Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf10.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/AbdullahiWM18,
  author       = {Sani M. Abdullahi and
                  Hongxia Wang and
                  Asad Malik},
  title        = {Fingerprint Image Hashing Based on Minutiae Points and Shape Context},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {1--20},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100101},
  doi          = {10.4018/IJDCF.2018100101},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbdullahiWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbulaishH18,
  author       = {Muhammad Abulaish and
                  Nur Al Hasan Haldar},
  title        = {Advances in Digital Forensics Frameworks and Tools: {A} Comparative
                  Insight and Ranking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {95--119},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040106},
  doi          = {10.4018/IJDCF.2018040106},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbulaishH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDCQ18,
  author       = {Guangxuan Chen and
                  Liping Ding and
                  Guangxiao Chen and
                  Panke Qin},
  title        = {Reliable Security Strategy for Message-Oriented Middleware},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {12--23},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010102},
  doi          = {10.4018/IJDCF.2018010102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenDCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDDZQCL18,
  author       = {Guangxuan Chen and
                  Liping Ding and
                  Jin Du and
                  Guomin Zhou and
                  Panke Qin and
                  Guangxiao Chen and
                  Qiang Liu},
  title        = {Trust Evaluation Strategy for Single Sign-on Solution in Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {1--11},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010101},
  doi          = {10.4018/IJDCF.2018010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenDDZQCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenP18,
  author       = {Juan Chen and
                  Fei Peng},
  title        = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {67--78},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010106},
  doi          = {10.4018/IJDCF.2018010106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenX18,
  author       = {Kai Chen and
                  Dawen Xu},
  title        = {An Efficient Reversible Data Hiding Scheme for Encrypted Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {1--22},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040101},
  doi          = {10.4018/IJDCF.2018040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DingLYL18,
  author       = {Wanmeng Ding and
                  Kesheng Liu and
                  Xuehu Yan and
                  Lintao Liu},
  title        = {Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {120--136},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040107},
  doi          = {10.4018/IJDCF.2018040107},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DingLYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DongZHL18,
  author       = {Xiaojuan Dong and
                  Weiming Zhang and
                  Xianjun Hu and
                  Keyang Liu},
  title        = {A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten
                  for the Outsourced Plain Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {118--139},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100109},
  doi          = {10.4018/IJDCF.2018100109},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DongZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoGZL18,
  author       = {Lin Gao and
                  Tiegang Gao and
                  Jie Zhao and
                  Yonglei Liu},
  title        = {Reversible Watermarking in Digital Image Using {PVO} and {RDWT}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {40--55},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040103},
  doi          = {10.4018/IJDCF.2018040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoGZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoHGC18,
  author       = {Hang Gao and
                  Mengting Hu and
                  Tiegang Gao and
                  Renhong Cheng},
  title        = {Random Grid and Reversible Watermarking-Based On Verifiable Secret
                  Sharing for Outsourcing Images in Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {24--39},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010103},
  doi          = {10.4018/IJDCF.2018010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoHGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoLW18,
  author       = {Teng Guo and
                  Feng Liu and
                  Wen Wang},
  title        = {Visual Gambling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {43--49},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070104},
  doi          = {10.4018/IJDCF.2018070104},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuoLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiL18,
  author       = {Peng Li and
                  Zuquan Liu},
  title        = {An Improved Essential Secret Image Sharing Scheme with Smaller Shadow
                  Size},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {78--94},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070107},
  doi          = {10.4018/IJDCF.2018070107},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiangFXWY18,
  author       = {Zhuoqian Liang and
                  Bingwen Feng and
                  Xuba Xu and
                  Xiaotian Wu and
                  Tao Yang},
  title        = {Geometrically Invariant Image Watermarking Using Histogram Adjustment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {54--66},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010105},
  doi          = {10.4018/IJDCF.2018010105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiangFXWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLGR18,
  author       = {Xiaoxi Liu and
                  Ju Liu and
                  Lingchen Gu and
                  Yannan Ren},
  title        = {Keyframe-Based Vehicle Surveillance Video Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {52--61},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100104},
  doi          = {10.4018/IJDCF.2018100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLL18,
  author       = {Yimin Liu and
                  Wenyan Liu and
                  Xiangyang Luo},
  title        = {Survey on the Indoor Localization Technique of Wi-Fi Access Points},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {27--42},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070103},
  doi          = {10.4018/IJDCF.2018070103},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuZNT18,
  author       = {Lu Liu and
                  Yao Zhao and
                  Rongrong Ni and
                  Qi Tian},
  title        = {Copy-Move Forgery Localization Using Convolutional Neural Networks
                  and {CFA} Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {140--155},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100110},
  doi          = {10.4018/IJDCF.2018100110},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuZNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongPG18,
  author       = {Min Long and
                  Fei Peng and
                  Xiaoqing Gong},
  title        = {A Format-Compliant Encryption for Secure {HEVC} Video Sharing in Multimedia
                  Social Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {23--39},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040102},
  doi          = {10.4018/IJDCF.2018040102},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LongPG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McKeagueC18,
