Search dblp for Publications

export results for "stream:streams/journals/ijdcf:"

 download as .bib file

@article{DBLP:journals/ijdcf/Al-RoomIBSYMH21,
  author    = {Khalifa Al{-}Room and
               Farkhund Iqbal and
               Thar Baker and
               Babar Shah and
               Benjamin Yankson and
               {\'{A}}ine MacDermott and
               Patrick C. K. Hung},
  title     = {Drone Forensics: {A} Case Study of Digital Forensic Investigations
               Conducted on Common Drone Models},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {13},
  number    = {1},
  pages     = {1--25},
  year      = {2021},
  url       = {https://doi.org/10.4018/IJDCF.2021010101},
  doi       = {10.4018/IJDCF.2021010101},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Al-RoomIBSYMH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChakiD21,
  author    = {Jyotismita Chaki and
               Nilanjan Dey},
  title     = {Palmprint Recognition Using Hessian Matrix and Two-Component Partition
               Method},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {13},
  number    = {1},
  pages     = {26--47},
  year      = {2021},
  url       = {https://doi.org/10.4018/IJDCF.2021010102},
  doi       = {10.4018/IJDCF.2021010102},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChakiD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MittalB21,
  author    = {Ruchi Mittal and
               Mahinder Pal Singh Bhatia},
  title     = {Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial
               Trading Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {13},
  number    = {1},
  pages     = {79--93},
  year      = {2021},
  url       = {https://doi.org/10.4018/IJDCF.2021010105},
  doi       = {10.4018/IJDCF.2021010105},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MittalB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SahuK21,
  author    = {Ajay Kumar Sahu and
               Ashish Kumar},
  title     = {A Novel Verification Protocol to Restrict Unconstitutional Access
               of Information From Smart Card},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {13},
  number    = {1},
  pages     = {65--78},
  year      = {2021},
  url       = {https://doi.org/10.4018/IJDCF.2021010104},
  doi       = {10.4018/IJDCF.2021010104},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SahuK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YadavSG21,
  author    = {Sumit Kumar Yadav and
               Kavita Sharma and
               Ananya Gupta},
  title     = {SafeWomen: {A} Smart Device to Secure Women's Environment Using ATmega328
               With an Android Tracking App},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {13},
  number    = {1},
  pages     = {48--64},
  year      = {2021},
  url       = {https://doi.org/10.4018/IJDCF.2021010103},
  doi       = {10.4018/IJDCF.2021010103},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YadavSG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AlmutairiSRSYZM20,
  author    = {Ahmed Almutairi and
               Behzad Shoarian Satari and
               Carlos Rivas and
               Cristian Florin Stanciu and
               Mozhdeh Yamani and
               Zahra Zohoorsaadat and
               Serguei A. Mokhov},
  title     = {Evaluation of Autopsy and Volatility for Cybercrime Investigation:
               {A} Forensic Lucid Case Study},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {58--89},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010104},
  doi       = {10.4018/IJDCF.2020010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AlmutairiSRSYZM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BoppuruK20,
  author    = {Prathap Rudra Boppuru and
               Ramesha Kenchappa},
  title     = {Spatio-Temporal Crime Analysis Using {KDE} and {ARIMA} Models in the
               Indian Context},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {1--19},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100101},
  doi       = {10.4018/IJDCF.2020100101},
  timestamp = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BoppuruK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BouafifKI20,
  author    = {Hana Bouafif and
               Faouzi Kamoun and
               Farkhund Iqbal},
  title     = {Towards a Better Understanding of Drone Forensics: {A} Case Study
               of Parrot {AR} Drone 2.0},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {35--57},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010103},
  doi       = {10.4018/IJDCF.2020010103},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BouafifKI20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenRZZ20,
  author    = {Xi Chen and
               Fangming Ruan and
               Lvyang Zhang and
               Yang Zhao},
  title     = {Design of Cyberspace Security Talents Training System Based on Knowledge
               Graph},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {44--53},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100104},
  doi       = {10.4018/IJDCF.2020100104},
  timestamp = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenRZZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DeshmukhR20,
  author    = {Amar B. Deshmukh and
               N. Usha Rani},
  title     = {Optimization-Driven Kernel and Deep Convolutional Neural Network for
               Multi-View Face Video Super Resolution},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {77--95},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070106},
  doi       = {10.4018/IJDCF.2020070106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DeshmukhR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuDC20,
  author    = {Jin Du and
               Liping Ding and
               Guangxuan Chen},
  title     = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {111--121},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070108},
  doi       = {10.4018/IJDCF.2020070108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DuDC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuFZWS20,
  author    = {Lili Du and
               Yaqin Fan and
               Lvyang Zhang and
               Lianying Wang and
               Tianhang Sun},
  title     = {A Summary of the Development of Cyber Security Threat Intelligence
               Sharing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {54--67},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100105},
  doi       = {10.4018/IJDCF.2020100105},
  timestamp = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DuFZWS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangH20,
  author    = {Dan Huang and
               Fangjun Huang},
  title     = {Reversible Data Hiding Based on Adaptive Block Selection Strategy},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {157--168},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010108},
  doi       = {10.4018/IJDCF.2020010108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuangH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLT20,
  author    = {Chee Cheun Huang and
               Chien Eao Lee and
               Vrizlynn L. L. Thing},
  title     = {A Novel Video Forgery Detection Model Based on Triangular Polarity
               Feature Classification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {14--34},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010102},
  doi       = {10.4018/IJDCF.2020010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuangLT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLXH20,
  author    = {Wenjun Huang and
               Chao Liang and
               Chunxia Xiao and
               Zhen Han},
  title     = {Video-Based Person Re-Identification With Unregulated Sequences},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {2},
  pages     = {59--76},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020040104},
  doi       = {10.4018/IJDCF.2020040104},
  timestamp = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuangLXH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KalashRMBWI20,
  author    = {Mahmoud Kalash and
               Mrigank Rochan and
               Noman Mohammed and
               Neil D. B. Bruce and
               Yang Wang and
               Farkhund Iqbal},
  title     = {A Deep Learning Framework for Malware Classification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {90--108},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010105},
  doi       = {10.4018/IJDCF.2020010105},
  timestamp = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/KalashRMBWI20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuQS20,
  author    = {Xin Liu and
               RuiHua Qi and
               Lin Shao},
  title     = {Joint Model-Based Attention for Spoken Language Understanding Task},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {32--43},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100103},
  doi       = {10.4018/IJDCF.2020100103},
  timestamp = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuQS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MacDermottBBIS20,
  author    = {{\'{A}}ine MacDermott and
               Thar Baker and
               Paul Buck and
               Farkhund Iqbal and
               Qi Shi},
  title     = {The Internet of Things: Challenges and Considerations for Cybercrime
               Investigations and Digital Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {1--13},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010101},
  doi       = {10.4018/IJDCF.2020010101},
  timestamp = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MacDermottBBIS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MokniDK20,
  author    = {Raouia Mokni and
               Hassen Drira and
               Monji Kherallah},
  title     = {Deep-Analysis of Palmprint Representation Based on Correlation Concept
               for Human Biometrics Identification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {2},
  pages     = {40--58},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020040103},
  doi       = {10.4018/IJDCF.2020040103},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MokniDK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RaoTY20,
  author    = {Jingyuan Rao and
               Min Tu and
               Xuanjin Yang},
  title     = {Two Variations of Peer Intermediaries for Key Establishment in Sensor
               Networks},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {1--14},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070101},
  doi       = {10.4018/IJDCF.2020070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/RaoTY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SharmaAS20,
  author    = {Puneet Sharma and
               Deepak Arora and
               T. Sakthivel},
  title     = {Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile
               Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {58--76},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070105},
  doi       = {10.4018/IJDCF.2020070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SharmaAS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SureshS20,
  author    = {Gulivindala Suresh and
               Chanamallu Srinivasarao},
  title     = {Copy Move Forgery Detection Through Differential Excitation Component-Based
               Texture Features},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {27--44},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070103},
  doi       = {10.4018/IJDCF.2020070103},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SureshS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TaoWYJ20,
  author    = {Biaoli Tao and
               Rangding Wang and
               Diqun Yan and
               Chao Jin},
  title     = {Anti-Forensics of Double Compressed {MP3} Audio},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {45--57},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070104},
  doi       = {10.4018/IJDCF.2020070104},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TaoWYJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangHLL20,
  author    = {Yufei Wang and
               Yongjian Hu and
               Alan Wee{-}Chung Liew and
               Chang{-}Tsun Li},
  title     = {{ENF} Based Video Forgery Detection Algorithm},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {131--156},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010107},
  doi       = {10.4018/IJDCF.2020010107},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangHLL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuLWLLFT20,
  author    = {Chao Wu and
               Yuan'an Liu and
               Fan Wu and
               Feng Liu and
               Hui Lu and
               Wenhao Fan and
               Bihua Tang},
  title     = {A Hybrid Intrusion Detection System for IoT Applications with Constrained
               Resources},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {1},
  pages     = {109--130},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020010106},
  doi       = {10.4018/IJDCF.2020010106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WuLWLLFT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaoXYLK20,
  author    = {Jinsheng Xiao and
               Wenxin Xiong and
               Yuan Yao and
               Liang Li and
               Reinhard Klette},
  title     = {Lane Detection Algorithm Based on Road Structure and Extended Kalman
               Filter},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {2},
  pages     = {1--20},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020040101},
  doi       = {10.4018/IJDCF.2020040101},
  timestamp = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/XiaoXYLK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLL20,
  author    = {Xuehu Yan and
               Yuliang Lu and
               Lintao Liu},
  title     = {A Common General Access Structure Construction Approach in Secret
               Image Sharing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {96--110},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070107},
  doi       = {10.4018/IJDCF.2020070107},
  timestamp = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YanLL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSLHY20,
  author    = {Xinguo Yu and
               Wu Song and
               Xiaopan Lyu and
               Bin He and
               Nan Ye},
  title     = {Reading Both Single and Multiple Digital Video Clocks Using Context-Aware
               Pixel Periodicity and Deep Learning},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {2},
  pages     = {21--39},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020040102},
  doi       = {10.4018/IJDCF.2020040102},
  timestamp = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YuSLHY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zhang20,
  author    = {Yi Zhang},
  title     = {User Identity Hiding Method of Android},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {3},
  pages     = {15--26},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020070102},
  doi       = {10.4018/IJDCF.2020070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Zhang20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoFYF20,
  author    = {Yang Zhao and
               Yaqin Fan and
               Mingrui Yin and
               Cheng Fang},
  title     = {Research on the Construction of a Student Model of an Adaptive Learning
