default search action
International Journal of Digital Crime and Forensics, Volume 1
Volume 1, Number 1, 2009
- Simson L. Garfinkel:
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. 1-28 - Andrew D. Ker:
Locally Square Distortion and Batch Steganographic Capacity. 29-44 - Matthew Sorell:
Unexpected Artifacts in a Digital Photograph. 45-58 - Hongxia Jin:
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution. 59-74 - Chang-Tsun Li, Yue Li, Chia-Hung Wei:
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques. 75-88 - Jill Slay, Matthew Simon:
Voice Over IP: Privacy and Forensic Implications. 89-101
Volume 1, Number 2, 2009
- Svein Yngvar Willassen:
A Model Based Approach to Timestamp Evidence Interpretation. 1-12 - Matthew Sorell:
Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized JPEG Images. 13-27 - Dennis K. Nilsson, Ulf Larson:
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks. 28-41 - Gaurav Gupta, Josef Pieprzyk:
Reversible and Blind Database Watermarking Using Difference Expansion. 42-54 - Tobias Eggendorfer:
Methods to Identify Spammers. 55-68 - Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke, Sabine Cikic:
Dealing with Multiple Truths in Online Virtual Worlds. 69-82
Volume 1, Number 3, 2009
- Chengcui Zhang, Xin Chen, Wei-bang Chen, Lin Yang, Gary Warner:
Spam Image Clustering for Identifying Common Sources of Unsolicited Emails. 1-20 - Yan Chen, Xiaoqing Ding, Patrick S. P. Wang:
Dynamic Structural Statistical Model Based Online Signature Verification. 21-41 - Antonio Savoldi, Paolo Gubian:
Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems. 42-61 - H. R. Chennamma, Lalitha Rangarajan, M. S. Rao:
Robust Near Duplicate Image Matching for Digital Image Forensics. 62-79 - Chris K. Ridder:
Evidentiary Implications of Potential Security Weaknesses in Forensic Software. 80-91
Volume 1, Number 4, 2009
- Petter Gottschalk, Ragnar Kristoffersen:
Understanding the Process of Online Grooming: The Behavior of Men who Target Young People Online in Norway. 1-18 - Amirsaman Poursoltanmohammadi, Matthew Sorell:
Reliable Motion Detection, Location and Audit in Surveillance Video. 19-31 - Chang-Tsun Li, Yue Li:
Medical Images Authentication through Repetitive Index Modulation Based Watermarking. 32-39 - Emanuele Maiorana, Patrizio Campisi, Alessandro Neri:
Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification. 40-57 - Chad M. S. Steel:
Web-Based Child Pornography: Quantification and Qualification of Demand. 58-69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.