Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf10.bht:"
@article{DBLP:journals/ijdcf/AbdullahiWM18, author = {Sani M. Abdullahi and Hongxia Wang and Asad Malik}, title = {Fingerprint Image Hashing Based on Minutiae Points and Shape Context}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {1--20}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100101}, doi = {10.4018/IJDCF.2018100101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AbdullahiWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AbulaishH18, author = {Muhammad Abulaish and Nur Al Hasan Haldar}, title = {Advances in Digital Forensics Frameworks and Tools: {A} Comparative Insight and Ranking}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {95--119}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040106}, doi = {10.4018/IJDCF.2018040106}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AbulaishH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenDCQ18, author = {Guangxuan Chen and Liping Ding and Guangxiao Chen and Panke Qin}, title = {Reliable Security Strategy for Message-Oriented Middleware}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {12--23}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010102}, doi = {10.4018/IJDCF.2018010102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenDCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenDDZQCL18, author = {Guangxuan Chen and Liping Ding and Jin Du and Guomin Zhou and Panke Qin and Guangxiao Chen and Qiang Liu}, title = {Trust Evaluation Strategy for Single Sign-on Solution in Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {1--11}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010101}, doi = {10.4018/IJDCF.2018010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenDDZQCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenP18, author = {Juan Chen and Fei Peng}, title = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {67--78}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010106}, doi = {10.4018/IJDCF.2018010106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenX18, author = {Kai Chen and Dawen Xu}, title = {An Efficient Reversible Data Hiding Scheme for Encrypted Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {1--22}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040101}, doi = {10.4018/IJDCF.2018040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DingLYL18, author = {Wanmeng Ding and Kesheng Liu and Xuehu Yan and Lintao Liu}, title = {Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {120--136}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040107}, doi = {10.4018/IJDCF.2018040107}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DingLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DongZHL18, author = {Xiaojuan Dong and Weiming Zhang and Xianjun Hu and Keyang Liu}, title = {A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {118--139}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100109}, doi = {10.4018/IJDCF.2018100109}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DongZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoGZL18, author = {Lin Gao and Tiegang Gao and Jie Zhao and Yonglei Liu}, title = {Reversible Watermarking in Digital Image Using {PVO} and {RDWT}}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {40--55}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040103}, doi = {10.4018/IJDCF.2018040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoGZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoHGC18, author = {Hang Gao and Mengting Hu and Tiegang Gao and Renhong Cheng}, title = {Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {24--39}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010103}, doi = {10.4018/IJDCF.2018010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoHGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuoLW18, author = {Teng Guo and Feng Liu and Wen Wang}, title = {Visual Gambling}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {43--49}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070104}, doi = {10.4018/IJDCF.2018070104}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuoLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiL18, author = {Peng Li and Zuquan Liu}, title = {An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {78--94}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070107}, doi = {10.4018/IJDCF.2018070107}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiangFXWY18, author = {Zhuoqian Liang and Bingwen Feng and Xuba Xu and Xiaotian Wu and Tao Yang}, title = {Geometrically Invariant Image Watermarking Using Histogram Adjustment}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {54--66}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010105}, doi = {10.4018/IJDCF.2018010105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiangFXWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLGR18, author = {Xiaoxi Liu and Ju Liu and Lingchen Gu and Yannan Ren}, title = {Keyframe-Based Vehicle Surveillance Video Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {52--61}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100104}, doi = {10.4018/IJDCF.2018100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLL18, author = {Yimin Liu and Wenyan Liu and Xiangyang Luo}, title = {Survey on the Indoor Localization Technique of Wi-Fi Access Points}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {27--42}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070103}, doi = {10.4018/IJDCF.2018070103}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuZNT18, author = {Lu Liu and Yao Zhao and Rongrong Ni and Qi Tian}, title = {Copy-Move Forgery Localization Using Convolutional Neural Networks and {CFA} Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {140--155}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100110}, doi = {10.4018/IJDCF.2018100110}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuZNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LongPG18, author = {Min Long and Fei Peng and Xiaoqing Gong}, title = {A Format-Compliant Encryption for Secure {HEVC} Video Sharing in Multimedia Social Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {23--39}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040102}, doi = {10.4018/IJDCF.2018040102}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LongPG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/McKeagueC18, author = {Jonathan McKeague and Kevin Curran}, title = {Detecting the Use of Anonymous Proxies}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {74--94}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040105}, doi = {10.4018/IJDCF.2018040105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/McKeagueC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengWL18, author = {Fei Peng and Shuai{-}ping Wang and Min Long}, title = {Print-Scan Resilient Binary Map Watermarking Based on {DCT} and Scrambling}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {80--89}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100106}, doi = {10.4018/IJDCF.2018100106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RanjanSKP18, author = {Preetish Ranjan and Vrijendra Singh and Prabhat Kumar and Satya Prakash}, title = {Models for the Detection of Malicious Intent People in Society}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {15--26}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070102}, doi = {10.4018/IJDCF.2018070102}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/RanjanSKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RenNY18, author = {Yueqiu Ren and Minh Nguyen and Wei{-}Qi Yan}, title = {Real-Time Recognition of Series Seven New Zealand Banknotes}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {50--65}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070105}, doi = {10.4018/IJDCF.2018070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/RenNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TuXX18, author = {Min Tu and Shiyang Xu and Jianfeng Xu}, title = {Evaluation Method of Public Transportation System Based on Fuzzy Cloud Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {36--51}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100103}, doi = {10.4018/IJDCF.2018100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TuXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangLLXZW18, author = {Ruxin Wang and Wei Lu and Jixian Li and Shijun Xiang and Xianfeng Zhao and Jinwei Wang}, title = {Digital Image Splicing Detection Based on Markov Features in {QDCT} and {QWT} Domain}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {90--107}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100107}, doi = {10.4018/IJDCF.2018100107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangLLXZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuSFLLL18, author = {Fan Wu and Ran Sun and Wenhao Fan and Yuanan Liu and Feng Liu and Hui Lu}, title = {A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {95--113}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070108}, doi = {10.4018/IJDCF.2018070108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuSFLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiongTZ18, author = {Jianying Xiong and Min Tu and Ying Zhou}, title = {Using Weighted Similarity to Assess Risk of Illegal Fund Raising in Online {P2P} Lending}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {62--79}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100105}, doi = {10.4018/IJDCF.2018100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XiongTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLLM18, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Duohe Ma}, title = {Image Secret Sharing Construction for General Access Structure with Meaningful Share}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070106}, doi = {10.4018/IJDCF.2018070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanWL18, author = {Wei Qi Yan and Xiaotian Wu and Feng Liu}, title = {Progressive Scrambling for Social Media}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {56--73}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040104}, doi = {10.4018/IJDCF.2018040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YeHCQ18, author = {Qing Ye and Mingxing Hu and Guangxuan Chen and Panke Qin}, title = {An Improved Encryption Scheme for Traitor Tracing from Lattice}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {21--35}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100102}, doi = {10.4018/IJDCF.2018100102}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YeHCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YueLML18, author = {Chen Yue and Tianliang Lu and Cai Manchun and Jingying Li}, title = {Evaluation of the Attack Effect Based on Improved Grey Clustering Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010108}, doi = {10.4018/IJDCF.2018010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YueLML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YutingGDK18, author = {Sun Yuting and Jing Guo and Ling Du and Yongzhen Ke}, title = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070101}, doi = {10.4018/IJDCF.2018070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YutingGDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangC18, author = {Xuan Zhang and Kam{-}Pui Chow}, title = {A Framework for Dark Web Threat Intelligence Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {108--117}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100108}, doi = {10.4018/IJDCF.2018100108}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangHC18, author = {Ping Zhang and Yijun He and Kam{-}Pui Chow}, title = {Fraud Track on Secure Electronic Check System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {137--144}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040108}, doi = {10.4018/IJDCF.2018040108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangYXG18, author = {Shun Zhang and Liang Yang and Xihao Xu and Tiegang Gao}, title = {Secure Steganography in {JPEG} Images Based on Histogram Modification and Hyper Chaotic System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010104}, doi = {10.4018/IJDCF.2018010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangYXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhouYSY18, author = {Lei Zhou and Wei Qi Yan and Yun Shu and Jian Yu}, title = {{CVSS:} {A} Cloud-Based Visual Surveillance System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {79--91}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010107}, doi = {10.4018/IJDCF.2018010107}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhouYSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.