               System Based on Cognitive Diagnosis Theory},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {20--31},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100102},
  doi       = {10.4018/IJDCF.2020100102},
  timestamp = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhaoFYF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhengLW20,
  author    = {Xin Zheng and
               Jun Li and
               Qingrong Wu},
  title     = {A Light Recommendation Algorithm of We-Media Articles Based on Content},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {12},
  number    = {4},
  pages     = {68--81},
  year      = {2020},
  url       = {https://doi.org/10.4018/IJDCF.2020100106},
  doi       = {10.4018/IJDCF.2020100106},
  timestamp = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhengLW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BaiSLW19,
  author    = {Jian Bai and
               Yao Sun and
               Ting Li and
               Dingkang Wang},
  title     = {Applying Horner's Rule to Optimize Lightweight {MDS} Matrices},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {82--96},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100106},
  doi       = {10.4018/IJDCF.2019100106},
  timestamp = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BaiSLW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BorraT19,
  author    = {Surekha Borra and
               Rohit M. Thanki},
  title     = {A {FRT} - {SVD} Based Blind Medical Watermarking Technique for Telemedicine
               Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {2},
  pages     = {13--33},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019040102},
  doi       = {10.4018/IJDCF.2019040102},
  timestamp = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BorraT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChengFYS19,
  author    = {Yuqiao Cheng and
               Zhengxin Fu and
               Bin Yu and
               Gang Shen},
  title     = {General Construction for Extended Visual Cryptography Scheme Using
               {QR} Codes},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {1--17},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010101},
  doi       = {10.4018/IJDCF.2019010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChengFYS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLLLX19,
  author    = {Xinchao Huang and
               Zihan Liu and
               Wei Lu and
               Hongmei Liu and
               Shijun Xiang},
  title     = {Fast and Effective Copy-Move Detection of Digital Audio Based on Auto
               Segment},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {2},
  pages     = {47--62},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019040104},
  doi       = {10.4018/IJDCF.2019040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuangLLLX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HussainBAL19,
  author    = {Md. Muzakkir Hussain and
               M. M. Sufyan Beg and
               Mohammad Saad Alam and
               Shahedul Haque Laskar},
  title     = {Big Data Analytics Platforms for Electric Vehicle Integration in Transport
               Oriented Smart Cities: Computing Platforms for Platforms for Electric
               Vehicle Integration in Smart Cities},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {3},
  pages     = {23--42},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019070102},
  doi       = {10.4018/IJDCF.2019070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HussainBAL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/JiangWCL19,
  author    = {Wei Jiang and
               Xianda Wu and
               Xiang Cui and
               Chaoge Liu},
  title     = {A Highly Efficient Remote Access Trojan Detection Method},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {1--13},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100101},
  doi       = {10.4018/IJDCF.2019100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/JiangWCL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiWYL19,
  author    = {Jian Li and
               Jinwei Wang and
               Shuang Yu and
               Xiangyang Luo},
  title     = {A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {100--113},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010108},
  doi       = {10.4018/IJDCF.2019010108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiWYL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYLDJ19,
  author    = {Hanlin Liu and
               Jingju Liu and
               Xuehu Yan and
               Lintao Liu and
               Wanmeng Ding and
               Yue Jiang},
  title     = {A Novel Behavior Steganography Model Based on Secret Sharing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {97--117},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100107},
  doi       = {10.4018/IJDCF.2019100107},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuLYLDJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongLP19,
  author    = {Min Long and
               You Li and
               Fei Peng},
  title     = {Dynamic Provable Data Possession of Multiple Copies in Cloud Storage
               Based on Full-Node of {AVL} Tree},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {126--137},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010110},
  doi       = {10.4018/IJDCF.2019010110},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LongLP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuGLL19,
  author    = {Yu Lu and
               Lingchen Gu and
               Ju Liu and
               Peng Lan},
  title     = {Performance Evaluation and Scheme Selection of Person Re-Identification
               Algorithms in Video Surveillance},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {50--65},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100104},
  doi       = {10.4018/IJDCF.2019100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LuGLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MaWL19,
  author    = {Bin Ma and
               Xiao{-}Yu Wang and
               Bing Li},
  title     = {A New Kind of High Capacity and Security Reversible Data Hiding Scheme},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {118--129},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100108},
  doi       = {10.4018/IJDCF.2019100108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MaWL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MakkaouiHE19,
  author    = {Khalid El Makkaoui and
               Abderrahim Beni Hssane and
               Abdellah Ezzati},
  title     = {Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting
               Data Confidentiality in Cloud Computing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {3},
  pages     = {90--102},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019070105},
  doi       = {10.4018/IJDCF.2019070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MakkaouiHE19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MalikWWA19,
  author    = {Asad Malik and
               Hongxia Wang and
               Hanzhou Wu and
               Sani M. Abdullahi},
  title     = {Reversible Data Hiding with Multiple Data for Multiple Users in an
               Encrypted Image},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {46--61},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010104},
  doi       = {10.4018/IJDCF.2019010104},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MalikWWA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengYWZK19,
  author    = {Anjie Peng and
               Gao Yu and
               Yadong Wu and
               Qiong Zhang and
               Xiangui Kang},
  title     = {A Universal Image Forensics of Smoothing Filtering},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {18--28},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010102},
  doi       = {10.4018/IJDCF.2019010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengYWZK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/QianWZF19,
  author    = {Zhenxing Qian and
               Zichi Wang and
               Xinpeng Zhang and
               Guorui Feng},
  title     = {Breaking Steganography: Slight Modification with Distortion Minimization},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {114--125},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010109},
  doi       = {10.4018/IJDCF.2019010109},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/QianWZF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShahBK19,
  author    = {Junaid Latief Shah and
               Heena Farooq Bhat and
               Asif Iqbal Khan},
  title     = {CloudIoT: Towards Seamless and Secure Integration of Cloud Computing
               With Internet of Things},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {3},
  pages     = {1--22},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019070101},
  doi       = {10.4018/IJDCF.2019070101},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ShahBK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SheelaST19,
  author    = {S. J. Sheela and
               K. V. Suresh and
               Deepaknath Tandur},
  title     = {Secured Transmission of Clinical Signals Using Hyperchaotic {DNA}
               Confusion and Diffusion Transform},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {3},
  pages     = {43--64},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019070103},
  doi       = {10.4018/IJDCF.2019070103},
  timestamp = {Tue, 18 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SheelaST19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/VinayakumarSP19,
  author    = {R. Vinayakumar and
               K. P. Soman and
               Prabaharan Poornachandran},
  title     = {A Comparative Analysis of Deep Learning Approaches for Network Intrusion
               Detection Systems (N-IDSs): Deep Learning for N-IDSs},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {3},
  pages     = {65--89},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019070104},
  doi       = {10.4018/IJDCF.2019070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/VinayakumarSP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNZ19,
  author    = {Xinyi Wang and
               Shaozhang Niu and
               Jiwei Zhang},
  title     = {Digital Image Forensics Based on {CFA} Interpolation Feature and Gaussian
               Mixture Model},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {2},
  pages     = {1--12},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019040101},
  doi       = {10.4018/IJDCF.2019040101},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangNZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangYZ19,
  author    = {Zichi Wang and
               Zhaoxia Yin and
               Xinpeng Zhang},
  title     = {Asymmetric Distortion Function for {JPEG} Steganography Using Block
               Artifact Compensation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {90--99},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010107},
  doi       = {10.4018/IJDCF.2019010107},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangYZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuDHZ19,
  author    = {Yuanxin Wu and
               Wen Diao and
               Dongdong Hou and
               Weiming Zhang},
  title     = {Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel
               Correlation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {29--45},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010103},
  doi       = {10.4018/IJDCF.2019010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WuDHZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuZSC19,
  author    = {Yanpeng Wu and
               Huiji Zhang and
               Yi Sun and
               Minghui Chen},
  title     = {Steganalysis of {AMR} Based on Statistical Features of Pitch Delay},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {66--81},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100105},
  doi       = {10.4018/IJDCF.2019100105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WuZSC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaLZST19,
  author    = {Shuangkui Xia and
               Meihua Liu and
               Xinchen Zhang and
               Hong Sun and
               Mao Tian},
  title     = {Exploiting Routing Strategy of {DTN} for Message Forwarding in Information
               Hiding Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {2},
  pages     = {34--46},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019040103},
  doi       = {10.4018/IJDCF.2019040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/XiaLZST19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XieYQM19,
  author    = {Dawei Xie and
               Haining Yang and
               Jing Qin and
               Jixin Ma},
  title     = {Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing
               Polynomials Evaluation to a Malicious Cloud},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {14--27},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100102},
  doi       = {10.4018/IJDCF.2019100102},
  timestamp = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/XieYQM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangHHP19,
  author    = {Jichen Yang and
               Qianhua He and
               Yongjian Hu and
               Weiqiang Pan},
  title     = {CBC-Based Synthetic Speech Detection},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {2},
  pages     = {63--74},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019040105},
  doi       = {10.4018/IJDCF.2019040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YangHHP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLWZL19,
  author    = {Cong Zhang and
               Yuanan Liu and
               Fan Wu and
               Lidong Zhai and
               Hui Lu},
  title     = {Analysis of WeChat Subscription Influence Based on Topic Diffusion},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {130--148},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100109},
  doi       = {10.4018/IJDCF.2019100109},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangLWZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangNZ19,
  author    = {Mengmeng Zhang and
               Rongrong Ni and
               Yao Zhao},
  title     = {A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {4},
  pages     = {28--49},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019100103},
  doi       = {10.4018/IJDCF.2019100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangNZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhongLMWX19,
  author    = {Ping Zhong and
               Mengdi Li and
               Kai Mu and
               Juan Wen and
               Yiming Xue},
  title     = {Image Steganalysis in High-Dimensional Feature Spaces with Proximal
               Support Vector Machine},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {78--89},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010106},
  doi       = {10.4018/IJDCF.2019010106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhongLMWX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuZG19,
  author    = {Jie Zhu and
               Xianfeng Zhao and
               Qingxiao Guan},
  title     = {Detecting and Distinguishing Adaptive and Non-Adaptive Steganography
               by Image Segmentation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {11},
  number    = {1},
  pages     = {62--77},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010105},
  doi       = {10.4018/IJDCF.2019010105},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhuZG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbdullahiWM18,
  author    = {Sani M. Abdullahi and
               Hongxia Wang and
               Asad Malik},
  title     = {Fingerprint Image Hashing Based on Minutiae Points and Shape Context},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {1--20},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100101},
  doi       = {10.4018/IJDCF.2018100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AbdullahiWM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbulaishH18,
  author    = {Muhammad Abulaish and
               Nur Al Hasan Haldar},
  title     = {Advances in Digital Forensics Frameworks and Tools: {A} Comparative
               Insight and Ranking},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {95--119},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040106},
  doi       = {10.4018/IJDCF.2018040106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AbulaishH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDCQ18,
  author    = {Guangxuan Chen and
               Liping Ding and
               Guangxiao Chen and
               Panke Qin},
  title     = {Reliable Security Strategy for Message-Oriented Middleware},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {12--23},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010102},
  doi       = {10.4018/IJDCF.2018010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenDCQ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDDZQCL18,
  author    = {Guangxuan Chen and
               Liping Ding and
               Jin Du and
               Guomin Zhou and
               Panke Qin and
               Guangxiao Chen and
               Qiang Liu},
  title     = {Trust Evaluation Strategy for Single Sign-on Solution in Cloud},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {1--11},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010101},
  doi       = {10.4018/IJDCF.2018010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenDDZQCL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenP18,
  author    = {Juan Chen and
               Fei Peng},
  title     = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {67--78},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010106},
  doi       = {10.4018/IJDCF.2018010106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenX18,
  author    = {Kai Chen and
               Dawen Xu},
  title     = {An Efficient Reversible Data Hiding Scheme for Encrypted Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {1--22},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040101},
  doi       = {10.4018/IJDCF.2018040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DingLYL18,
  author    = {Wanmeng Ding and
               Kesheng Liu and
               Xuehu Yan and
               Lintao Liu},
  title     = {Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {120--136},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040107},
  doi       = {10.4018/IJDCF.2018040107},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DingLYL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DongZHL18,
  author    = {Xiaojuan Dong and
               Weiming Zhang and
               Xianjun Hu and
               Keyang Liu},
  title     = {A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten
               for the Outsourced Plain Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {118--139},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100109},
  doi       = {10.4018/IJDCF.2018100109},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DongZHL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoGZL18,
  author    = {Lin Gao and
               Tiegang Gao and
               Jie Zhao and
               Yonglei Liu},
  title     = {Reversible Watermarking in Digital Image Using {PVO} and {RDWT}},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {40--55},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040103},
  doi       = {10.4018/IJDCF.2018040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GaoGZL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoHGC18,
  author    = {Hang Gao and
               Mengting Hu and
               Tiegang Gao and
               Renhong Cheng},
  title     = {Random Grid and Reversible Watermarking-Based On Verifiable Secret
               Sharing for Outsourcing Images in Cloud},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {24--39},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010103},
  doi       = {10.4018/IJDCF.2018010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GaoHGC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoLW18,
  author    = {Teng Guo and
               Feng Liu and
               Wen Wang},
  title     = {Visual Gambling},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {43--49},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070104},
  doi       = {10.4018/IJDCF.2018070104},
  timestamp = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuoLW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiL18,
  author    = {Peng Li and
               Zuquan Liu},
  title     = {An Improved Essential Secret Image Sharing Scheme with Smaller Shadow
               Size},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {78--94},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070107},
  doi       = {10.4018/IJDCF.2018070107},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiangFXWY18,
  author    = {Zhuoqian Liang and
               Bingwen Feng and
               Xuba Xu and
               Xiaotian Wu and
               Tao Yang},
  title     = {Geometrically Invariant Image Watermarking Using Histogram Adjustment},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {54--66},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010105},
  doi       = {10.4018/IJDCF.2018010105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiangFXWY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLGR18,
  author    = {Xiaoxi Liu and
               Ju Liu and
               Lingchen Gu and
               Yannan Ren},
  title     = {Keyframe-Based Vehicle Surveillance Video Retrieval},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {52--61},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100104},
  doi       = {10.4018/IJDCF.2018100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuLGR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLL18,
  author    = {Yimin Liu and
               Wenyan Liu and
               Xiangyang Luo},
  title     = {Survey on the Indoor Localization Technique of Wi-Fi Access Points},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {27--42},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070103},
  doi       = {10.4018/IJDCF.2018070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuZNT18,
  author    = {Lu Liu and
               Yao Zhao and
               Rongrong Ni and
               Qi Tian},
  title     = {Copy-Move Forgery Localization Using Convolutional Neural Networks
               and {CFA} Features},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {140--155},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100110},
  doi       = {10.4018/IJDCF.2018100110},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuZNT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongPG18,
  author    = {Min Long and
               Fei Peng and
               Xiaoqing Gong},
  title     = {A Format-Compliant Encryption for Secure {HEVC} Video Sharing in Multimedia
               Social Network},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {23--39},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040102},
  doi       = {10.4018/IJDCF.2018040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LongPG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McKeagueC18,
  author    = {Jonathan McKeague and
               Kevin Curran},
  title     = {Detecting the Use of Anonymous Proxies},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {74--94},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040105},
  doi       = {10.4018/IJDCF.2018040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/McKeagueC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengWL18,
  author    = {Fei Peng and
               Shuai{-}ping Wang and
               Min Long},
  title     = {Print-Scan Resilient Binary Map Watermarking Based on {DCT} and Scrambling},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {80--89},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100106},
  doi       = {10.4018/IJDCF.2018100106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RanjanSKP18,
  author    = {Preetish Ranjan and
               Vrijendra Singh and
               Prabhat Kumar and
               Satya Prakash},
  title     = {Models for the Detection of Malicious Intent People in Society},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {15--26},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070102},
  doi       = {10.4018/IJDCF.2018070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/RanjanSKP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RenNY18,
  author    = {Yueqiu Ren and
               Minh Nguyen and
               Wei{-}Qi Yan},
  title     = {Real-Time Recognition of Series Seven New Zealand Banknotes},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {50--65},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070105},
  doi       = {10.4018/IJDCF.2018070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/RenNY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TuXX18,
  author    = {Min Tu and
               Shiyang Xu and
               Jianfeng Xu},
  title     = {Evaluation Method of Public Transportation System Based on Fuzzy Cloud
               Model},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {36--51},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100103},
  doi       = {10.4018/IJDCF.2018100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TuXX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLLXZW18,
  author    = {Ruxin Wang and
               Wei Lu and
               Jixian Li and
               Shijun Xiang and
               Xianfeng Zhao and
               Jinwei Wang},
  title     = {Digital Image Splicing Detection Based on Markov Features in {QDCT}
               and {QWT} Domain},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {90--107},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100107},
  doi       = {10.4018/IJDCF.2018100107},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangLLXZW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuSFLLL18,
  author    = {Fan Wu and
               Ran Sun and
               Wenhao Fan and
               Yuanan Liu and
               Feng Liu and
               Hui Lu},
  title     = {A Privacy Protection Approach Based on Android Application's Runtime
               Behavior Monitor and Control},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {95--113},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070108},
  doi       = {10.4018/IJDCF.2018070108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WuSFLLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiongTZ18,
  author    = {Jianying Xiong and
               Min Tu and
               Ying Zhou},
  title     = {Using Weighted Similarity to Assess Risk of Illegal Fund Raising in
               Online {P2P} Lending},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {62--79},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100105},
  doi       = {10.4018/IJDCF.2018100105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/XiongTZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLM18,
  author    = {Xuehu Yan and
               Yuliang Lu and
               Lintao Liu and
               Duohe Ma},
  title     = {Image Secret Sharing Construction for General Access Structure with
               Meaningful Share},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {66--77},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070106},
  doi       = {10.4018/IJDCF.2018070106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YanLLM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanWL18,
  author    = {Wei Qi Yan and
               Xiaotian Wu and
               Feng Liu},
  title     = {Progressive Scrambling for Social Media},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {56--73},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040104},
  doi       = {10.4018/IJDCF.2018040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YanWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YeHCQ18,
  author    = {Qing Ye and
               Mingxing Hu and
               Guangxuan Chen and
               Panke Qin},
  title     = {An Improved Encryption Scheme for Traitor Tracing from Lattice},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {21--35},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100102},
  doi       = {10.4018/IJDCF.2018100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YeHCQ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YueLML18,
  author    = {Chen Yue and
               Tianliang Lu and
               Cai Manchun and
               Jingying Li},
  title     = {Evaluation of the Attack Effect Based on Improved Grey Clustering
               Model},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {92--100},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010108},
  doi       = {10.4018/IJDCF.2018010108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YueLML18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YutingGDK18,
  author    = {Sun Yuting and
               Jing Guo and
               Ling Du and
               Yongzhen Ke},
  title     = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {3},
  pages     = {1--14},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018070101},
  doi       = {10.4018/IJDCF.2018070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YutingGDK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangC18,
  author    = {Xuan Zhang and
               K. P. Chow},
  title     = {A Framework for Dark Web Threat Intelligence Analysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {4},
  pages     = {108--117},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018100108},
  doi       = {10.4018/IJDCF.2018100108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangHC18,
  author    = {Ping Zhang and
               Yijun He and
               Kam{-}Pui Chow},
  title     = {Fraud Track on Secure Electronic Check System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {2},
  pages     = {137--144},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018040108},
  doi       = {10.4018/IJDCF.2018040108},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangHC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangYXG18,
  author    = {Shun Zhang and
               Liang Yang and
               Xihao Xu and
               Tiegang Gao},
  title     = {Secure Steganography in {JPEG} Images Based on Histogram Modification
               and Hyper Chaotic System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {40--53},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010104},
  doi       = {10.4018/IJDCF.2018010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangYXG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhouYSY18,
  author    = {Lei Zhou and
