International Journal of Electronic Security and Digital Forensics
2015 Vol.7 No.4
Pages | Title and author(s) |
305-329 | Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibilitySunil K. Moon; Rajeshree D. Raut DOI: 10.1504/IJESDF.2015.072175 |
330-342 | Enhanced authentication protocol for session initiation protocol using smart cardWenxia Zhu; Jianhua Chen; Debiao He DOI: 10.1504/IJESDF.2015.072176 |
345-357 | Robust watermarking using four bit per pixel techniqueIndradip Banerjee; Pabak Indu; Anupam Pratap Singh; Souvik Bhattacharyya; Gautam Sanyal DOI: 10.1504/IJESDF.2015.072177 |
358-380 | A robust image encryption technique using dual chaotic mapPrabir Kr. Naskar; Atal Chaudhuri DOI: 10.1504/IJESDF.2015.072180 |
381-399 | First responders actions to cope with volatile digital evidenceAllan Charles Watt; Jill Slay DOI: 10.1504/IJESDF.2015.072182 |