International Journal of Information Privacy, Security and Integrity
Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.
Articles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer
Latest issue contents as RSS feed which provide timely updates of tables of contents, newly published articles and calls for papers.
International Journal of Information Privacy, Security and Integrity (3 papers in press)
Regular Issues
AN OPTIMIZED QoS-BASED CLUSTERING WITH MULTIPATH SECURE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS by Onthachi Deepa, J. Suguna Abstract: Recent advances in wireless technology with networking capabilities have generated a lot of interest to design routing protocol for Wireless Sensor Networks (WSNs). WSNs are a promising approach used in various applications but finding an optimal route discovery is more problematic due to dynamicity, heterogeneity, resource scarcity and so on. Generally, residual energy of sensors in sink coverage area is drained very quickly compared to other area nodes in WSNs. The proposed Optimized QoS-based Clustering with Multipath Secure Routing Protocol (OQoS-CMSRP) for WSNs reduces the energy consumption in sink coverage area and solving hot spot problem. The proposed protocol is used to find near optimal multi-hop communication path from sink to sensors for selecting the next hop neighbor nodes. An enhanced (k,n)-threshold secret sharing scheme is required to make n shares and recover the secret by using k shares based on Hermites interpolating polynomial. The proposed protocol is to provide end-to-end security from different network layer attacks and to provide an efficient service for transmitting data in secure and reliable manner. According to QoS metrics, the performance of this communication protocol is evaluated and compared with other existing protocols namely MRBCH and EE-LEACH. The simulation result shows that OQoS-CMSRP for WSN achieves prominent data communication with reasonable energy conservation. It also reduces transmission delay and communication overhead on the basis of ensuring the outcome of the entire network. Keywords: An enhanced (k,n)-threshold secret sharing scheme; Hermite’s interpolating polynomial; Hot spot problem; OQoS-CMSRP; Quality of Service; Wireless Sensor Networks.
Comparative Analysis of Autopsy and WinHex Tools on Data Acquisition Method by Himanshu Dubey, Shobha Bhatt Abstract: This paper presents the comparative study of Autopsy and WinHex tools on data acquisition methods. The comparison is made by taking ten parameters for the comparison. For investigating the crime, data acquisition is the first step; after acquitting the data, the image is created and analyzed. The time taken to acquire and analyze the data differs among the tools. So here in this paper, two tools, Autopsy and WinHex used for acquiring data from a suspected pen drive of 32 GB, and the image is created with the help of both the tools. The performance of both tools is compared and presented. This work can be applied to choose tools based on the performance parameters for the research in the area of data acquisition methods Keywords: Acquisition; data acquisition; Autopsy; WinHex; Image; pen drive; digital investigation; investigation.
Biometric watermarking: An application-based review by JINCY J. FERNANDEZ, Nithyanandam Pandian Abstract: The advancement of technology will require us to improve the security
of data being transmitted. Nowadays, biometric authentication systems are used
in many sectors, including banking, industrial, and security. There are several
security risks associated with biometric systems in the system database where the
biometric templates are stored and in the network between the system database
and the biometric sensor. Biometric watermarking helps to protect the images by
embedding biometric information on the images so that copyright protection can
be ensured. It has been widely used in various applications such as online image
theft identification, e-health care applications, and e-voting applications. This
review paper gives an overview of biometric watermarking, its architecture, an
application-based review, criteria used for performance analysis of such systems.
The objective is to provide enough background information for researchers to
quickly gain a high-level understanding and help the readers to apply biometric
watermarking in their applications Keywords: Unimodal Biometric; Multimodal Biometrics; Digital Image Watermarking; Copyright protection.