Search dblp for Publications

export results for "stream:streams/journals/ijdcf:"

 download as .bib file

@article{DBLP:journals/ijdcf/ChengQWW23,
  author       = {Shi Cheng and
                  Yan Qu and
                  Chuyue Wang and
                  Jie Wan},
  title        = {Assurance of Network Communication Information Security Based on Cyber-Physical
                  Fusion and Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332858},
  doi          = {10.4018/IJDCF.332858},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KumarSKS23,
  author       = {Vijay Kumar and
                  Sahil Sharma and
                  Chandan Kumar and
                  Aditya Kumar Sahu},
  title        = {Latest Trends in Deep Learning Techniques for Image Steganography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.318666},
  doi          = {10.4018/IJDCF.318666},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KumarSKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NichoAAMI23,
  author       = {Mathew Nicho and
                  Maha Alblooki and
                  Saeed AlMutiwei and
                  Christopher D. McDermott and
                  Olufemi Ilesanmi},
  title        = {A Crime Scene Reconstruction for Digital Forensic Analysis: An {SUV}
                  Case Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.327358},
  doi          = {10.4018/IJDCF.327358},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/NichoAAMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PanZLSYZ23,
  author       = {Heng Pan and
                  Yaoyao Zhang and
                  Jianmei Liu and
                  Xueming Si and
                  Zhongyuan Yao and
                  Liang Zhao},
  title        = {{MD-S3C3:} {A} Medical Data Secure Sharing Scheme With Cloud and Chain
                  Cooperation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.329219},
  doi          = {10.4018/IJDCF.329219},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PanZLSYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangDH23,
  author       = {Suzhen Wang and
                  Yongchen Deng and
                  Zhongbo Hu},
  title        = {Task Offloading in Cloud-Edge Environments: {A} Deep-Reinforcement-Learning-Based
                  Solution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--23},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332066},
  doi          = {10.4018/IJDCF.332066},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangXXSSC23,
  author       = {Wei Wang and
                  Longxing Xing and
                  Na Xu and
                  Jiatao Su and
                  Wenting Su and
                  Jiarong Cao},
  title        = {{UAV} Edge Caching Content Recommendation Algorithm Based on Graph
                  Neural Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332774},
  doi          = {10.4018/IJDCF.332774},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangXXSSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YaoJY23,
  author       = {Wenjun Yao and
                  Ying Jiang and
                  Yang Yang},
  title        = {The Metric for Automatic Code Generation Based on Dynamic Abstract
                  Syntax Tree},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.325062},
  doi          = {10.4018/IJDCF.325062},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YaoJY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zhang23,
  author       = {Dawei Zhang},
  title        = {Abnormality Retrieval Method of Laboratory Surveillance Video Based
                  on Deep Automatic Encoder},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.325224},
  doi          = {10.4018/IJDCF.325224},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuY23,
  author       = {Yuwen Zhu and
                  Lei Yu},
  title        = {Key Node Identification Based on Vulnerability Life Cycle and the
                  Importance of Network Topology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.317100},
  doi          = {10.4018/IJDCF.317100},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaiQLCLWYW22,
  author       = {Guiyan Cai and
                  Liang Qu and
                  Yongdong Li and
                  Guoan Cheng and
                  Xin Lu and
                  Yiqi Wang and
                  Fengqin Yao and
                  Shengke Wang},
  title        = {Semisupervised Surveillance Video Character Extraction and Recognition
                  With Attentional Learning Multiframe Fusion},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315745},
  doi          = {10.4018/IJDCF.315745},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaiQLCLWYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaiTZXF22,
  author       = {Zengyu Cai and
                  Chunchen Tan and
                  Jianwei Zhang and
                  Tengteng Xiao and
                  Yuan Feng},
  title        = {An Unhealthy Webpage Discovery System Based on Convolutional Neural
                  Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315614},
  doi          = {10.4018/IJDCF.315614},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaiTZXF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenHZXLX22,
  author       = {Wan Chen and
                  Daojun Han and
                  Lei Zhang and
                  Qi Xiao and
                  Qiuyue Li and
                  Hongzhen Xiang},
  title        = {A Model Study on Hierarchical Assisted Exploration of {RBAC}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302871},
  doi          = {10.4018/IJDCF.302871},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenHZXLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuaLJ22,
  author       = {Ye Hua and
                  Qu Xi Long and
                  Li Zhen Jin},
  title        = {Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302879},
  doi          = {10.4018/IJDCF.302879},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuaLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/JiangZLLSWQL22,
  author       = {Wenqian Jiang and
                  Ce Zhang and
                  Di Liu and
                  Kaiwei Liu and
                  Zhichao Sun and
                  Jianyuan Wang and
                  Zhongyin Qiu and
                  Weigong Lv},
  title        = {{SRGM} Decision Model Considering Cost-Reliability},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302873},
  doi          = {10.4018/IJDCF.302873},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/JiangZLLSWQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KaradshehAAAA22,
  author       = {Louay Karadsheh and
                  Haroun Alryalat and
                  Ja'far Alqatawna and
                  Samer Fawaz Alhawari and
                  Mufleh Amin Al{-}Jarrah},
  title        = {The Impact of Social Engineer Attack Phases on Improved Security Countermeasures:
                  Social Engineer Involvement as Mediating Variable},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {1},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.286762},
  doi          = {10.4018/IJDCF.286762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KaradshehAAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiangZWY22,
  author       = {Xiubo Liang and
                  Yu Zhao and
                  Junhan Wu and
                  Keting Yin},
  title        = {A Privacy Protection Scheme for Cross-Chain Transactions Based on
                  Group Signature and Relay Chain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302876},
  doi          = {10.4018/IJDCF.302876},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiangZWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuZLXZW22,
  author       = {Shannan Liu and
                  Ronghua Zhang and
                  Changzheng Liu and
                  Chenxi Xu and
                  Jie Zhou and
                  Jiaojiao Wang},
  title        = {Improvement of the {PBFT} Algorithm Based on Grouping and Reputation
                  Value Voting},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315615},
  doi          = {10.4018/IJDCF.315615},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuZLXZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangGWZL22,
  author       = {Jing Wang and
                  Jianhou Gan and
                  Jun Wang and
                  Juxiang Zhou and
                  Zeguang Lu},
  title        = {Face Anonymity Based on Facial Pose Consistency},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--12},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302872},
  doi          = {10.4018/IJDCF.302872},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangGWZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangWPZL22,
  author       = {Junchao Wang and
                  Jin Wei and
                  Jianmin Pang and
                  Fan Zhang and
                  Shunbin Li},
  title        = {Security Enhancement Through Compiler-Assisted Software Diversity
                  With Deep Reinforcement Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302878},
  doi          = {10.4018/IJDCF.302878},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangWPZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XuCTWGY22,
  author       = {Dawei Xu and
                  Tianxin Chen and
                  Zhonghua Tan and
                  Fudong Wu and
                  Jiaqi Gao and
                  Yunfan Yang},
  title        = {Web Vulnerability Detection Analyzer Based on Python},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--17},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302875},
  doi          = {10.4018/IJDCF.302875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XuCTWGY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuZZSLM22,
  author       = {Runde Yu and
                  Xianwei Zhang and
                  Yimeng Zhang and
                  Jianfeng Song and
                  Kang Liu and
                  Qiguang Miao},
  title        = {Design and Implementation of Identity Verification Software Based
                  on Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315796},
  doi          = {10.4018/IJDCF.315796},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuZZSLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZangSWYXL22,
  author       = {Dongmei Zang and
                  Xinlei Sheng and
                  Liya Wang and
                  Aimin Yang and
                  Tao Xue and
                  Jie Li},
  title        = {Research and Application of Warship Multiattribute Threat Assessment
                  Based on Improved {TOPSIS} Gray Association Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315288},
  doi          = {10.4018/IJDCF.315288},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZangSWYXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZengYWKF22,
  author       = {Chunyan Zeng and
                  Yao Yang and
                  Zhifeng Wang and
                  Shuai Kong and
                  Shixiong Feng},
  title        = {Audio Tampering Forensics Based on Representation Learning of {ENF}
                  Phase Sequence},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {1},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302894},
  doi          = {10.4018/IJDCF.302894},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZengYWKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangCZ22,
  author       = {Fan Zhang and
                  Wei Chen and
                  Yongqiong Zhu},
  title        = {Golden Eye: An OS-Independent Algorithm for Recovering Files From
                  Hard-Disk Raw Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315793},
  doi          = {10.4018/IJDCF.315793},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLY22,
  author       = {Shaobo Zhang and
                  Yuhang Liu and
                  Dequan Yang},
  title        = {A Novel {IDS} Securing Industrial Control System of Critical Infrastructure
                  Using Deception Technology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302874},
  doi          = {10.4018/IJDCF.302874},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangPYC22,
  author       = {Ran Zhang and
                  Zhihan Pan and
                  Yifeng Yin and
                  Zengyu Cai},
  title        = {A Model of Network Security Situation Assessment Based on {BPNN} Optimized
                  by {SAA-SSA}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302877},
  doi          = {10.4018/IJDCF.302877},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangPYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbulaishHJ21,
  author       = {Muhammad Abulaish and
                  Nur Al Hasan Haldar and
                  Jahiruddin},
  title        = {{P2DF:} {A} Privacy-Preserving Digital Forensics Framework},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.288547},
  doi          = {10.4018/IJDCF.288547},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbulaishHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Al-RoomIBSYMH21,
  author       = {Khalifa Al{-}Room and
                  Farkhund Iqbal and
                  Thar Baker and
                  Babar Shah and
                  Benjamin Yankson and
                  {\'{A}}ine MacDermott and
                  Patrick C. K. Hung},
  title        = {Drone Forensics: {A} Case Study of Digital Forensic Investigations
                  Conducted on Common Drone Models},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {1},
  pages        = {1--25},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJDCF.2021010101},
  doi          = {10.4018/IJDCF.2021010101},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Al-RoomIBSYMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaoLLZJDB21,
  author       = {Pengcheng Cao and
                  Weiwei Liu and
                  Guangjie Liu and
                  Jiangtao Zhai and
                  Xiaopeng Ji and
                  Yuewei Dai and
                  Huiwen Bai},
  title        = {Design a Wireless Covert Channel Based on Dither Analog Chaotic Code},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {115--133},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030108},
  doi          = {10.4018/IJDCF.2021030108},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaoLLZJDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaoSJDX21,
  author       = {Xiushi Cao and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Yi Dong and
                  Ke Xu},
  title        = {An Intra-Prediction Mode-Based Video Steganography With Secure Strategy},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa1},
  doi          = {10.4018/IJDCF.20210701.OA1},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaoSJDX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChSC21,
  author       = {Rupa Ch. and
                  Sumaiya Shaikh and
                  Mukesh Chinta},
  title        = {Multimedia Concealed Data Detection Using Quantitative Steganalysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {101--113},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa6},
  doi          = {10.4018/IJDCF.20210901.OA6},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChakiD21,
  author       = {Jyotismita Chaki and
                  Nilanjan Dey},
  title        = {Palmprint Recognition Using Hessian Matrix and Two-Component Partition
                  Method},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {1},
  pages        = {26--47},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJDCF.2021010102},
  doi          = {10.4018/IJDCF.2021010102},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChakiD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenCZL21,
  author       = {Guangxuan Chen and
                  Guangxiao Chen and
                  Lei Zhang and
                  Qiang Liu},
  title        = {An Incremental Acquisition Method for Web Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--13},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021110116},
  doi          = {10.4018/IJDCF.2021110116},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DasGV21,
  author       = {More Swami Das and
                  A. Govardhan and
                  Doddapaneni VijayaLakshmi},
  title        = {A Model of Cloud Forensic Application With Assurance of Cloud Log},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {114--129},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa7},
  doi          = {10.4018/IJDCF.20210901.OA7},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DasGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DingHZO21,
  author       = {Xiangling Ding and
                  Yanming Huang and
                  Dengyong Zhang and
                  Junlin Ouyang},
  title        = {Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation
                  via Measuring Irregularity of Optical Flow},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--13},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.295813},
  doi          = {10.4018/IJDCF.295813},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DingHZO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuYDCL21,
  author       = {Jin Du and
                  Feng Yuan and
                  Liping Ding and
                  Guangxuan Chen and
                  Xuehua Liu},
  title        = {Research on Threat Information Network Based on Link Prediction},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {94--102},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030106},
  doi          = {10.4018/IJDCF.2021030106},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuYDCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuanLGJZQ21,
  author       = {Xintao Duan and
                  Baoxia Li and
                  Daidou Guo and
                  Kai Jia and
                  En Zhang and
                  Chuan Qin},
  title        = {Coverless Information Hiding Based on {WGAN-GP} Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {57--70},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa5},
  doi          = {10.4018/IJDCF.20210701.OA5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuanLGJZQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GhoshSSP21,
  author       = {Partha Ghosh and
                  Dipankar Sarkar and
                  Joy Sharma and
                  Santanu Phadikar},
  title        = {An Intrusion Detection System Using Modified-Firefly Algorithm in
                  Cloud Environment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {77--93},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030105},
  doi          = {10.4018/IJDCF.2021030105},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GhoshSSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangHC21,
  author       = {Ning Huang and
                  Shuguang Huang and
                  Chao Chang},
  title        = {Automatic Generation of {ROP} Through Static Instructions Assignment
                  and Dynamic Memory Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {57--76},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030104},
  doi          = {10.4018/IJDCF.2021030104},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/JanaDBN21,
  author       = {Shantanu Jana and
                  Nibaran Das and
                  Subhadip Basu and
                  Mita Nasipuri},
  title        = {Survey of Human Gait Analysis and Recognition for Medical and Forensic
                  Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--20},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.289432},
  doi          = {10.4018/IJDCF.289432},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/JanaDBN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Kangsheng21,
  author       = {Bao Kangsheng},
  title        = {Information Hiding Model Based on Channel Construction of Orthogonal
                  Basis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {3},
  pages        = {1--18},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210501.oa1},
  doi          = {10.4018/IJDCF.20210501.OA1},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Kangsheng21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KeC21,
  author       = {Yongzhen Ke and
                  Yiping Cui},
  title        = {Multiple Fusion Strategies in Localization of Local Deformation Tampering},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {103--114},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030107},
  doi          = {10.4018/IJDCF.2021030107},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KeC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KeserwaniGPG21,
  author       = {Pankaj Kumar Keserwani and
                  Mahesh Chandra Govil and
                  Emmanuel S. Pilli and
                  Prajjval Govil},
  title        = {An Optimal {NIDS} for {VCN} Using Feature Selection and Deep Learning
                  Technique: {IDS} for {VCN}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--25},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa10},
  doi          = {10.4018/IJDCF.20211101.OA10},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KeserwaniGPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYXT21,
  author       = {Hanlin Liu and
                  Jingju Liu and
                  Xuehu Yan and
                  Pengfei Xue and
                  Dingwei Tan},
  title        = {An Audio Steganography Based on Run Length Encoding and Integer Wavelet
                  Transform},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {16--34},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030102},
  doi          = {10.4018/IJDCF.2021030102},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLYXT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuWMTW21,
  author       = {Lianshan Liu and
                  Xiaoli Wang and
                  Lingzhuang Meng and
                  Gang Tian and
                  Ting Wang},
  title        = {Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity
                  Verification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--14},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa9},
  doi          = {10.4018/IJDCF.20211101.OA9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuWMTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuX21,