               Wei Qi Yan and
               Yun Shu and
               Jian Yu},
  title     = {{CVSS:} {A} Cloud-Based Visual Surveillance System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {10},
  number    = {1},
  pages     = {79--91},
  year      = {2018},
  url       = {https://doi.org/10.4018/IJDCF.2018010107},
  doi       = {10.4018/IJDCF.2018010107},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhouYSY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ahmed17,
  author    = {Abdulghani Ali Ahmed},
  title     = {Investigation Approach for Network Attack Intention Recognition},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {1},
  pages     = {17--38},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017010102},
  doi       = {10.4018/IJDCF.2017010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Ahmed17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AizeziJAM17,
  author    = {Yasen Aizezi and
               Anwar Jamal and
               Ruxianguli Abudurexiti and
               Mutalipu Muming},
  title     = {Research on Digital Forensics Based on Uyghur Web Text Classification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {30--39},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100103},
  doi       = {10.4018/IJDCF.2017100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AizeziJAM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLYL17,
  author    = {Zhe Chen and
               Jicang Lu and
               Pengfei Yang and
               Xiangyang Luo},
  title     = {Recognizing Substitution Steganography of Spatial Domain Based on
               the Characteristics of Pixels Correlation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {48--61},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100105},
  doi       = {10.4018/IJDCF.2017100105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenPLL17,
  author    = {Juan Chen and
               Fei Peng and
               Jie Li and
               Min Long},
  title     = {A Lossless Watermarking for 3D {STL} Model Based on Entity Rearrangement
               and Bit Mapping},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {2},
  pages     = {25--37},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017040103},
  doi       = {10.4018/IJDCF.2017040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenPLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DiZ17,
  author    = {Hong Di and
               Xin Zhang},
  title     = {Deception Detection by Hybrid-Pair Wireless fNIRS System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {2},
  pages     = {15--24},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017040102},
  doi       = {10.4018/IJDCF.2017040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DiZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuLQ17,
  author    = {Lingchen Gu and
               Ju Liu and
               Aixi Qu},
  title     = {Performance Evaluation and Scheme Selection of Shot Boundary Detection
               and Keyframe Extraction in Content-Based Video Retrieval},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {15--29},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100102},
  doi       = {10.4018/IJDCF.2017100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuLQ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoJLW17,
  author    = {Teng Guo and
               Jian Jiao and
               Feng Liu and
               Wen Wang},
  title     = {On the Pixel Expansion of Visual Cryptography Scheme},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {2},
  pages     = {38--44},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017040104},
  doi       = {10.4018/IJDCF.2017040104},
  timestamp = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuoJLW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Liu17,
  author    = {Zhi Jun Liu},
  title     = {A Cyber Crime Investigation Model Based on Case Characteristics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {40--47},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100104},
  doi       = {10.4018/IJDCF.2017100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Liu17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYW17,
  author    = {Lintao Liu and
               Yuliang Lu and
               Xuehu Yan and
               Song Wan},
  title     = {A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic
               Mean},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {28--37},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070103},
  doi       = {10.4018/IJDCF.2017070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuLYW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuWSZ17,
  author    = {Xin Liu and
               Shen Wang and
               Jianzhi Sang and
               Weizhe Zhang},
  title     = {A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic
               Matrix {VSS}},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {1--10},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070101},
  doi       = {10.4018/IJDCF.2017070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuWSZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuSYB17,
  author    = {Jia Lu and
               Jun Shen and
               Wei Qi Yan and
               Boris Bacic},
  title     = {An Empirical Study for Human Behavior Analysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {11--27},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070102},
  doi       = {10.4018/IJDCF.2017070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LuSYB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17,
  author    = {Padma Lochan Pradhan},
  title     = {Dynamic Semi-Group {CIA} Pattern Optimizing the Risk on {RTS}},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {1},
  pages     = {51--70},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017010104},
  doi       = {10.4018/IJDCF.2017010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Pradhan17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17a,
  author    = {Padma Lochan Pradhan},
  title     = {Proposed Round Robin {CIA} Pattern on {RTS} for Risk Assessment},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {1},
  pages     = {71--85},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017010105},
  doi       = {10.4018/IJDCF.2017010105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Pradhan17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLQ17,
  author    = {Fang Sun and
               Zhenghui Liu and
               Chuanda Qi},
  title     = {Speech Content Authentication Scheme based on High-Capacity Watermark
               Embedding},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {2},
  pages     = {1--14},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017040101},
  doi       = {10.4018/IJDCF.2017040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SunLQ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TsimperidisRK17,
  author    = {Ioannis Tsimperidis and
               Shahin Rostami and
               Vasilios Katos},
  title     = {Age Detection Through Keystroke Dynamics from User Authentication
               Failures},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {1},
  pages     = {1--16},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017010101},
  doi       = {10.4018/IJDCF.2017010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TsimperidisRK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WanLYL17,
  author    = {Song Wan and
               Yuliang Lu and
               Xuehu Yan and
               Lintao Liu},
  title     = {A Novel Visual Secret Sharing Scheme Based on {QR} Codes},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {38--48},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070104},
  doi       = {10.4018/IJDCF.2017070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WanLYL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Wang17,
  author    = {Ning Wang},
  title     = {A Knowledge Model of Digital Evidence Review Elements Based on Ontology},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {49--57},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070105},
  doi       = {10.4018/IJDCF.2017070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Wang17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNY17,
  author    = {Jia Wang and
               Minh Ngueyn and
               WeiQi Yan},
  title     = {A Framework of Event-Driven Traffic Ticketing System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {1},
  pages     = {39--50},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017010103},
  doi       = {10.4018/IJDCF.2017010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangNY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangWY17,
  author    = {Guangyu Wang and
               Xiaotian Wu and
               WeiQi Yan},
  title     = {The State-of-the-Art Technology of Currency Identification: {A} Comparative
               Study},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {3},
  pages     = {58--72},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017070106},
  doi       = {10.4018/IJDCF.2017070106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangWY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLWDL17,
  author    = {Xuehu Yan and
               Yuliang Lu and
               Lintao Liu and
               Song Wan and
               Wanmeng Ding and
               Hanlin Liu},
  title     = {Exploiting the Homomorphic Property of Visual Cryptography},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {2},
  pages     = {45--56},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017040105},
  doi       = {10.4018/IJDCF.2017040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YanLLWDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuGZCC17,
  author    = {Jie Zhu and
               Qingxiao Guan and
               Xianfeng Zhao and
               Yun Cao and
               Gong Chen},
  title     = {A Steganalytic Scheme Based on Classifier Selection Using Joint Image
               Characteristics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {1--14},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100101},
  doi       = {10.4018/IJDCF.2017100101},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhuGZCC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuY17,
  author    = {Alex Zhu and
               Wei Qi Yan},
  title     = {Exploring Defense of {SQL} Injection Attack in Penetration Testing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {9},
  number    = {4},
  pages     = {62--71},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100106},
  doi       = {10.4018/IJDCF.2017100106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhuY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Abdullah16,
  author    = {Nurul Azma Abdullah},
  title     = {X{\_}myKarve: Non-Contiguous {JPEG} File Carver},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {63--84},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070105},
  doi       = {10.4018/IJDCF.2016070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Abdullah16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ch16,
  author    = {Ch. Rupa},
  title     = {Squint Pixel Steganography: {A} Novel Approach to Detect Digital Crimes
               and Recovery of Medical Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {4},
  pages     = {37--47},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016100104},
  doi       = {10.4018/IJDCF.2016100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Ch16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Cho16,
  author    = {Gyu{-}Sang Cho},
  title     = {A New Timestamp Digital Forensic Method Using a Modified Superincreasing
               Sequence},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {11--33},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070102},
  doi       = {10.4018/IJDCF.2016070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Cho16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CuiY16,
  author    = {Wei Cui and
               Wei Qi Yan},
  title     = {A Scheme for Face Recognition in Complex Environments},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {1},
  pages     = {26--36},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016010102},
  doi       = {10.4018/IJDCF.2016010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/CuiY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FangL16,
  author    = {Cheng Fang and
               Bo Ya Liu},
  title     = {Exploration of Web Page Structural Patterns Based on Request Dependency
               Graph Decomposition},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {4},
  pages     = {1--13},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016100101},
  doi       = {10.4018/IJDCF.2016100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/FangL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuNY16,
  author    = {Datong Gu and
               Minh Nguyen and
               WeiQi Yan},
  title     = {Cross Models for Twin Recognition},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {4},
  pages     = {26--36},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016100103},
  doi       = {10.4018/IJDCF.2016100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuNY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuLML16,
  author    = {Chunlin Lu and
               Yue Li and
               Mingjie Ma and
               Na Li},
  title     = {A Hybrid {NIDS} Model Using Artificial Neural Network and {D-S} Evidence},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {1},
  pages     = {37--50},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016010103},
  doi       = {10.4018/IJDCF.2016010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LuLML16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MireDMP16,
  author    = {Archana V. Mire and
               Sanjay B. Dhok and
               Naresh J. Mistry and
               Prakash D. Porey},
  title     = {Tampering Localization in Double Compressed Images by Investigating
               Noise Quantization},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {46--62},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070104},
  doi       = {10.4018/IJDCF.2016070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MireDMP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShengG16,
  author    = {Guorui Sheng and
               Tiegang Gao},
  title     = {Detection of Seam-Carving Image Based on Benford's Law for Forensic
               Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {1},
  pages     = {51--61},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016010104},
  doi       = {10.4018/IJDCF.2016010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ShengG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunZDWL16,
  author    = {Fenggang Sun and
               Lidong Zhai and
               Yue{-}Jin Du and
               Peng Wang and
               Jun Li},
  title     = {Design of Mobile Botnet Based on Open Service},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {1--10},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070101},
  doi       = {10.4018/IJDCF.2016070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SunZDWL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TsaiHLC16,
  author    = {Yuan{-}Yu Tsai and
               Yao{-}Hsien Huang and
               Ruo{-}Jhu Lin and
               Chi{-}Shiang Chan},
  title     = {An Adjustable Interpolation-based Data Hiding Algorithm Based on {LSB}
               Substitution and Histogram Shifting},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {2},
  pages     = {48--61},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016040105},
  doi       = {10.4018/IJDCF.2016040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TsaiHLC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Wang16,
  author    = {Nana Wang},
  title     = {Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons
               in 2D Vector Maps},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {1},
  pages     = {1--25},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016010101},
  doi       = {10.4018/IJDCF.2016010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Wang16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLY16,
  author    = {Guangyu Wang and
               Feng Liu and
               Wei Qi Yan},
  title     = {Basic Visual Cryptography Using Braille},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {85--93},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070106},
  doi       = {10.4018/IJDCF.2016070106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangLY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLYL16,
  author    = {Ping Wang and
               Xiangyang Luo and
               Chunfang Yang and
               Fenlin Liu},
  title     = {Improving Scanned Binary Image Watermarking Based On Additive Model
               and Sampling},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {2},
  pages     = {36--47},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016040104},
  doi       = {10.4018/IJDCF.2016040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangLYL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangY16,
  author    = {Jia Wang and
               Wei Qi Yan},
  title     = {BP-Neural Network for Plate Number Recognition},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {3},
  pages     = {34--45},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016070103},
  doi       = {10.4018/IJDCF.2016070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangC16,
  author    = {Zhihai Yang and
               Zhongmin Cai},
  title     = {Detecting Anomalous Ratings in Collaborative Filtering Recommender
               Systems},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {2},
  pages     = {16--26},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016040102},
  doi       = {10.4018/IJDCF.2016040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YangC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangGXG16,
  author    = {Liang Yang and
               Tiegang Gao and
               Yan Xuan and
               Hang Gao},
  title     = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram
               of Run Length},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {2},
  pages     = {27--35},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016040103},
  doi       = {10.4018/IJDCF.2016040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YangGXG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoWGGY16,
  author    = {Jie Zhao and
               Qiuzi Wang and
               Jichang Guo and
               Lin Gao and
               Fusheng Yang},
  title     = {An Overview on Passive Image Forensics Technology for Automatic Computer
               Forgery},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {4},
  pages     = {14--25},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016100102},
  doi       = {10.4018/IJDCF.2016100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhaoWGGY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoZY16,
  author    = {Xianfeng Zhao and
               Jie Zhu and
               Haibo Yu},
  title     = {On More Paradigms of Steganalysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {8},
  number    = {2},
  pages     = {1--15},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJDCF.2016040101},
  doi       = {10.4018/IJDCF.2016040101},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhaoZY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AchumbaOED15,
  author    = {Ifeyinwa Eucharia Achumba and
               Kennedy Chinedu Okafor and
               Gloria N. Ezeh and
               Uchenna Hermes Diala},
  title     = {OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud
               Forensic Spyware Robot},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {2},
  pages     = {31--52},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015040103},
  doi       = {10.4018/IJDCF.2015040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AchumbaOED15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AzzouziK15,
  author    = {Abdeslam El Azzouzi and
               Kamal Eddine El Kadiri},
  title     = {Semantic System for Attacks and Intrusions Detection},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {4},
  pages     = {19--32},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015100102},
  doi       = {10.4018/IJDCF.2015100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AzzouziK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CurranS15,
  author    = {Kevin Curran and
               Andrew Snodgrass},
  title     = {A Novel Cue based Picture Word Shape Character Password Creation Scheme},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {3},
  pages     = {37--59},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015070103},
  doi       = {10.4018/IJDCF.2015070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/CurranS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FaheemKL15,
  author    = {Muhammad Faheem and
               M. Tahar Kechadi and
               Nhien{-}An Le{-}Khac},
  title     = {The State of the Art Forensic Techniques in Mobile Cloud Environment:
               {A} Survey, Challenges and Current Trends},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {2},
  pages     = {1--19},
  year      = {2015},
  url       = {https://doi.org/10.4018/ijdcf.2015040101},
  doi       = {10.4018/ijdcf.2015040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/FaheemKL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoGZ15,
  author    = {Lin Gao and
               Tiegang Gao and
               Jie Zhao},
  title     = {Reversible Watermarking in Medical Image Using {RDWT} and Sub-Sample},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {4},
  pages     = {1--18},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015100101},
  doi       = {10.4018/IJDCF.2015100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GaoGZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GarhwalY15,
  author    = {Abhimanyu Singh Garhwal and
               Wei Qi Yan},
  title     = {Evaluations of Image Degradation from Multiple Scan-Print},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {4},
  pages     = {55--65},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015100104},
  doi       = {10.4018/IJDCF.2015100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GarhwalY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoAT15,
  author    = {Yuanfang Guo and
               Oscar C. Au and
               Ketan Tang},
  title     = {Watermark Embedding for Multiscale Error Diffused Halftone Images
               by Adopting Visual Cryptography},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {1},
  pages     = {51--68},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015010103},
  doi       = {10.4018/IJDCF.2015010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuoAT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongLP15,
  author    = {Min Long and
               Yan Liu and
               Fei Peng},
  title     = {A Semi-Fragile Reversible Watermarking for 2D {CAD} Engineering Graphics
               with Accurate Tampering Localization},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {3},
  pages     = {1--18},
  year      = {2015},
  url       = {https://doi.org/10.4018/ijdcf.2015070101},
  doi       = {10.4018/ijdcf.2015070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LongLP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ManimuruganN15,
  author    = {Manimurugan Shanmuganathan and
               C. Narmatha},
  title     = {Secure and Efficient Medical Image Transmission by New Tailored Visual
               Cryptography Scheme with {LS} Compressions},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {1},
  pages     = {26--50},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015010102},
  doi       = {10.4018/IJDCF.2015010102},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ManimuruganN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MireDMP15,
  author    = {Archana V. Mire and
               Sanjay B. Dhok and
               Narendra J. Mistry and
               Prakash D. Porey},
  title     = {Localization of Tampering Created with Facebook Images by Analyzing
               Block Factor Histogram Voting},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {4},
  pages     = {33--54},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015100103},
  doi       = {10.4018/IJDCF.2015100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MireDMP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PratBL15,
  author    = {Lionel Prat and
               Cheryl Baker and
               Nhien{-}An Le{-}Khac},
  title     = {MapExif: An Image Scanning and Mapping Tool for Investigators},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {2},
  pages     = {53--78},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015040104},
  doi       = {10.4018/IJDCF.2015040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PratBL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SagheerA15,
  author    = {Ali Makki Sagheer and
               Laith Hamid Abed},
  title     = {Visual Secret Sharing Without Pixel Expansion},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {2},
  pages     = {20--30},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015040102},
  doi       = {10.4018/IJDCF.2015040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SagheerA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TongYY15,
  author    = {Yi Jie Tong and
               Wei Qi Yan and
               Jin Yu},
  title     = {Analysis of a Secure Virtual Desktop Infrastructure System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {1},
  pages     = {69--84},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015010104},
  doi       = {10.4018/IJDCF.2015010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TongYY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WanHLHZZM15,
  author    = {Xuejiao Wan and
               Jingsha He and
               Gongzheng Liu and
               Na Huang and
               Xingye Zhu and
               Bin Zhao and
               Yonghao Mai},
  title     = {Survey of Digital Forensics Technologies and Tools for Android based
               Intelligent Devices},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {1},
  pages     = {1--25},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015010101},
  doi       = {10.4018/IJDCF.2015010101},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WanHLHZZM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangZZ15,
  author    = {Nana Wang and
               Xiangjun Zhao and
               Han Zhang},
  title     = {Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {3},
  pages     = {60--80},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015070104},
  doi       = {10.4018/IJDCF.2015070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangZZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLW15,
  author    = {Fan Zhang and
               Zhenghui Liu and
               Hongxia Wang},
  title     = {A Secure Speech Content Authentication Algorithm Based on Discrete
               Fractional Fourier Transform},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {7},
  number    = {3},
  pages     = {19--36},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJDCF.2015070102},
  doi       = {10.4018/IJDCF.2015070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangLW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BhaleraoR14,
  author    = {Abhir Bhalerao and
               Gregory Reynolds},
  title     = {Ruler Detection for Autoscaling Forensic Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {1},
  pages     = {9--27},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014010102},
  doi       = {10.4018/ijdcf.2014010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BhaleraoR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChandranY14,
  author    = {Rahul Chandran and
               Wei Qi Yan},
  title     = {Attack Graph Analysis for Network Anti-Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {1},
  pages     = {28--50},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014010103},
  doi       = {10.4018/ijdcf.2014010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChandranY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoG14,
  author    = {Lin Gao and
               Tiegang Gao},
  title     = {A Novel Medical Image Tamper Detection and Recovery Scheme using {LSB}
               Embedding and {PWLCM}},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {2},
  pages     = {1--22},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014040101},
  doi       = {10.4018/ijdcf.2014040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GaoG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuanWL14,
  author    = {Yu Guan and
               Xingjie Wei and
               Chang{-}Tsun Li},
  title     = {On the Generalization Power of Face and Gait in Gender Recognition},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {1},
  pages     = {1--8},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014010101},
  doi       = {10.4018/ijdcf.2014010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuanWL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HanQFZ14,
  author    = {Xiyu Han and
               Zhenxing Qian and
               Guorui Feng and
               Xinpeng Zhang},
  title     = {Reversible Data Hiding in Encrypted Images Based on Image Interpolation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {3},
  pages     = {16--29},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014070102},
  doi       = {10.4018/ijdcf.2014070102},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HanQFZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuZY14,
  author    = {Xiaocheng Hu and
               Weiming Zhang and
               Nenghai Yu},
  title     = {Optimizing Non-Local Pixel Predictors for Reversible Data Hiding},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {3},
  pages     = {1--15},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014070101},
  doi       = {10.4018/ijdcf.2014070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuZY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiCL14,
  author    = {Jia{-}Hong Li and
               Tzungher Chen and
               Wei{-}Bin Lee},
  title     = {Tattooing Attack: {A} New Type of Watermarking Attacks on Image Authentication},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {3},
  pages     = {30--46},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014070103},
  doi       = {10.4018/ijdcf.2014070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiCL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PhongY14,
  author    = {Chiem Trieu Phong and
               Wei Qi Yan},
  title     = {An Overview of Penetration Testing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {4},
  pages     = {50--74},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014100104},
  doi       = {10.4018/ijdcf.2014100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PhongY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SekharS14,
  author    = {Resmi Sekhar and
               Shaji Ramaswamy Swarnammal},
  title     = {A Methodological Review on Copy-Move Forgery Detection for Image Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {4},
  pages     = {34--49},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014100103},
  doi       = {10.4018/ijdcf.2014100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SekharS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShangYWX14,
  author    = {Yueyun Shang and
               Dengpan Ye and
               Zhuo Wei and
               Yajuan Xie},
  title     = {GPU-Based {MPEG-2} to Secure Scalable Video Transcoding},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {2},
  pages     = {52--69},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014040104},
  doi       = {10.4018/ijdcf.2014040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ShangYWX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShengGZ14,
  author    = {Guorui Sheng and
               Tiegang Gao and
               Shun Zhang},
  title     = {Detection of Content-Aware Image Resizing for Forensic Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {2},
  pages     = {23--39},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014040102},
  doi       = {10.4018/ijdcf.2014040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ShengGZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TangMZY14,
  author    = {Qi Tang and
               Guoli Ma and
               Weiming Zhang and
               Nenghai Yu},
  title     = {Reversible Data Hiding for {DNA} Sequences and Its Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {4},
  pages     = {1--13},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014100101},
  doi       = {10.4018/ijdcf.2014100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TangMZY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XieR14,
  author    = {Li Xie and
               Yanli Ren},
  title     = {Efficient Anonymous Identity-Based Broadcast Encryption without Random
               Oracles},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {2},
  pages     = {40--51},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014040103},
  doi       = {10.4018/ijdcf.2014040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/XieR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangG14,
  author    = {Qunting Yang and
               Tiegang Gao},
  title     = {Robust Reversible Data Hiding Scheme Based on Gravity Center Difference},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {4},
  pages     = {14--33},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014100102},
  doi       = {10.4018/ijdcf.2014100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YangG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangG14,
  author    = {Shun Zhang and
               Tiegang Gao},
  title     = {Visible Watermarking Scheme for Quick Response Code Based on Reversible
               Data Hiding},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {3},
  pages     = {47--63},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014070104},
  doi       = {10.4018/ijdcf.2014070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangGY14,
  author    = {Shun Zhang and
               Tiegang Gao and
               Fusheng Yang},
  title     = {A High Capacity Reversible Data Hiding Scheme Based on Multi-Level
               Integer {DWT} and Histogram Modification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {6},
  number    = {1},
  pages     = {51--64},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijdcf.2014010104},
  doi       = {10.4018/ijdcf.2014010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangGY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AdeyemiRA13,
  author    = {Adeyemi R. Ikuesan and
               Shukor Abd Razak and
               Nor Amira Nor Azhan},
  title     = {A Review of Current Research in Network Forensic Analysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {1},
  pages     = {1--26},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013010101},
  doi       = {10.4018/jdcf.2013010101},
  timestamp = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AdeyemiRA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AndriotisTMIO13,
  author    = {Panagiotis Andriotis and
               Zacharias Tzermias and
               Anthi Mparmpaki and
               Sotiris Ioannidis and
               George C. Oikonomou},
  title     = {Multilevel Visualization Using Enhanced Social Network Analysis with
               Smartphone Data},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {4},
  pages     = {34--54},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijdcf.2013100103},
  doi       = {10.4018/ijdcf.2013100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AndriotisTMIO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AuerBEUU13,
  author    = {Stefan Auer and
               Alexander Bliem and
               Dominik Engel and
               Andreas Uhl and
               Andreas Unterweger},
  title     = {Bitstream-Based {JPEG} Encryption in Real-time},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {3},
  pages     = {1--14},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013070101},
  doi       = {10.4018/jdcf.2013070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AuerBEUU13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AzizBI13,
  author    = {Benjamin Aziz and
               Clive Blackwell and
               Shareeful Islam},
  title     = {A Framework for Digital Forensics and Investigations: The Goal-Driven
               Approach},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {2},
  pages     = {1--22},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013040101},
  doi       = {10.4018/jdcf.2013040101},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AzizBI13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BarniFT13,
  author    = {Mauro Barni and
               Marco Fontani and
               Benedetta Tondi},
  title     = {A Universal Attack Against Histogram-Based Image Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {3},
  pages     = {35--52},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013070103},
  doi       = {10.4018/jdcf.2013070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BarniFT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FontaniBRPB13,
  author    = {Marco Fontani and
               Tiziano Bianchi and
               Alessia De Rosa and
               Alessandro Piva and
               Mauro Barni},
  title     = {A Forensic Tool for Investigating Image Forgeries},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {4},
  pages     = {15--33},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijdcf.2013100102},
  doi       = {10.4018/ijdcf.2013100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/FontaniBRPB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GnasigamoneyS13,
  author    = {Selvi Salome Gnasigamoney and
               Manjit Singh Sidhu},
  title     = {E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and
               Adolescents},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {2},
  pages     = {50--62},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013040104},
  doi       = {10.4018/jdcf.2013040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GnasigamoneyS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KaravarsamisNBP13,
  author    = {Sotiris Karavarsamis and
               Nikos Ntarmos and
               Konstantinos Blekas and
               Ioannis Pitas},
  title     = {Detecting Pornographic Images by Localizing Skin ROIs},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {1},
  pages     = {39--53},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013010103},
  doi       = {10.4018/jdcf.2013010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/KaravarsamisNBP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuW13,
  author    = {Zhenghui Liu and
               Hongxia Wang},
  title     = {A Speech Content Authentication Algorithm Based on Pseudo-Zernike
               Moments in {DCT} Domain},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {3},
  pages     = {15--34},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013070102},
  doi       = {10.4018/jdcf.2013070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongW13,
  author    = {Min Long and
               Hao Wang},
  title     = {Collision Analysis and Improvement of a Parallel Hash Function based
               on Chaotic Maps with Changeable Parameters},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {2},
  pages     = {23--34},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013040102},
  doi       = {10.4018/jdcf.2013040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LongW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuYX13,
  author    = {Laijie Lu and
               Gaobo Yang and
               Ming Xia},
  title     = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {3},
  pages     = {53--65},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013070104},
  doi       = {10.4018/jdcf.2013070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LuYX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MartinOJ13,
  author    = {Thomas Anthony Martin and
               Laurence O'Toole and
               Andrew Jones},
  title     = {On the Reliability of Cryptopometry},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {1},
  pages     = {27--38},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013010102},
  doi       = {10.4018/jdcf.2013010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MartinOJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PanagakisK13,
  author    = {Yannis Panagakis and
               Constantine Kotropoulos},
  title     = {Telephone Handset Identification by Collaborative Representations},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {4},
  pages     = {1--14},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijdcf.2013100101},
  doi       = {10.4018/ijdcf.2013100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PanagakisK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengZL13,
  author    = {Fei Peng and
               Xiao{-}wen Zhu and
               Min Long},
  title     = {An Effective Selective Encryption Scheme for {H.264} Video based on
               Chaotic Qi System},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {2},
  pages     = {35--49},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013040103},
  doi       = {10.4018/jdcf.2013040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShebaroPC13,
  author    = {Bilal Shebaro and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Jedidiah R. Crandall},
  title     = {Exploiting Geometrical Structure for Forensic Applications of Timing
               Inference Channels},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {1},
  pages     = {54--69},
  year      = {2013},
  url       = {https://doi.org/10.4018/jdcf.2013010104},
  doi       = {10.4018/jdcf.2013010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ShebaroPC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/alZahirI13,
  author    = {Saif alZahir and
               Md Wahedul Islam},
  title     = {Audio Watermarking Scheme Using IMFs and {HHT} for Forensic Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {5},
  number    = {4},
  pages     = {55--67},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijdcf.2013100104},
  doi       = {10.4018/ijdcf.2013100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/alZahirI13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BattenPK12,
  author    = {Lynn Margaret Batten and
               Lei Pan and
               Nisar Khan},
  title     = {Hypothesis Generation and Testing in Event Profiling for Digital Forensic
               Investigations},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {4},
  pages     = {1--14},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012100101},
  doi       = {10.4018/jdcf.2012100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/BattenPK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLN12,
  author    = {Likai Chen and
               Wei Lu and
               Jiangqun Ni},
  title     = {An Image Region Description Method Based on Step Sector Statistics
               and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {1},
  pages     = {49--62},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012010104},
  doi       = {10.4018/jdcf.2012010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenLN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GidwaniAYI12,
  author    = {T. Gidwani and
               M. J. Argano and
               Wei{-}Qi Yan and
               F. Issa},
  title     = {A Comprehensive Survey of Event Analytics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {3},
  pages     = {33--46},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012070103},
  doi       = {10.4018/jdcf.2012070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GidwaniAYI12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GrisposSG12,
  author    = {George Grispos and
               Tim Storer and
               William Bradley Glisson},
  title     = {Calm Before the Storm: The Challenges of Cloud Computing in Digital
               Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {2},
  pages     = {28--48},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012040103},
  doi       = {10.4018/jdcf.2012040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Grobler12,
  author    = {Marthie Grobler},
  title     = {The Need for Digital Evidence Standardisation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {2},
  pages     = {1--12},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012040101},
  doi       = {10.4018/jdcf.2012040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaggertyCHT12,
  author    = {John Haggerty and
               Mark C. Casson and
               Sheryllynne Haggerty and
               Mark John Taylor},
  title     = {A Framework for the Forensic Analysis of User Interaction with Social
               Media},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {4},
  pages     = {15--30},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012100102},
  doi       = {10.4018/jdcf.2012100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HaggertyCHT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HayatiP12,
  author    = {Pedram Hayati and
               Vidyasagar M. Potdar},
  title     = {Spam 2.0 State of the Art},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {1},
  pages     = {17--36},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012010102},
  doi       = {10.4018/jdcf.2012010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HayatiP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuLWL12,
  author    = {Yongjian Hu and
               Chang{-}Tsun Li and
               Yufei Wang and
               Bei{-}Bei Liu},
  title     = {An Improved Fingerprinting Algorithm for Detection of Video Frame
               Duplication Forgery},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {3},
  pages     = {20--32},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012070102},
  doi       = {10.4018/jdcf.2012070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuLWL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ishihara12,
  author    = {Shunichi Ishihara},
  title     = {Probabilistic Evaluation of {SMS} Messages as Forensic Evidence: Likelihood
               Ratio Based Approach with Lexical Features},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {3},
  pages     = {47--57},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012070104},
  doi       = {10.4018/jdcf.2012070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Ishihara12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LempereurMS12,
  author    = {Brett Lempereur and
               Madjid Merabti and
               Qi Shi},
  title     = {Pypette: {A} Platform for the Evaluation of Live Digital Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {4},
  pages     = {31--46},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012100103},
  doi       = {10.4018/jdcf.2012100103},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LempereurMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MarcialisCR12,
  author    = {Gian Luca Marcialis and
               Pietro Coli and
               Fabio Roli},
  title     = {Fingerprint Liveness Detection Based on Fake Finger Characteristics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {3},
  pages     = {1--19},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012070101},
  doi       = {10.4018/jdcf.2012070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MarcialisCR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengLL12,
  author    = {Fei Peng and
               Juan Liu and
               Min Long},
  title     = {Identification of Natural Images and Computer Generated Graphics Based
               on Hybrid Features},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {1},
  pages     = {1--16},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012010101},
  doi       = {10.4018/jdcf.2012010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengLL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLYS12,
  author    = {Wei Sun and
               Zhe{-}Ming Lu and
               Fa{-}Xin Yu and
               Rong{-}Jun Shen},
  title     = {Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based
               Audio Retrieval},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {2},
  pages     = {49--69},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012040104},
  doi       = {10.4018/jdcf.2012040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SunLYS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/VlachopoulosMC12,
  author    = {Konstantinos Vlachopoulos and
               Emmanouil Magkos and
               Vassilios Chrissikopoulos},
  title     = {A Model for Hybrid Evidence Investigation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {4},
  pages     = {47--62},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012100104},
  doi       = {10.4018/jdcf.2012100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/VlachopoulosMC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNWZ12,
  author    = {Chang Wang and
               Jiangqun Ni and
               Chuntao Wang and
               Ruiyu Zhang},
  title     = {An Adaptive {JPEG} Steganographic Scheme Based on the Block Entropy
               of {DCT} Coefficients},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {2},
  pages     = {13--27},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012040102},
  doi       = {10.4018/jdcf.2012040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangNWZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSZNC12,
  author    = {Lifang Yu and
               Yun Q. Shi and
               Yao Zhao and
               Rongrong Ni and
               Gang Cao},
  title     = {A Study on Embedding Efficiency of Matrix Encoding},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {4},
  number    = {1},
  pages     = {37--48},
  year      = {2012},
  url       = {https://doi.org/10.4018/jdcf.2012010103},
  doi       = {10.4018/jdcf.2012010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YuSZNC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbouzakharCC11,
  author    = {Nasser Abouzakhar and
               Huankai Chen and
               Bruce Christianson},
  title     = {An Enhanced Fuzzy {ARM} Approach for Intrusion Detection},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {2},
  pages     = {41--61},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011040104},
  doi       = {10.4018/jdcf.2011040104},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AbouzakharCC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AnandJW11,
  author    = {Sarabjot Singh Anand and
               Arshad Jhumka and
               Kimberley Wade},
  title     = {Towards the Ordering of Events from Multiple Textual Evidence Sources},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {2},
  pages     = {16--34},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011040102},
  doi       = {10.4018/jdcf.2011040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AnandJW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuruNMD11,
  author    = {D. S. Guru and
               K. B. Nagasundara and
               S. Manjunath and
               R. Dinesh},
  title     = {An Approach for Hand Vein Representation and Indexing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {2},
  pages     = {1--15},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011040101},
  doi       = {10.4018/jdcf.2011040101},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuruNMD11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaggertyKLT11,
  author    = {John Haggerty and
               Alexander J. Karran and
               David J. Lamb and
               Mark John Taylor},
  title     = {A Framework for the Forensic Investigation of Unstructured Email Relationship
               Data},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {3},
  pages     = {1--18},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011070101},
  doi       = {10.4018/jdcf.2011070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HaggertyKLT11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuLZL11,
  author    = {Yongjian Hu and
               Chang{-}Tsun Li and
               Changhui Zhou and
               Xufeng Lin},
  title     = {Source Camera Identification Issues: Forensic Features Selection and
               Robustness},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {4},
  pages     = {1--15},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011100101},
  doi       = {10.4018/jdcf.2011100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HuLZL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KalajdzicPT11,
  author    = {Kenan Kalajdzic and
               Ahmed Patel and
               Mona Taghavi},
  title     = {Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning
               Man-in-the-Middle Attacks on Switched Ethernet LANs},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {3},
  pages     = {50--60},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011070104},
  doi       = {10.4018/jdcf.2011070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/KalajdzicPT11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MagklarasFP11,
  author    = {George Magklaras and
               Steven Furnell and
               Maria Papadaki},
  title     = {{LUARM:} An Audit Engine for Insider Misuse Detection},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {3},
  pages     = {37--49},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011070103},
  doi       = {10.4018/jdcf.2011070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MagklarasFP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MichalasKP11,
  author    = {Antonis Michalas and
               Nikos Komninos and
               Neeli R. Prasad},
  title     = {Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {1},
  pages     = {14--36},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011010102},
  doi       = {10.4018/jdcf.2011010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MichalasKP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengL11,
  author    = {Fei Peng and
               Yu{-}Zhou Lei},
  title     = {An Effective Reversible Watermarking for 2D {CAD} Engineering Graphics
               Based on Improved {QIM}},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {1},
  pages     = {53--69},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011010104},
  doi       = {10.4018/jdcf.2011010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengL11a,
  author    = {Fei Peng and
               Honglin Li},
  title     = {A Steganalysis Method for 2D Engineering Graphics Based on the Statistic
               of Geometric Features},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {2},
  pages     = {35--40},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011040103},
  doi       = {10.4018/jdcf.2011040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PengL11a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SoobhanLL11,
  author    = {Ahmad Ryad Soobhany and
               Richard Leary and
               K. P. Lam},
  title     = {On the Performance of Li's Unsupervised Image Classifier and the Optimal
               Cropping Position of Images for Forensic Investigations},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {1},
  pages     = {1--13},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011010101},
  doi       = {10.4018/jdcf.2011010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SoobhanLL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SpyridopoulosK11,
  author    = {Theodoros Spyridopoulos and
               Vasilios Katos},
  title     = {Requirements for a Forensically Ready Cloud Storage Service},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {3},
  pages     = {19--36},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011070102},
  doi       = {10.4018/jdcf.2011070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SpyridopoulosK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TiwariM11,
  author    = {Rajesh Kumar Tiwari and
               G. Sahoo Mesra},
  title     = {Microsoft Power Point Files: {A} Secure Steganographic Carrier},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {4},
  pages     = {16--28},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011100102},
  doi       = {10.4018/jdcf.2011100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TiwariM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TiwariS11,
  author    = {Rajesh Kumar Tiwari and
               G. Sahoo Mesra},
  title     = {Microsoft Excel File: {A} Steganographic Carrier File},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {1},
  pages     = {37--52},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011010103},
  doi       = {10.4018/jdcf.2011010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/TiwariS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangL11,
  author    = {Chun{-}Ning Yang and
               Zhe{-}Ming Lu},
  title     = {A Blind Image Watermarking Scheme Utilizing {BTC} Bitplanes},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {4},
  pages     = {42--53},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011100104},
  doi       = {10.4018/jdcf.2011100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/YangL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZaharisMTIP11,
  author    = {Alexandros Zaharis and
               Adamantini Martini and
               Theo Tryfonas and
               Christos Ilioudis and
               George Pangalos},
  title     = {Lightweight Steganalysis Based on Image Reconstruction and Lead Digit
               Distribution Analysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {3},
  number    = {4},
  pages     = {29--41},
  year      = {2011},
  url       = {https://doi.org/10.4018/jdcf.2011100103},
  doi       = {10.4018/jdcf.2011100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZaharisMTIP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AmeriniCCPP10,
  author    = {Irene Amerini and
               Roberto Caldelli and
               Vito Cappellini and
               Francesco Picchioni and
               Alessandro Piva},
  title     = {Estimate of {PRNU} Noise Based on Different Noise Models for Source
               Camera Identification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {2},
  pages     = {21--33},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010040102},
  doi       = {10.4018/jdcf.2010040102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/AmeriniCCPP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaldelliAP10,
  author    = {Roberto Caldelli and
               Irene Amerini and
               Francesco Picchioni},
  title     = {A DFT-Based Analysis to Discern Between Camera and Scanned Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {1},
  pages     = {21--29},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010010102},
  doi       = {10.4018/jdcf.2010010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/CaldelliAP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChennammaR10,
  author    = {H. R. Chennamma and
               Lalitha Rangarajan},
  title     = {Source Camera Identification Based on Sensor Readout Noise},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {3},
  pages     = {28--42},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010070103},
  doi       = {10.4018/jdcf.2010070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChennammaR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CurranRPC10,
  author    = {Kevin Curran and
               Andrew Robinson and
               Stephen Peacocke and
               Sean Cassidy},
  title     = {Mobile Phone Forensic Analysis},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {3},
  pages     = {15--27},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010070102},
  doi       = {10.4018/jdcf.2010070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/CurranRPC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DavisS10,
  author    = {Michael Davis and
               Alice Sedsman},
  title     = {Grey Areas - The Legal Dimensions of Cloud Computing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {1},
  pages     = {30--39},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010010103},
  doi       = {10.4018/jdcf.2010010103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/DavisS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Edmond10,
  author    = {Gary Edmond},
  title     = {Suspect sciences? Evidentiary Problems with Emerging Technologies},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {1},
  pages     = {40--72},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010010104},
  doi       = {10.4018/jdcf.2010010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Edmond10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaltisSB10,
  author    = {Kosta Haltis and
               Matthew Sorell and
               Russell S. A. Brinkworth},
  title     = {A Biologically Inspired Smart Camera for Use in Surveillance Applications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {3},
