


default search action
International Journal of Digital Crime and Forensics, Volume 2
Volume 2, Number 1, 2010
- Niall McGrath, Pavel Gladyshev

, Joe Carthy:
Cryptopometry as a Methodology for Investigating Encrypted Material. 1-20 - Roberto Caldelli

, Irene Amerini
, Francesco Picchioni:
A DFT-Based Analysis to Discern Between Camera and Scanned Images. 21-29 - Michael Davis, Alice Sedsman:

Grey Areas - The Legal Dimensions of Cloud Computing. 30-39 - Gary Edmond:

Suspect sciences? Evidentiary Problems with Emerging Technologies. 40-72
Volume 2, Number 2, 2010
- Xi Zhao, Anthony Tung Shuen Ho

, Yun Q. Shi:
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking. 1-20 - Irene Amerini

, Roberto Caldelli
, Vito Cappellini, Francesco Picchioni, Alessandro Piva
:
Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification. 21-33 - Roland Kwitt

, Peter Meerwald
, Andreas Uhl:
Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain. 34-46 - Gian Piero Zarri:

A Conceptual Methodology for Dealing with Terrorism "Narratives". 47-63 - B. R. Matam, David Lowe:

Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing. 64-87
Volume 2, Number 3, 2010
- Kosta Haltis, Matthew Sorell

, Russell S. A. Brinkworth
:
A Biologically Inspired Smart Camera for Use in Surveillance Applications. 1-14 - Kevin Curran

, Andrew Robinson, Stephen Peacocke, Sean Cassidy:
Mobile Phone Forensic Analysis. 15-27 - H. R. Chennamma

, Lalitha Rangarajan:
Source Camera Identification Based on Sensor Readout Noise. 28-42 - Natthawut Samphaiboon, Matthew M. Dailey:

Steganography in Thai Text. 43-64
Volume 2, Number 4, 2010
- Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu

, WeiQi Yan:
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank. 1-15 - Yaqing Niu, Sridhar Krishnan

, Qin Zhang:
Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking. 16-36 - Jin Liu, Hefei Ling, Fuhao Zou, WeiQi Yan, Zhengding Lu:

Digital Image Forensics Using Multi-Resolution Histograms. 37-50 - Qiming Li, Sujoy Roy:

Secure Robust Hash Functions and Their Applications in Non-interactive Communications. 51-62 - Jonathan Weir, Raymond Lau, WeiQi Yan:

Digital Image Splicing Using Edges. 63-75

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














