International Journal of Electronic Security and Digital Forensics (IJESDF)

International Journal of Electronic Security and Digital Forensics

2013 Vol.5 No.3/4

Pages Title and author(s)
161-171Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Oriola Sallavaci; Carlisle George
DOI: 10.1504/IJESDF.2013.058645
172-177Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He; Muhammad Khurram Khan
DOI: 10.1504/IJESDF.2013.058650
178-187An enhanced Hill cipher approach for image encryption in steganography
B. Karthikeyan; Jagannathan Chakravarthy; V. Vaithiyanathan
DOI: 10.1504/IJESDF.2013.058652
188-200HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables
G. Kirubavathi Venkatesh; V. Srihari; R. Veeramani; R.M. Karthikeyan; R. Anitha
DOI: 10.1504/IJESDF.2013.058653
201-217Secure k-NN query on encrypted cloud database without key-sharing
Youwen Zhu; Rui Xu; Tsuyoshi Takagi
DOI: 10.1504/IJESDF.2013.058654
218-228Intellectual property right protection of image data using DCT and spread spectrum-based watermarking
Harsh Vikram Singh; Suman Yadav; Anand Mohan
DOI: 10.1504/IJESDF.2013.058655
229-240The impact of the antivirus on the digital evidence
Mohammed I. Al-Saleh
DOI: 10.1504/IJESDF.2013.058656
241-256Wavelet-transform steganography: algorithm and hardware implementation
Bassam J. Mohd; Thaier Hayajneh; Ahmad Nahar Quttoum
DOI: 10.1504/IJESDF.2013.058657
257-269Lattice-based message recovery signature schemes
Miaomiao Tian; Liusheng Huang
DOI: 10.1504/IJESDF.2013.058658
270-287On the reliability of forensic schemes using resampling for image copy-move forgery
Xiaobing Kang; Guangfeng Lin; Erhu Zhang; Yajun Chen
DOI: 10.1504/IJESDF.2013.058665
288-296On the security of an authentication scheme for multi-server architecture
Debiao He; Jianhua Chen; Wenbo Shi; Muhammad Khurram Khan
DOI: 10.1504/IJESDF.2013.058669
297-316Self-synchronising image steganography algorithms based on error-correcting codes
S.K. Muttoo; Sushil Kumar
DOI: 10.1504/IJESDF.2013.058670