Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2013 Vol. 5 No. 3/4


PagesTitle and authors
161-171Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Oriola Sallavaci; Carlisle George
DOI: 10.1504/IJESDF.2013.058645

172-177Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He; Muhammad Khurram Khan
DOI: 10.1504/IJESDF.2013.058650

178-187An enhanced Hill cipher approach for image encryption in steganography
B. Karthikeyan; Jagannathan Chakravarthy; V. Vaithiyanathan
DOI: 10.1504/IJESDF.2013.058652

188-200HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables
G. Kirubavathi Venkatesh; V. Srihari; R. Veeramani; R.M. Karthikeyan; R. Anitha
DOI: 10.1504/IJESDF.2013.058653

201-217Secure k-NN query on encrypted cloud database without key-sharing
Youwen Zhu; Rui Xu; Tsuyoshi Takagi
DOI: 10.1504/IJESDF.2013.058654

218-228Intellectual property right protection of image data using DCT and spread spectrum-based watermarking
Harsh Vikram Singh; Suman Yadav; Anand Mohan
DOI: 10.1504/IJESDF.2013.058655

229-240The impact of the antivirus on the digital evidence
Mohammed I. Al-Saleh
DOI: 10.1504/IJESDF.2013.058656

241-256Wavelet-transform steganography: algorithm and hardware implementation
Bassam J. Mohd; Thaier Hayajneh; Ahmad Nahar Quttoum
DOI: 10.1504/IJESDF.2013.058657

257-269Lattice-based message recovery signature schemes
Miaomiao Tian; Liusheng Huang
DOI: 10.1504/IJESDF.2013.058658

270-287On the reliability of forensic schemes using resampling for image copy-move forgery
Xiaobing Kang; Guangfeng Lin; Erhu Zhang; Yajun Chen
DOI: 10.1504/IJESDF.2013.058665

288-296On the security of an authentication scheme for multi-server architecture
Debiao He; Jianhua Chen; Wenbo Shi; Muhammad Khurram Khan
DOI: 10.1504/IJESDF.2013.058669

297-316Self-synchronising image steganography algorithms based on error-correcting codes
S.K. Muttoo; Sushil Kumar
DOI: 10.1504/IJESDF.2013.058670