  author       = {Yong Liu and
                  Dawen Xu},
  title        = {{HEVC} Information-Hiding Algorithm Based on Intra-Prediction and
                  Matrix Coding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa11},
  doi          = {10.4018/IJDCF.20211101.OA11},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuSW21,
  author       = {Hai Lu and
                  Liping Shao and
                  Qinglong Wang},
  title        = {A High Capacity Test Disguise Method Combined With Interpolation Backup
                  and Double Authentications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--23},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.295815},
  doi          = {10.4018/IJDCF.295815},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MengF21,
  author       = {Yitong Meng and
                  Jinlong Fei},
  title        = {Hidden Service Circuit Reconstruction Attacks Based on Middle Node
                  Traffic Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--30},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.288548},
  doi          = {10.4018/IJDCF.288548},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MengF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MillerCL21,
  author       = {Shane Miller and
                  Kevin Curran and
                  Tom Lunney},
  title        = {Identifying the Use of Anonymising Proxies to Conceal Source {IP}
                  Addresses},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--20},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa8},
  doi          = {10.4018/IJDCF.20211101.OA8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MillerCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MillerCL21a,
  author       = {Shane Miller and
                  Kevin Curran and
                  Tom Lunney},
  title        = {Detection of Anonymising Proxies Using Machine Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.286756},
  doi          = {10.4018/IJDCF.286756},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MillerCL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MittalB21,
  author       = {Ruchi Mittal and
                  Mahinder Pal Singh Bhatia},
  title        = {Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial
                  Trading Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {1},
  pages        = {79--93},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJDCF.2021010105},
  doi          = {10.4018/IJDCF.2021010105},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MittalB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MohanML21,
  author       = {Ashok Kumar Mohan and
                  Sethumadhavan Madathil and
                  K. V. Lakshmy},
  title        = {Holistic Analytics of Digital Artifacts: Unique Metadata Association
                  Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {78--100},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa5},
  doi          = {10.4018/IJDCF.20210901.OA5},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MohanML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Naaz21,
  author       = {Sameena Naaz},
  title        = {Detection of Phishing in Internet of Things Using Machine Learning
                  Approach},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030101},
  doi          = {10.4018/IJDCF.2021030101},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Naaz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PawarG21,
  author       = {Digambar Pawar and
                  Mayank Gajpal},
  title        = {Image Forensic Tool {(IFT):} Image Retrieval, Tampering Detection,
                  and Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.287606},
  doi          = {10.4018/IJDCF.287606},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PawarG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/QinZTXH21,
  author       = {Jiaohua Qin and
                  Zhuo Zhou and
                  Yun Tan and
                  Xuyu Xiang and
                  Zhibin He},
  title        = {A Big Data Text Coverless Information Hiding Based on Topic Distribution
                  and {TF-IDF}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {40--56},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa4},
  doi          = {10.4018/IJDCF.20210701.OA4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/QinZTXH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RJ21,
  author       = {Sunitha R. and
                  Chandrika J.},
  title        = {Malevolent Node Detection Based on Network Parameters Mining in Wireless
                  Sensor Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {130--144},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa8},
  doi          = {10.4018/IJDCF.20210901.OA8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RahmanT21,
  author       = {Rizwan Ur Rahman and
                  Deepak Singh Tomar},
  title        = {Web Bot Detection System Based on Divisive Clustering and K-Nearest
                  Neighbor Using Biostatistics Features Set},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--27},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa6},
  doi          = {10.4018/IJDCF.20211101.OA6},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RahmanT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ReddyR21,
  author       = {M. Sravan Kumar Reddy and
                  Dharmendra Singh Rajput},
  title        = {Design and Development of Ternary-Based Anomaly Detection in Semantic
                  Graphs Using Metaheuristic Algorithm},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {43--64},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa3},
  doi          = {10.4018/IJDCF.20210901.OA3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ReddyR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SahuK21,
  author       = {Ajay Kumar Sahu and
                  Ashish Kumar},
  title        = {A Novel Verification Protocol to Restrict Unconstitutional Access
                  of Information From Smart Card},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {1},
  pages        = {65--78},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJDCF.2021010104},
  doi          = {10.4018/IJDCF.2021010104},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SahuK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShiSJDX21,
  author       = {Henan Shi and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Yi Dong and
                  Ke Xu},
  title        = {A {HEVC} Video Steganalysis Against DCT/DST-Based Steganography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {3},
  pages        = {19--33},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210501.oa2},
  doi          = {10.4018/IJDCF.20210501.OA2},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShiSJDX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShreeD21,
  author       = {Barkha Shree and
                  Parneeta Dhaliwal},
  title        = {Behavioural Evidence Analysis: {A} Paradigm Shift in Digital Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {20--42},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa2},
  doi          = {10.4018/IJDCF.20210901.OA2},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShreeD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SomanR21,
  author       = {Rajashree Soman and
                  Sukumar R.},
  title        = {Secure Storage and Sharing of Visitor Images Generated by Smart Entrance
                  on Public Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {65--77},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa4},
  doi          = {10.4018/IJDCF.20210901.OA4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SomanR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SuKDL21,
  author       = {Tingting Su and
                  Yan Ke and
                  Yi Ding and
                  Jia Liu},
  title        = {Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {71--89},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa6},
  doi          = {10.4018/IJDCF.20210701.OA6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SuKDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TN21,
  author       = {Chethana H. T. and
                  Trisiladevi C. Nagavi},
  title        = {A New Framework for Matching Forensic Composite Sketches With Digital
                  Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {5},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210901.oa1},
  doi          = {10.4018/IJDCF.20210901.OA1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ThankiBK21,
  author       = {Rohit M. Thanki and
                  Surekha Borra and
                  Ashish Kothari},
  title        = {Fragile Watermarking Framework for Tamper Detection of Color Biometric
                  Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {2},
  pages        = {35--56},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.2021030103},
  doi          = {10.4018/IJDCF.2021030103},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ThankiBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangYZ21,
  author       = {Kaixi Wang and
                  Xiangmei Yu and
                  Ziyi Zou},
  title        = {A Coverless Text Steganography by Encoding the Chinese Characters'
                  Component Structures},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa4},
  doi          = {10.4018/IJDCF.20211101.OA4},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuWZZZG21,
  author       = {Shiqi Wu and
                  Bo Wang and
                  Jianxiang Zhao and
                  Mengnan Zhao and
                  Kun Zhong and
                  Yanqing Guo},
  title        = {Virtual Sample Generation and Ensemble Learning Based Image Source
                  Identification With Small Training Samples},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {3},
  pages        = {34--46},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210501.oa3},
  doi          = {10.4018/IJDCF.20210501.OA3},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuWZZZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuYLL21,
  author       = {Guan{-}Zhong Wu and
                  Xiangyu Yu and
                  Hui Liang and
                  Minting Li},
  title        = {Two-Step Image-in-Image Steganography via {GAN}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--12},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.295814},
  doi          = {10.4018/IJDCF.295814},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuYLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuZLYS21,
  author       = {Jianbin Wu and
                  Yang Zhang and
                  Chuwei Luo and
                  Lin Feng Yuan and
                  Xiao Kang Shen},
  title        = {A Modification-Free Steganography Algorithm Based on Image Classification
                  and {CNN}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {3},
  pages        = {47--58},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210501.oa4},
  doi          = {10.4018/IJDCF.20210501.OA4},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuZLYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaoLXZ21,
  author       = {Di Xiao and
                  Jia Liang and
                  Yanping Xiang and
                  Jiaqi Zhou},
  title        = {Cloud-Assisted Image Double Protection System With Encryption and
                  Data Hiding Based on Compressive Sensing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.295812},
  doi          = {10.4018/IJDCF.295812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiaoLXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YadavSG21,
  author       = {Sumit Kumar Yadav and
                  Kavita Sharma and
                  Ananya Gupta},
  title        = {SafeWomen: {A} Smart Device to Secure Women's Environment Using ATmega328
                  With an Android Tracking App},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {1},
  pages        = {48--64},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJDCF.2021010103},
  doi          = {10.4018/IJDCF.2021010103},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YadavSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangMZ21,
  author       = {Liuqing Yang and
                  Wei Meng and
                  Xudong Zhao},
  title        = {Color Image Encryption Using Angular Graph Fourier Transform},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {3},
  pages        = {59--82},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210501.oa5},
  doi          = {10.4018/IJDCF.20210501.OA5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuWLH21,
  author       = {Lei Yu and
                  Haoyu Wang and
                  Linyu Li and
                  Houhua He},
  title        = {Towards Automated Detection of Higher-Order Command Injection Vulnerabilities
                  in IoT Devices: Fuzzing With Dynamic Data Flow Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--14},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.286755},
  doi          = {10.4018/IJDCF.286755},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuWLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoWL21,
  author       = {Zheng Zhao and
                  Penghui Wang and
                  Wei Lu},
  title        = {Multi-Layer Fusion Neural Network for Deepfake Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {26--39},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa3},
  doi          = {10.4018/IJDCF.20210701.OA3},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoZLLLY21,
  author       = {Xuemei Zhao and
                  Tongtong Zhang and
                  Jun Liu and
                  Canju Lu and
                  Huan Lu and
                  Xuehu Yan},
  title        = {Applying Secret Image Sharing to Economics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {4},
  pages        = {16--25},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20210701.oa2},
  doi          = {10.4018/IJDCF.20210701.OA2},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoZLLLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuYS21,
  author       = {Alex Yao Chu Zhu and
                  Wei{-}Qi Yan and
                  Roopak Sinha},
  title        = {{ROP} Defense Using Trie Graph for System Security},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {13},
  number       = {6},
  pages        = {1--12},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijdcf.20211101.oa7},
  doi          = {10.4018/IJDCF.20211101.OA7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AlmutairiSRSYZM20,
  author       = {Ahmed Almutairi and
                  Behzad Shoarian Satari and
                  Carlos Rivas and
                  Cristian Florin Stanciu and
                  Mozhdeh Yamani and
                  Zahra Zohoorsaadat and
                  Serguei A. Mokhov},
  title        = {Evaluation of Autopsy and Volatility for Cybercrime Investigation:
                  {A} Forensic Lucid Case Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {58--89},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010104},
  doi          = {10.4018/IJDCF.2020010104},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AlmutairiSRSYZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BoppuruK20,
  author       = {Prathap Rudra Boppuru and
                  Ramesha Kenchappa},
  title        = {Spatio-Temporal Crime Analysis Using {KDE} and {ARIMA} Models in the
                  Indian Context},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100101},
  doi          = {10.4018/IJDCF.2020100101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BoppuruK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BouafifKI20,
  author       = {Hana Bouafif and
                  Faouzi Kamoun and
                  Farkhund Iqbal},
  title        = {Towards a Better Understanding of Drone Forensics: {A} Case Study
                  of Parrot {AR} Drone 2.0},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {35--57},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010103},
  doi          = {10.4018/IJDCF.2020010103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BouafifKI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenRZZ20,
  author       = {Xi Chen and
                  Fangming Ruan and
                  Lvyang Zhang and
                  Yang Zhao},
  title        = {Design of Cyberspace Security Talents Training System Based on Knowledge
                  Graph},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {44--53},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100104},
  doi          = {10.4018/IJDCF.2020100104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenRZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DeshmukhR20,
  author       = {Amar B. Deshmukh and
                  N. Usha Rani},
  title        = {Optimization-Driven Kernel and Deep Convolutional Neural Network for
                  Multi-View Face Video Super Resolution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {77--95},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070106},
  doi          = {10.4018/IJDCF.2020070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DeshmukhR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuDC20,
  author       = {Jin Du and
                  Liping Ding and
                  Guangxuan Chen},
  title        = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {111--121},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070108},
  doi          = {10.4018/IJDCF.2020070108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuFZWS20,
  author       = {Lili Du and
                  Yaqin Fan and
                  Lvyang Zhang and
                  Lianying Wang and
                  Tianhang Sun},
  title        = {A Summary of the Development of Cyber Security Threat Intelligence
                  Sharing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {54--67},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100105},
  doi          = {10.4018/IJDCF.2020100105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuFZWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangH20,
  author       = {Dan Huang and
                  Fangjun Huang},
  title        = {Reversible Data Hiding Based on Adaptive Block Selection Strategy},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {157--168},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010108},
  doi          = {10.4018/IJDCF.2020010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLT20,
  author       = {Chee Cheun Huang and
                  Chien Eao Lee and
                  Vrizlynn L. L. Thing},
  title        = {A Novel Video Forgery Detection Model Based on Triangular Polarity
                  Feature Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {14--34},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010102},
  doi          = {10.4018/IJDCF.2020010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLXH20,
  author       = {Wenjun Huang and
                  Chao Liang and
                  Chunxia Xiao and
                  Zhen Han},
  title        = {Video-Based Person Re-Identification With Unregulated Sequences},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {59--76},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040104},
  doi          = {10.4018/IJDCF.2020040104},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangLXH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KalashRMBWI20,
  author       = {Mahmoud Kalash and
                  Mrigank Rochan and
                  Noman Mohammed and
                  Neil D. B. Bruce and
                  Yang Wang and
                  Farkhund Iqbal},
  title        = {A Deep Learning Framework for Malware Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {90--108},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010105},
  doi          = {10.4018/IJDCF.2020010105},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KalashRMBWI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuQS20,
  author       = {Xin Liu and
                  RuiHua Qi and
                  Lin Shao},
  title        = {Joint Model-Based Attention for Spoken Language Understanding Task},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {32--43},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100103},
  doi          = {10.4018/IJDCF.2020100103},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuQS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MacDermottBBIS20,
  author       = {{\'{A}}ine MacDermott and
                  Thar Baker and
                  Paul Buck and
                  Farkhund Iqbal and
                  Qi Shi},
  title        = {The Internet of Things: Challenges and Considerations for Cybercrime
                  Investigations and Digital Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {1--13},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010101},
  doi          = {10.4018/IJDCF.2020010101},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MacDermottBBIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MokniDK20,
  author       = {Raouia Mokni and
                  Hassen Drira and
                  Monji Kherallah},
  title        = {Deep-Analysis of Palmprint Representation Based on Correlation Concept
                  for Human Biometrics Identification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {40--58},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040103},
  doi          = {10.4018/IJDCF.2020040103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MokniDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RaoTY20,
  author       = {Jingyuan Rao and
                  Min Tu and
                  Xuanjin Yang},
  title        = {Two Variations of Peer Intermediaries for Key Establishment in Sensor
                  Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070101},
  doi          = {10.4018/IJDCF.2020070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RaoTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SharmaAS20,
  author       = {Puneet Sharma and
                  Deepak Arora and
                  T. Sakthivel},
  title        = {Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile
                  Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {58--76},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070105},
  doi          = {10.4018/IJDCF.2020070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SharmaAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SureshS20,
  author       = {Gulivindala Suresh and
                  Chanamallu Srinivasarao},
  title        = {Copy Move Forgery Detection Through Differential Excitation Component-Based
                  Texture Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {27--44},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070103},
  doi          = {10.4018/IJDCF.2020070103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SureshS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TaoWYJ20,
  author       = {Biaoli Tao and
                  Rangding Wang and
                  Diqun Yan and
                  Chao Jin},
  title        = {Anti-Forensics of Double Compressed {MP3} Audio},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {45--57},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070104},
  doi          = {10.4018/IJDCF.2020070104},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TaoWYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangHLL20,
  author       = {Yufei Wang and
                  Yongjian Hu and
                  Alan Wee{-}Chung Liew and
                  Chang{-}Tsun Li},
  title        = {{ENF} Based Video Forgery Detection Algorithm},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {131--156},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010107},
  doi          = {10.4018/IJDCF.2020010107},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuLWLLFT20,
  author       = {Chao Wu and
                  Yuan'an Liu and
                  Fan Wu and
                  Feng Liu and
                  Hui Lu and
                  Wenhao Fan and
                  Bihua Tang},
  title        = {A Hybrid Intrusion Detection System for IoT Applications with Constrained
                  Resources},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {109--130},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010106},
  doi          = {10.4018/IJDCF.2020010106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuLWLLFT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaoXYLK20,
  author       = {Jinsheng Xiao and
                  Wenxin Xiong and
                  Yuan Yao and
                  Liang Li and
                  Reinhard Klette},
  title        = {Lane Detection Algorithm Based on Road Structure and Extended Kalman
                  Filter},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {1--20},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040101},
  doi          = {10.4018/IJDCF.2020040101},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiaoXYLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLL20,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu},
  title        = {A Common General Access Structure Construction Approach in Secret
                  Image Sharing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {96--110},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070107},
  doi          = {10.4018/IJDCF.2020070107},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSLHY20,
  author       = {Xinguo Yu and
                  Wu Song and
                  Xiaopan Lyu and
                  Bin He and
                  Nan Ye},
  title        = {Reading Both Single and Multiple Digital Video Clocks Using Context-Aware
                  Pixel Periodicity and Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {21--39},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040102},
  doi          = {10.4018/IJDCF.2020040102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuSLHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zhang20,
  author       = {Yi Zhang},
  title        = {User Identity Hiding Method of Android},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {15--26},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070102},
  doi          = {10.4018/IJDCF.2020070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zhang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoFYF20,
  author       = {Yang Zhao and
                  Yaqin Fan and
                  Mingrui Yin and
                  Cheng Fang},
  title        = {Research on the Construction of a Student Model of an Adaptive Learning
                  System Based on Cognitive Diagnosis Theory},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {20--31},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100102},
  doi          = {10.4018/IJDCF.2020100102},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoFYF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhengLW20,
  author       = {Xin Zheng and
                  Jun Li and
                  Qingrong Wu},
  title        = {A Light Recommendation Algorithm of We-Media Articles Based on Content},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {68--81},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100106},
  doi          = {10.4018/IJDCF.2020100106},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhengLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BaiSLW19,
  author       = {Jian Bai and
                  Yao Sun and
                  Ting Li and
                  Dingkang Wang},
  title        = {Applying Horner's Rule to Optimize Lightweight {MDS} Matrices},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {82--96},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100106},
  doi          = {10.4018/IJDCF.2019100106},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BaiSLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BorraT19,
  author       = {Surekha Borra and
                  Rohit M. Thanki},
  title        = {A {FRT} - {SVD} Based Blind Medical Watermarking Technique for Telemedicine
                  Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {2},
  pages        = {13--33},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019040102},
  doi          = {10.4018/IJDCF.2019040102},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BorraT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChengFYS19,
  author       = {Yuqiao Cheng and
                  Zhengxin Fu and
                  Bin Yu and
                  Gang Shen},
  title        = {General Construction for Extended Visual Cryptography Scheme Using
                  {QR} Codes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {1--17},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010101},
  doi          = {10.4018/IJDCF.2019010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChengFYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLLLX19,
  author       = {Xinchao Huang and
                  Zihan Liu and
                  Wei Lu and
                  Hongmei Liu and
                  Shijun Xiang},
  title        = {Fast and Effective Copy-Move Detection of Digital Audio Based on Auto
                  Segment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {2},
  pages        = {47--62},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019040104},
  doi          = {10.4018/IJDCF.2019040104},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangLLLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HussainBAL19,
  author       = {Md. Muzakkir Hussain and
                  M. M. Sufyan Beg and
                  Mohammad Saad Alam and
                  Shahedul Haque Laskar},
  title        = {Big Data Analytics Platforms for Electric Vehicle Integration in Transport
                  Oriented Smart Cities: Computing Platforms for Platforms for Electric
                  Vehicle Integration in Smart Cities},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {23--42},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070102},
  doi          = {10.4018/IJDCF.2019070102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HussainBAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/JiangWCL19,
  author       = {Wei Jiang and
                  Xianda Wu and
                  Xiang Cui and
                  Chaoge Liu},
  title        = {A Highly Efficient Remote Access Trojan Detection Method},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100101},
  doi          = {10.4018/IJDCF.2019100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/JiangWCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiWYL19,
  author       = {Jian Li and
                  Jinwei Wang and
                  Shuang Yu and
                  Xiangyang Luo},
  title        = {A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {100--113},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010108},
  doi          = {10.4018/IJDCF.2019010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYLDJ19,
  author       = {Hanlin Liu and
                  Jingju Liu and
                  Xuehu Yan and
                  Lintao Liu and
                  Wanmeng Ding and
                  Yue Jiang},
  title        = {A Novel Behavior Steganography Model Based on Secret Sharing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {97--117},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100107},
  doi          = {10.4018/IJDCF.2019100107},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLYLDJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongLP19,
  author       = {Min Long and
                  You Li and
                  Fei Peng},
  title        = {Dynamic Provable Data Possession of Multiple Copies in Cloud Storage
                  Based on Full-Node of {AVL} Tree},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {126--137},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010110},
  doi          = {10.4018/IJDCF.2019010110},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LongLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuGLL19,
  author       = {Yu Lu and
                  Lingchen Gu and
                  Ju Liu and
                  Peng Lan},
  title        = {Performance Evaluation and Scheme Selection of Person Re-Identification
                  Algorithms in Video Surveillance},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {50--65},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100104},
  doi          = {10.4018/IJDCF.2019100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuGLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MaWL19,
  author       = {Bin Ma and
                  Xiao{-}Yu Wang and
                  Bing Li},
  title        = {A New Kind of High Capacity and Security Reversible Data Hiding Scheme},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {118--129},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100108},
  doi          = {10.4018/IJDCF.2019100108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MaWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MakkaouiHE19,
  author       = {Khalid El Makkaoui and
                  Abderrahim Beni Hssane and
                  Abdellah Ezzati},
  title        = {Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting
                  Data Confidentiality in Cloud Computing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {90--102},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070105},
  doi          = {10.4018/IJDCF.2019070105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MakkaouiHE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MalikWWA19,
  author       = {Asad Malik and
                  Hongxia Wang and
                  Hanzhou Wu and
                  Sani M. Abdullahi},
  title        = {Reversible Data Hiding with Multiple Data for Multiple Users in an
                  Encrypted Image},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {46--61},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010104},
  doi          = {10.4018/IJDCF.2019010104},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MalikWWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengYWZK19,
  author       = {Anjie Peng and
                  Gao Yu and
                  Yadong Wu and
                  Qiong Zhang and
                  Xiangui Kang},
  title        = {A Universal Image Forensics of Smoothing Filtering},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {18--28},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010102},
  doi          = {10.4018/IJDCF.2019010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengYWZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/QianWZF19,
  author       = {Zhenxing Qian and
                  Zichi Wang and
                  Xinpeng Zhang and
                  Guorui Feng},
  title        = {Breaking Steganography: Slight Modification with Distortion Minimization},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {114--125},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010109},
  doi          = {10.4018/IJDCF.2019010109},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/QianWZF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShahBK19,
  author       = {Junaid Latief Shah and
                  Heena Farooq Bhat and
                  Asif Iqbal Khan},
  title        = {CloudIoT: Towards Seamless and Secure Integration of Cloud Computing
                  With Internet of Things},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {1--22},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070101},
  doi          = {10.4018/IJDCF.2019070101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShahBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SheelaST19,
  author       = {S. J. Sheela and
                  K. V. Suresh and
                  Deepaknath Tandur},
  title        = {Secured Transmission of Clinical Signals Using Hyperchaotic {DNA}
                  Confusion and Diffusion Transform},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {43--64},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070103},
  doi          = {10.4018/IJDCF.2019070103},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SheelaST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/VinayakumarSP19,
  author       = {R. Vinayakumar and
                  K. P. Soman and
                  Prabaharan Poornachandran},
  title        = {A Comparative Analysis of Deep Learning Approaches for Network Intrusion
                  Detection Systems (N-IDSs): Deep Learning for N-IDSs},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {65--89},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070104},
  doi          = {10.4018/IJDCF.2019070104},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/VinayakumarSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNZ19,
  author       = {Xinyi Wang and
                  Shaozhang Niu and
                  Jiwei Zhang},
  title        = {Digital Image Forensics Based on {CFA} Interpolation Feature and Gaussian
                  Mixture Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {2},
  pages        = {1--12},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019040101},
  doi          = {10.4018/IJDCF.2019040101},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangYZ19,
  author       = {Zichi Wang and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {Asymmetric Distortion Function for {JPEG} Steganography Using Block
                  Artifact Compensation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {90--99},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010107},
  doi          = {10.4018/IJDCF.2019010107},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuDHZ19,
  author       = {Yuanxin Wu and
                  Wen Diao and
                  Dongdong Hou and
                  Weiming Zhang},
  title        = {Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel
                  Correlation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {29--45},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010103},
  doi          = {10.4018/IJDCF.2019010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuDHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuZSC19,
  author       = {Yanpeng Wu and
                  Huiji Zhang and
                  Yi Sun and
                  Minghui Chen},
  title        = {Steganalysis of {AMR} Based on Statistical Features of Pitch Delay},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {66--81},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100105},
  doi          = {10.4018/IJDCF.2019100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuZSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaLZST19,
  author       = {Shuangkui Xia and
                  Meihua Liu and
                  Xinchen Zhang and
                  Hong Sun and
                  Mao Tian},
  title        = {Exploiting Routing Strategy of {DTN} for Message Forwarding in Information
                  Hiding Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {2},
  pages        = {34--46},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019040103},
  doi          = {10.4018/IJDCF.2019040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiaLZST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XieYQM19,
  author       = {Dawei Xie and
                  Haining Yang and
                  Jing Qin and
                  Jixin Ma},
  title        = {Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing
                  Polynomials Evaluation to a Malicious Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {14--27},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100102},
  doi          = {10.4018/IJDCF.2019100102},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XieYQM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangHHP19,
  author       = {Jichen Yang and
                  Qianhua He and
                  Yongjian Hu and
                  Weiqiang Pan},
  title        = {CBC-Based Synthetic Speech Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {2},
  pages        = {63--74},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019040105},
  doi          = {10.4018/IJDCF.2019040105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangHHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLWZL19,
  author       = {Cong Zhang and
                  Yuanan Liu and
                  Fan Wu and
                  Lidong Zhai and
                  Hui Lu},
  title        = {Analysis of WeChat Subscription Influence Based on Topic Diffusion},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {130--148},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100109},
  doi          = {10.4018/IJDCF.2019100109},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangLWZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangNZ19,
  author       = {Mengmeng Zhang and
                  Rongrong Ni and
                  Yao Zhao},
  title        = {A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {4},
  pages        = {28--49},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019100103},
  doi          = {10.4018/IJDCF.2019100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhongLMWX19,
  author       = {Ping Zhong and
                  Mengdi Li and
                  Kai Mu and
                  Juan Wen and
                  Yiming Xue},
  title        = {Image Steganalysis in High-Dimensional Feature Spaces with Proximal
                  Support Vector Machine},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {78--89},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010106},
  doi          = {10.4018/IJDCF.2019010106},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhongLMWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuZG19,
  author       = {Jie Zhu and
                  Xianfeng Zhao and
                  Qingxiao Guan},
  title        = {Detecting and Distinguishing Adaptive and Non-Adaptive Steganography
                  by Image Segmentation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {62--77},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010105},
  doi          = {10.4018/IJDCF.2019010105},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbdullahiWM18,
  author       = {Sani M. Abdullahi and
                  Hongxia Wang and
                  Asad Malik},
  title        = {Fingerprint Image Hashing Based on Minutiae Points and Shape Context},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {1--20},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100101},
  doi          = {10.4018/IJDCF.2018100101},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbdullahiWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbulaishH18,
  author       = {Muhammad Abulaish and
                  Nur Al Hasan Haldar},
  title        = {Advances in Digital Forensics Frameworks and Tools: {A} Comparative
                  Insight and Ranking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {95--119},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040106},
  doi          = {10.4018/IJDCF.2018040106},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbulaishH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDCQ18,
  author       = {Guangxuan Chen and
                  Liping Ding and
                  Guangxiao Chen and
                  Panke Qin},
  title        = {Reliable Security Strategy for Message-Oriented Middleware},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {12--23},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010102},
  doi          = {10.4018/IJDCF.2018010102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenDCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDDZQCL18,
  author       = {Guangxuan Chen and
                  Liping Ding and
                  Jin Du and
                  Guomin Zhou and
                  Panke Qin and
                  Guangxiao Chen and
                  Qiang Liu},
  title        = {Trust Evaluation Strategy for Single Sign-on Solution in Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {1--11},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010101},
  doi          = {10.4018/IJDCF.2018010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenDDZQCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenP18,
  author       = {Juan Chen and
                  Fei Peng},
  title        = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {67--78},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010106},
  doi          = {10.4018/IJDCF.2018010106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenX18,
  author       = {Kai Chen and
                  Dawen Xu},