  author       = {Jonathan McKeague and
                  Kevin Curran},
  title        = {Detecting the Use of Anonymous Proxies},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {74--94},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040105},
  doi          = {10.4018/IJDCF.2018040105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/McKeagueC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengWL18,
  author       = {Fei Peng and
                  Shuai{-}ping Wang and
                  Min Long},
  title        = {Print-Scan Resilient Binary Map Watermarking Based on {DCT} and Scrambling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {80--89},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100106},
  doi          = {10.4018/IJDCF.2018100106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RanjanSKP18,
  author       = {Preetish Ranjan and
                  Vrijendra Singh and
                  Prabhat Kumar and
                  Satya Prakash},
  title        = {Models for the Detection of Malicious Intent People in Society},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {15--26},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070102},
  doi          = {10.4018/IJDCF.2018070102},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RanjanSKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RenNY18,
  author       = {Yueqiu Ren and
                  Minh Nguyen and
                  Wei{-}Qi Yan},
  title        = {Real-Time Recognition of Series Seven New Zealand Banknotes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {50--65},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070105},
  doi          = {10.4018/IJDCF.2018070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RenNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TuXX18,
  author       = {Min Tu and
                  Shiyang Xu and
                  Jianfeng Xu},
  title        = {Evaluation Method of Public Transportation System Based on Fuzzy Cloud
                  Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {36--51},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100103},
  doi          = {10.4018/IJDCF.2018100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TuXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLLXZW18,
  author       = {Ruxin Wang and
                  Wei Lu and
                  Jixian Li and
                  Shijun Xiang and
                  Xianfeng Zhao and
                  Jinwei Wang},
  title        = {Digital Image Splicing Detection Based on Markov Features in {QDCT}
                  and {QWT} Domain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {90--107},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100107},
  doi          = {10.4018/IJDCF.2018100107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangLLXZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuSFLLL18,
  author       = {Fan Wu and
                  Ran Sun and
                  Wenhao Fan and
                  Yuanan Liu and
                  Feng Liu and
                  Hui Lu},
  title        = {A Privacy Protection Approach Based on Android Application's Runtime
                  Behavior Monitor and Control},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {95--113},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070108},
  doi          = {10.4018/IJDCF.2018070108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuSFLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiongTZ18,
  author       = {Jianying Xiong and
                  Min Tu and
                  Ying Zhou},
  title        = {Using Weighted Similarity to Assess Risk of Illegal Fund Raising in
                  Online {P2P} Lending},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {62--79},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100105},
  doi          = {10.4018/IJDCF.2018100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiongTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLM18,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Duohe Ma},
  title        = {Image Secret Sharing Construction for General Access Structure with
                  Meaningful Share},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {66--77},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070106},
  doi          = {10.4018/IJDCF.2018070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanWL18,
  author       = {Wei Qi Yan and
                  Xiaotian Wu and
                  Feng Liu},
  title        = {Progressive Scrambling for Social Media},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {56--73},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040104},
  doi          = {10.4018/IJDCF.2018040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YeHCQ18,
  author       = {Qing Ye and
                  Mingxing Hu and
                  Guangxuan Chen and
                  Panke Qin},
  title        = {An Improved Encryption Scheme for Traitor Tracing from Lattice},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {21--35},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100102},
  doi          = {10.4018/IJDCF.2018100102},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YeHCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YueLML18,
  author       = {Chen Yue and
                  Tianliang Lu and
                  Cai Manchun and
                  Jingying Li},
  title        = {Evaluation of the Attack Effect Based on Improved Grey Clustering
                  Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {92--100},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010108},
  doi          = {10.4018/IJDCF.2018010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YueLML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YutingGDK18,
  author       = {Sun Yuting and
                  Jing Guo and
                  Ling Du and
                  Yongzhen Ke},
  title        = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {1--14},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070101},
  doi          = {10.4018/IJDCF.2018070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YutingGDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangC18,
  author       = {Xuan Zhang and
                  Kam{-}Pui Chow},
  title        = {A Framework for Dark Web Threat Intelligence Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {108--117},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100108},
  doi          = {10.4018/IJDCF.2018100108},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangHC18,
  author       = {Ping Zhang and
                  Yijun He and
                  Kam{-}Pui Chow},
  title        = {Fraud Track on Secure Electronic Check System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {137--144},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040108},
  doi          = {10.4018/IJDCF.2018040108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangYXG18,
  author       = {Shun Zhang and
                  Liang Yang and
                  Xihao Xu and
                  Tiegang Gao},
  title        = {Secure Steganography in {JPEG} Images Based on Histogram Modification
                  and Hyper Chaotic System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {40--53},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010104},
  doi          = {10.4018/IJDCF.2018010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangYXG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhouYSY18,
  author       = {Lei Zhou and
                  Wei Qi Yan and
                  Yun Shu and
                  Jian Yu},
  title        = {{CVSS:} {A} Cloud-Based Visual Surveillance System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {79--91},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010107},
  doi          = {10.4018/IJDCF.2018010107},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhouYSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics