Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2010 Vol. 3 No. 4


PagesTitle and authors
289-310Headstega: e-mail-headers-based steganography methodology
Abdelrahman Desoky
DOI: 10.1504/IJESDF.2010.038611

311-332Hamiltonian graph approach to steganography
Sunil Kumar Muttoo, Vinay Kumar
DOI: 10.1504/IJESDF.2010.038612

333-354Hardware implementation of invisible image watermarking algorithm using secured binary image authentication technique
P. Karthigaikumar, K. Baskaran
DOI: 10.1504/IJESDF.2010.038615

355-362Weaknesses of a dynamic ID-based remote user authentication scheme
Debiao He, Jianhua Chen, Rui Zhang
DOI: 10.1504/IJESDF.2010.038613

363-375Perceptible watermarking: a promising application
Malay Kishore Dutta
DOI: 10.1504/IJESDF.2010.038614