Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021739
Drone forensics: examination and analysis
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020543
Combating credit card fraud with online behavioural targeting and device fingerprinting
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016642
Fingerprint authentication based on fuzzy extractor in the mobile device
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020550
A cryptographic data hiding algorithm with high cover text capacity
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016326
A novel LSB-based RDH with dual embedding for encrypted images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020549
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020551
Study of e-governance in India: a survey
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018768
Dealing with the problem of collection and analysis of electronic evidence
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020553
ArMTFr: a new permutation-based image encryption scheme
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016637
Information security model using data embedding technique for enhancing perceptibility and robustness
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016643
Malware detection model based on classifying system calls and code attributes: a proof of concept
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018773
A survey on security analysis and privacy issues of wireless multimedia communication system
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020532
Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021738
The pseudo metadata concept for the chain of custody of digital evidence
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021732
Implementation of the PREDECI model in the prosecution of Chimborazo in Ecuador: a case study evaluation
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016641
Security methods and approaches for internal and external network hospital information systems with single sign-on
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021736
Comparison analysis of electricity theft detection methods for advanced metering infrastructure in smart grid
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020548
Secure Gray code-based reversible data hiding scheme in radiographic images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020552
Evaluation of smartphone data using a reference architecture
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018774
Using machine learning and the first digit law to detect forgeries in digital images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021737
Biometric data security using joint encryption and watermarking
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021729
A novel median filtering forensics based on principal component analysis network
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018772
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016644