Forthcoming and Online First Articles

International Journal of Information Privacy, Security and Integrity

International Journal of Information Privacy, Security and Integrity (IJIPSI)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Information Privacy, Security and Integrity (3 papers in press)

Regular Issues

    by Onthachi Deepa, J. Suguna 
    Abstract: Recent advances in wireless technology with networking capabilities have generated a lot of interest to design routing protocol for Wireless Sensor Networks (WSNs). WSNs are a promising approach used in various applications but finding an optimal route discovery is more problematic due to dynamicity, heterogeneity, resource scarcity and so on. Generally, residual energy of sensors in sink coverage area is drained very quickly compared to other area nodes in WSNs. The proposed Optimized QoS-based Clustering with Multipath Secure Routing Protocol (OQoS-CMSRP) for WSNs reduces the energy consumption in sink coverage area and solving hot spot problem. The proposed protocol is used to find near optimal multi-hop communication path from sink to sensors for selecting the next hop neighbor nodes. An enhanced (k,n)-threshold secret sharing scheme is required to make n shares and recover the secret by using k shares based on Hermites interpolating polynomial. The proposed protocol is to provide end-to-end security from different network layer attacks and to provide an efficient service for transmitting data in secure and reliable manner. According to QoS metrics, the performance of this communication protocol is evaluated and compared with other existing protocols namely MRBCH and EE-LEACH. The simulation result shows that OQoS-CMSRP for WSN achieves prominent data communication with reasonable energy conservation. It also reduces transmission delay and communication overhead on the basis of ensuring the outcome of the entire network.
    Keywords: An enhanced (k,n)-threshold secret sharing scheme; Hermite’s interpolating polynomial; Hot spot problem; OQoS-CMSRP; Quality of Service; Wireless Sensor Networks.

  • Comparative Analysis of Autopsy and WinHex Tools on Data Acquisition Method   Order a copy of this article
    by Himanshu Dubey, Shobha Bhatt 
    Abstract: This paper presents the comparative study of Autopsy and WinHex tools on data acquisition methods. The comparison is made by taking ten parameters for the comparison. For investigating the crime, data acquisition is the first step; after acquitting the data, the image is created and analyzed. The time taken to acquire and analyze the data differs among the tools. So here in this paper, two tools, Autopsy and WinHex used for acquiring data from a suspected pen drive of 32 GB, and the image is created with the help of both the tools. The performance of both tools is compared and presented. This work can be applied to choose tools based on the performance parameters for the research in the area of data acquisition methods
    Keywords: Acquisition; data acquisition; Autopsy; WinHex; Image; pen drive; digital investigation; investigation.

  • Biometric watermarking: An application-based review   Order a copy of this article
    by JINCY J. FERNANDEZ, Nithyanandam Pandian 
    Abstract: The advancement of technology will require us to improve the security of data being transmitted. Nowadays, biometric authentication systems are used in many sectors, including banking, industrial, and security. There are several security risks associated with biometric systems in the system database where the biometric templates are stored and in the network between the system database and the biometric sensor. Biometric watermarking helps to protect the images by embedding biometric information on the images so that copyright protection can be ensured. It has been widely used in various applications such as online image theft identification, e-health care applications, and e-voting applications. This review paper gives an overview of biometric watermarking, its architecture, an application-based review, criteria used for performance analysis of such systems. The objective is to provide enough background information for researchers to quickly gain a high-level understanding and help the readers to apply biometric watermarking in their applications
    Keywords: Unimodal Biometric; Multimodal Biometrics; Digital Image Watermarking; Copyright protection.