  pages     = {1--14},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010070101},
  doi       = {10.4018/jdcf.2010070101},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/HaltisSB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KwittMU10,
  author    = {Roland Kwitt and
               Peter Meerwald and
               Andreas Uhl},
  title     = {Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree
               Complex Wavelet Transform Domain},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {2},
  pages     = {34--46},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010040103},
  doi       = {10.4018/jdcf.2010040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/KwittMU10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LaadjelBKY10,
  author    = {Moussadek Laadjel and
               Ahmed Bouridane and
               Fatih Kurugollu and
               WeiQi Yan},
  title     = {Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {4},
  pages     = {1--15},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010100101},
  doi       = {10.4018/jdcf.2010100101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LaadjelBKY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiR10,
  author    = {Qiming Li and
               Sujoy Roy},
  title     = {Secure Robust Hash Functions and Their Applications in Non-interactive
               Communications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {4},
  pages     = {51--62},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010100104},
  doi       = {10.4018/jdcf.2010100104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLZYL10,
  author    = {Jin Liu and
               Hefei Ling and
               Fuhao Zou and
               WeiQi Yan and
               Zhengding Lu},
  title     = {Digital Image Forensics Using Multi-Resolution Histograms},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {4},
  pages     = {37--50},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010100103},
  doi       = {10.4018/jdcf.2010100103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiuLZYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MatamL10,
  author    = {B. R. Matam and
               David Lowe},
  title     = {Watermark-Only Security Attack on {DM-QIM} Watermarking: Vulnerability
               to Guided Key Guessing},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {2},
  pages     = {64--87},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010040105},
  doi       = {10.4018/jdcf.2010040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MatamL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McGrathGC10,
  author    = {Niall McGrath and
               Pavel Gladyshev and
               Joe Carthy},
  title     = {Cryptopometry as a Methodology for Investigating Encrypted Material},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {1},
  pages     = {1--20},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010010101},
  doi       = {10.4018/jdcf.2010010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/McGrathGC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NiuKZ10,
  author    = {Yaqing Niu and
               Sridhar Krishnan and
               Qin Zhang},
  title     = {Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {4},
  pages     = {16--36},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010100102},
  doi       = {10.4018/jdcf.2010100102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/NiuKZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SamphaiboonD10,
  author    = {Natthawut Samphaiboon and
               Matthew M. Dailey},
  title     = {Steganography in Thai Text},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {3},
  pages     = {43--64},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010070104},
  doi       = {10.4018/jdcf.2010070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SamphaiboonD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WeirLY10,
  author    = {Jonathan Weir and
               Raymond Lau and
               WeiQi Yan},
  title     = {Digital Image Splicing Using Edges},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {4},
  pages     = {63--75},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010100105},
  doi       = {10.4018/jdcf.2010100105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WeirLY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zarri10,
  author    = {Gian Piero Zarri},
  title     = {A Conceptual Methodology for Dealing with Terrorism "Narratives"},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {2},
  pages     = {47--63},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010040104},
  doi       = {10.4018/jdcf.2010040104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Zarri10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoHS10,
  author    = {Xi Zhao and
               Anthony Tung Shuen Ho and
               Yun Q. Shi},
  title     = {Image Forensics Using Generalised Benford's Law for Improving Image
               Authentication Detection Rates in Semi-Fragile Watermarking},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {2},
  number    = {2},
  pages     = {1--20},
  year      = {2010},
  url       = {https://doi.org/10.4018/jdcf.2010040101},
  doi       = {10.4018/jdcf.2010040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhaoHS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDW09,
  author    = {Yan Chen and
               Xiaoqing Ding and
               Patrick S. P. Wang},
  title     = {Dynamic Structural Statistical Model Based Online Signature Verification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {3},
  pages     = {21--41},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009070102},
  doi       = {10.4018/jdcf.2009070102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenDW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChennammaRR09,
  author    = {H. R. Chennamma and
               Lalitha Rangarajan and
               M. S. Rao},
  title     = {Robust Near Duplicate Image Matching for Digital Image Forensics},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {3},
  pages     = {62--79},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009070104},
  doi       = {10.4018/jdcf.2009070104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChennammaRR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Eggendorfer09,
  author    = {Tobias Eggendorfer},
  title     = {Methods to Identify Spammers},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {55--68},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040105},
  doi       = {10.4018/jdcf.2009040105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Eggendorfer09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Garfinkel09,
  author    = {Simson L. Garfinkel},
  title     = {Providing Cryptographic Security and Evidentiary Chain-of-Custody
               with the Advanced Forensic Format, Library, and Tools},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {1--28},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010101},
  doi       = {10.4018/jdcf.2009010101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Garfinkel09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GottschalkK09,
  author    = {Petter Gottschalk and
               Ragnar Kristoffersen},
  title     = {Understanding the Process of Online Grooming: The Behavior of Men
               who Target Young People Online in Norway},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {4},
  pages     = {1--18},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009062401},
  doi       = {10.4018/jdcf.2009062401},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GottschalkK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuptaP09,
  author    = {Gaurav Gupta and
               Josef Pieprzyk},
  title     = {Reversible and Blind Database Watermarking Using Difference Expansion},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {42--54},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040104},
  doi       = {10.4018/jdcf.2009040104},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/GuptaP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Jin09,
  author    = {Hongxia Jin},
  title     = {Efficient Forensic Analysis for Anonymous Attack in Secure Content
               Distribution},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {59--74},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010104},
  doi       = {10.4018/jdcf.2009010104},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Jin09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ker09,
  author    = {Andrew D. Ker},
  title     = {Locally Square Distortion and Batch Steganographic Capacity},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {29--44},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010102},
  doi       = {10.4018/jdcf.2009010102},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Ker09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiL09,
  author    = {Chang{-}Tsun Li and
               Yue Li},
  title     = {Medical Images Authentication through Repetitive Index Modulation
               Based Watermarking},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {4},
  pages     = {32--39},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009062403},
  doi       = {10.4018/jdcf.2009062403},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiLW09,
  author    = {Chang{-}Tsun Li and
               Yue Li and
               Chia{-}Hung Wei},
  title     = {Protection of Digital Mammograms on PACSs Using Data Hiding Techniques},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {75--88},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010105},
  doi       = {10.4018/jdcf.2009010105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/LiLW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MaioranaCN09,
  author    = {Emanuele Maiorana and
               Patrizio Campisi and
               Alessandro Neri},
  title     = {Template Protection and Renewability for Dynamic Time Warping Based
               Biometric Signature Verification},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {4},
  pages     = {40--57},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009062404},
  doi       = {10.4018/jdcf.2009062404},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/MaioranaCN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NilssonL09,
  author    = {Dennis K. Nilsson and
               Ulf Larson},
  title     = {Conducting Forensic Investigations of Cyber Attacks on Automobile
               In-Vehicle Networks},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {28--41},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040103},
  doi       = {10.4018/jdcf.2009040103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/NilssonL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PoursoltanmohammadiS09,
  author    = {Amirsaman Poursoltanmohammadi and
               Matthew Sorell},
  title     = {Reliable Motion Detection, Location and Audit in Surveillance Video},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {4},
  pages     = {19--31},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009062402},
  doi       = {10.4018/jdcf.2009062402},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/PoursoltanmohammadiS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ridder09,
  author    = {Chris K. Ridder},
  title     = {Evidentiary Implications of Potential Security Weaknesses in Forensic
               Software},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {3},
  pages     = {80--91},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009070105},
  doi       = {10.4018/jdcf.2009070105},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Ridder09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SablatnigLGC09,
  author    = {Jan Sablatnig and
               Fritz Lehmann{-}Grube and
               Sven Grottke and
               Sabine Cikic},
  title     = {Dealing with Multiple Truths in Online Virtual Worlds},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {69--82},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040106},
  doi       = {10.4018/jdcf.2009040106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SablatnigLGC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SavoldiG09,
  author    = {Antonio Savoldi and
               Paolo Gubian},
  title     = {Volatile Memory Collection and Analysis for Windows Mission-Critical
               Computer Systems},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {3},
  pages     = {42--61},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009070103},
  doi       = {10.4018/jdcf.2009070103},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SavoldiG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SlayS09,
  author    = {Jill Slay and
               Matthew Simon},
  title     = {Voice Over {IP:} Privacy and Forensic Implications},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {89--101},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010106},
  doi       = {10.4018/jdcf.2009010106},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/SlayS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Sorell09,
  author    = {Matthew Sorell},
  title     = {Unexpected Artifacts in a Digital Photograph},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {1},
  pages     = {45--58},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009010103},
  doi       = {10.4018/jdcf.2009010103},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Sorell09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Sorell09a,
  author    = {Matthew Sorell},
  title     = {Conditions for Effective Detection and Identification of Primary Quantisation
               of Re-Quantized {JPEG} Images},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {13--27},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040102},
  doi       = {10.4018/jdcf.2009040102},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Sorell09a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Steel09,
  author    = {Chad M. S. Steel},
  title     = {Web-Based Child Pornography: Quantification and Qualification of Demand},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {4},
  pages     = {58--69},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009062405},
  doi       = {10.4018/jdcf.2009062405},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Steel09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Willassen09,
  author    = {Svein Yngvar Willassen},
  title     = {A Model Based Approach to Timestamp Evidence Interpretation},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {2},
  pages     = {1--12},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009040101},
  doi       = {10.4018/jdcf.2009040101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/Willassen09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangCCYW09,
  author    = {Chengcui Zhang and
               Xin Chen and
               Wei{-}bang Chen and
               Lin Yang and
               Gary Warner},
  title     = {Spam Image Clustering for Identifying Common Sources of Unsolicited
               Emails},
  journal   = {Int. J. Digit. Crime Forensics},
  volume    = {1},
  number    = {3},
  pages     = {1--20},
  year      = {2009},
  url       = {https://doi.org/10.4018/jdcf.2009070101},
  doi       = {10.4018/jdcf.2009070101},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ZhangCCYW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics