Sample issue
You can read all of these full-text articles free of charge - click

International Journal of Electronic Security and Digital Forensics
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
Novel image watermarking method based on FRWT and SVD | Zhihai Zhuo | Vol.10 No.1 | 97-107 | ![]() |
Exploring robust and blind watermarking approach of colour images in DWT-DCT-SVD domain for copyright protection | Hongcai Xu; Xiaobing Kang; Yihan Wang; Yilan Wang | Vol.10 No.1 | 79-96 | ![]() |
Information hiding: Arabic text steganography by using Unicode characters to hide secret data | Allah Ditta; Cai Yongquan; Muhammad Azeem; Khurram Gulzar Rana; Haiyang Yu; Muhammad Qasim Memon | Vol.10 No.1 | 61-78 | ![]() |
An information system risk assessment model: a case study in online banking system | Sajjad Shokouhyar; Farhad Panahifar; Azadeh Karimisefat; Maryam Nezafatbakhsh | Vol.10 No.1 | 39-60 | ![]() |
Efficient multi-receiver identity-based signcryption from lattice assumption | Xiaojun Zhang; Chunxiang Xu; Jingting Xue | Vol.10 No.1 | 20-38 | ![]() |
A novel chaotic hash-based attribute-based encryption and decryption on cloud computing | Lakshmi Naga Divya Tamma; Shaik Shakeel Ahamad | Vol.10 No.1 | 1-19 | ![]() |