party Servershttps://www.igi-global.com/article/a-novel-watermarking-scheme-for-audio-data-stored-in-third-party-servers/340382To improve the security and privacy of audio data stored in third party servers, a novel watermarking scheme is proposed. Firstly, the authors split the host signal into frames and scramble each frame to get the encrypted signal. Secondly, they generate watermark bits by using the frame number and embed them into each frame of the encrypted signal, which is the data that will be uploaded to the third party servers. For the users, they can download the encrypted data and verify the data is intact or not. If the data is intact, the users decrypt the data to get the audio signal. If the audio signal is attacked in the process of transmission, they can also locate the location of the attacked frame. The experimental results show that the method proposed is effective not only for encrypted signals, but also for the encrypted signals after decryption.10.4018/IJDCF.340382International Journal of Digital Crime and Forensics (IJDCF), Volume: 16, Issue: 1 (2024) Pages: 1-13Jia, FuhaiJia, YanruLi, JingLiu, ZhenghuiIT Security and EthicsSecurity & ForensicsDigital Crime & Forensics2024-01-01T05:00:00Z1611132024-01-01T05:00:00Z