International Journal of Electronic Security and Digital Forensics
2010 Vol.3 No.4
Pages | Title and author(s) |
289-310 | Headstega: e-mail-headers-based steganography methodologyAbdelrahman Desoky DOI: 10.1504/IJESDF.2010.038611 |
311-332 | Hamiltonian graph approach to steganographySunil Kumar Muttoo, Vinay Kumar DOI: 10.1504/IJESDF.2010.038612 |
333-354 | Hardware implementation of invisible image watermarking algorithm using secured binary image authentication techniqueP. Karthigaikumar, K. Baskaran DOI: 10.1504/IJESDF.2010.038615 |
355-362 | Weaknesses of a dynamic ID-based remote user authentication schemeDebiao He, Jianhua Chen, Rui Zhang DOI: 10.1504/IJESDF.2010.038613 |
363-375 | Perceptible watermarking: a promising applicationMalay Kishore Dutta DOI: 10.1504/IJESDF.2010.038614 |