  title        = {An Efficient Reversible Data Hiding Scheme for Encrypted Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {1--22},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040101},
  doi          = {10.4018/IJDCF.2018040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DingLYL18,
  author       = {Wanmeng Ding and
                  Kesheng Liu and
                  Xuehu Yan and
                  Lintao Liu},
  title        = {Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {120--136},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040107},
  doi          = {10.4018/IJDCF.2018040107},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DingLYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DongZHL18,
  author       = {Xiaojuan Dong and
                  Weiming Zhang and
                  Xianjun Hu and
                  Keyang Liu},
  title        = {A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten
                  for the Outsourced Plain Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {118--139},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100109},
  doi          = {10.4018/IJDCF.2018100109},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DongZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoGZL18,
  author       = {Lin Gao and
                  Tiegang Gao and
                  Jie Zhao and
                  Yonglei Liu},
  title        = {Reversible Watermarking in Digital Image Using {PVO} and {RDWT}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {40--55},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040103},
  doi          = {10.4018/IJDCF.2018040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoGZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoHGC18,
  author       = {Hang Gao and
                  Mengting Hu and
                  Tiegang Gao and
                  Renhong Cheng},
  title        = {Random Grid and Reversible Watermarking-Based On Verifiable Secret
                  Sharing for Outsourcing Images in Cloud},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {24--39},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010103},
  doi          = {10.4018/IJDCF.2018010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoHGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoLW18,
  author       = {Teng Guo and
                  Feng Liu and
                  Wen Wang},
  title        = {Visual Gambling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {43--49},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070104},
  doi          = {10.4018/IJDCF.2018070104},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuoLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiL18,
  author       = {Peng Li and
                  Zuquan Liu},
  title        = {An Improved Essential Secret Image Sharing Scheme with Smaller Shadow
                  Size},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {78--94},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070107},
  doi          = {10.4018/IJDCF.2018070107},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiangFXWY18,
  author       = {Zhuoqian Liang and
                  Bingwen Feng and
                  Xuba Xu and
                  Xiaotian Wu and
                  Tao Yang},
  title        = {Geometrically Invariant Image Watermarking Using Histogram Adjustment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {54--66},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010105},
  doi          = {10.4018/IJDCF.2018010105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiangFXWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLGR18,
  author       = {Xiaoxi Liu and
                  Ju Liu and
                  Lingchen Gu and
                  Yannan Ren},
  title        = {Keyframe-Based Vehicle Surveillance Video Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {52--61},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100104},
  doi          = {10.4018/IJDCF.2018100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLL18,
  author       = {Yimin Liu and
                  Wenyan Liu and
                  Xiangyang Luo},
  title        = {Survey on the Indoor Localization Technique of Wi-Fi Access Points},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {27--42},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070103},
  doi          = {10.4018/IJDCF.2018070103},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuZNT18,
  author       = {Lu Liu and
                  Yao Zhao and
                  Rongrong Ni and
                  Qi Tian},
  title        = {Copy-Move Forgery Localization Using Convolutional Neural Networks
                  and {CFA} Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {140--155},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100110},
  doi          = {10.4018/IJDCF.2018100110},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuZNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongPG18,
  author       = {Min Long and
                  Fei Peng and
                  Xiaoqing Gong},
  title        = {A Format-Compliant Encryption for Secure {HEVC} Video Sharing in Multimedia
                  Social Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {23--39},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040102},
  doi          = {10.4018/IJDCF.2018040102},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LongPG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McKeagueC18,
  author       = {Jonathan McKeague and
                  Kevin Curran},
  title        = {Detecting the Use of Anonymous Proxies},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {74--94},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040105},
  doi          = {10.4018/IJDCF.2018040105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/McKeagueC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengWL18,
  author       = {Fei Peng and
                  Shuai{-}ping Wang and
                  Min Long},
  title        = {Print-Scan Resilient Binary Map Watermarking Based on {DCT} and Scrambling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {80--89},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100106},
  doi          = {10.4018/IJDCF.2018100106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RanjanSKP18,
  author       = {Preetish Ranjan and
                  Vrijendra Singh and
                  Prabhat Kumar and
                  Satya Prakash},
  title        = {Models for the Detection of Malicious Intent People in Society},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {15--26},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070102},
  doi          = {10.4018/IJDCF.2018070102},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RanjanSKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RenNY18,
  author       = {Yueqiu Ren and
                  Minh Nguyen and
                  Wei{-}Qi Yan},
  title        = {Real-Time Recognition of Series Seven New Zealand Banknotes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {50--65},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070105},
  doi          = {10.4018/IJDCF.2018070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RenNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TuXX18,
  author       = {Min Tu and
                  Shiyang Xu and
                  Jianfeng Xu},
  title        = {Evaluation Method of Public Transportation System Based on Fuzzy Cloud
                  Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {36--51},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100103},
  doi          = {10.4018/IJDCF.2018100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TuXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLLXZW18,
  author       = {Ruxin Wang and
                  Wei Lu and
                  Jixian Li and
                  Shijun Xiang and
                  Xianfeng Zhao and
                  Jinwei Wang},
  title        = {Digital Image Splicing Detection Based on Markov Features in {QDCT}
                  and {QWT} Domain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {90--107},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100107},
  doi          = {10.4018/IJDCF.2018100107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangLLXZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuSFLLL18,
  author       = {Fan Wu and
                  Ran Sun and
                  Wenhao Fan and
                  Yuanan Liu and
                  Feng Liu and
                  Hui Lu},
  title        = {A Privacy Protection Approach Based on Android Application's Runtime
                  Behavior Monitor and Control},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {95--113},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070108},
  doi          = {10.4018/IJDCF.2018070108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuSFLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiongTZ18,
  author       = {Jianying Xiong and
                  Min Tu and
                  Ying Zhou},
  title        = {Using Weighted Similarity to Assess Risk of Illegal Fund Raising in
                  Online {P2P} Lending},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {62--79},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100105},
  doi          = {10.4018/IJDCF.2018100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiongTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLM18,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Duohe Ma},
  title        = {Image Secret Sharing Construction for General Access Structure with
                  Meaningful Share},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {66--77},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070106},
  doi          = {10.4018/IJDCF.2018070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanWL18,
  author       = {Wei Qi Yan and
                  Xiaotian Wu and
                  Feng Liu},
  title        = {Progressive Scrambling for Social Media},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {56--73},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040104},
  doi          = {10.4018/IJDCF.2018040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YeHCQ18,
  author       = {Qing Ye and
                  Mingxing Hu and
                  Guangxuan Chen and
                  Panke Qin},
  title        = {An Improved Encryption Scheme for Traitor Tracing from Lattice},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {21--35},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100102},
  doi          = {10.4018/IJDCF.2018100102},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YeHCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YueLML18,
  author       = {Chen Yue and
                  Tianliang Lu and
                  Cai Manchun and
                  Jingying Li},
  title        = {Evaluation of the Attack Effect Based on Improved Grey Clustering
                  Model},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {92--100},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010108},
  doi          = {10.4018/IJDCF.2018010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YueLML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YutingGDK18,
  author       = {Sun Yuting and
                  Jing Guo and
                  Ling Du and
                  Yongzhen Ke},
  title        = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {1--14},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070101},
  doi          = {10.4018/IJDCF.2018070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YutingGDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangC18,
  author       = {Xuan Zhang and
                  Kam{-}Pui Chow},
  title        = {A Framework for Dark Web Threat Intelligence Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {4},
  pages        = {108--117},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018100108},
  doi          = {10.4018/IJDCF.2018100108},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangHC18,
  author       = {Ping Zhang and
                  Yijun He and
                  Kam{-}Pui Chow},
  title        = {Fraud Track on Secure Electronic Check System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {2},
  pages        = {137--144},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018040108},
  doi          = {10.4018/IJDCF.2018040108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangYXG18,
  author       = {Shun Zhang and
                  Liang Yang and
                  Xihao Xu and
                  Tiegang Gao},
  title        = {Secure Steganography in {JPEG} Images Based on Histogram Modification
                  and Hyper Chaotic System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {40--53},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010104},
  doi          = {10.4018/IJDCF.2018010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangYXG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhouYSY18,
  author       = {Lei Zhou and
                  Wei Qi Yan and
                  Yun Shu and
                  Jian Yu},
  title        = {{CVSS:} {A} Cloud-Based Visual Surveillance System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {1},
  pages        = {79--91},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018010107},
  doi          = {10.4018/IJDCF.2018010107},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhouYSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ahmed17,
  author       = {Abdulghani Ali Ahmed},
  title        = {Investigation Approach for Network Attack Intention Recognition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {17--38},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010102},
  doi          = {10.4018/IJDCF.2017010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ahmed17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AizeziJAM17,
  author       = {Yasen Aizezi and
                  Anwar Jamal and
                  Ruxianguli Abudurexiti and
                  Mutalipu Muming},
  title        = {Research on Digital Forensics Based on Uyghur Web Text Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {30--39},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100103},
  doi          = {10.4018/IJDCF.2017100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AizeziJAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLYL17,
  author       = {Zhe Chen and
                  Jicang Lu and
                  Pengfei Yang and
                  Xiangyang Luo},
  title        = {Recognizing Substitution Steganography of Spatial Domain Based on
                  the Characteristics of Pixels Correlation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {48--61},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100105},
  doi          = {10.4018/IJDCF.2017100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenPLL17,
  author       = {Juan Chen and
                  Fei Peng and
                  Jie Li and
                  Min Long},
  title        = {A Lossless Watermarking for 3D {STL} Model Based on Entity Rearrangement
                  and Bit Mapping},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {25--37},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040103},
  doi          = {10.4018/IJDCF.2017040103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenPLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DiZ17,
  author       = {Hong Di and
                  Xin Zhang},
  title        = {Deception Detection by Hybrid-Pair Wireless fNIRS System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {15--24},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040102},
  doi          = {10.4018/IJDCF.2017040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuLQ17,
  author       = {Lingchen Gu and
                  Ju Liu and
                  Aixi Qu},
  title        = {Performance Evaluation and Scheme Selection of Shot Boundary Detection
                  and Keyframe Extraction in Content-Based Video Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {15--29},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100102},
  doi          = {10.4018/IJDCF.2017100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoJLW17,
  author       = {Teng Guo and
                  Jian Jiao and
                  Feng Liu and
                  Wen Wang},
  title        = {On the Pixel Expansion of Visual Cryptography Scheme},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {38--44},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040104},
  doi          = {10.4018/IJDCF.2017040104},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuoJLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Liu17,
  author       = {Zhi Jun Liu},
  title        = {A Cyber Crime Investigation Model Based on Case Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {40--47},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100104},
  doi          = {10.4018/IJDCF.2017100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Liu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYW17,
  author       = {Lintao Liu and
                  Yuliang Lu and
                  Xuehu Yan and
                  Song Wan},
  title        = {A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic
                  Mean},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {28--37},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070103},
  doi          = {10.4018/IJDCF.2017070103},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuWSZ17,
  author       = {Xin Liu and
                  Shen Wang and
                  Jianzhi Sang and
                  Weizhe Zhang},
  title        = {A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic
                  Matrix {VSS}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {1--10},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070101},
  doi          = {10.4018/IJDCF.2017070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuWSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuSYB17,
  author       = {Jia Lu and
                  Jun Shen and
                  Wei Qi Yan and
                  Boris Bacic},
  title        = {An Empirical Study for Human Behavior Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {11--27},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070102},
  doi          = {10.4018/IJDCF.2017070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuSYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17,
  author       = {Padma Lochan Pradhan},
  title        = {Dynamic Semi-Group {CIA} Pattern Optimizing the Risk on {RTS}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {51--70},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010104},
  doi          = {10.4018/IJDCF.2017010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Pradhan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17a,
  author       = {Padma Lochan Pradhan},
  title        = {Proposed Round Robin {CIA} Pattern on {RTS} for Risk Assessment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {71--85},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010105},
  doi          = {10.4018/IJDCF.2017010105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Pradhan17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLQ17,
  author       = {Fang Sun and
                  Zhenghui Liu and
                  Chuanda Qi},
  title        = {Speech Content Authentication Scheme based on High-Capacity Watermark
                  Embedding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {1--14},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040101},
  doi          = {10.4018/IJDCF.2017040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SunLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TsimperidisRK17,
  author       = {Ioannis Tsimperidis and
                  Shahin Rostami and
                  Vasilios Katos},
  title        = {Age Detection Through Keystroke Dynamics from User Authentication
                  Failures},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {1--16},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010101},
  doi          = {10.4018/IJDCF.2017010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TsimperidisRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WanLYL17,
  author       = {Song Wan and
                  Yuliang Lu and
                  Xuehu Yan and
                  Lintao Liu},
  title        = {A Novel Visual Secret Sharing Scheme Based on {QR} Codes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {38--48},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070104},
  doi          = {10.4018/IJDCF.2017070104},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WanLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Wang17,
  author       = {Ning Wang},
  title        = {A Knowledge Model of Digital Evidence Review Elements Based on Ontology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {49--57},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070105},
  doi          = {10.4018/IJDCF.2017070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Wang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNY17,
  author       = {Jia Wang and
                  Minh Ngueyn and
                  WeiQi Yan},
  title        = {A Framework of Event-Driven Traffic Ticketing System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {39--50},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010103},
  doi          = {10.4018/IJDCF.2017010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangWY17,
  author       = {Guangyu Wang and
                  Xiaotian Wu and
                  WeiQi Yan},
  title        = {The State-of-the-Art Technology of Currency Identification: {A} Comparative
                  Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {58--72},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070106},
  doi          = {10.4018/IJDCF.2017070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLWDL17,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Song Wan and
                  Wanmeng Ding and
                  Hanlin Liu},
  title        = {Exploiting the Homomorphic Property of Visual Cryptography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {45--56},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040105},
  doi          = {10.4018/IJDCF.2017040105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLLWDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuGZCC17,
  author       = {Jie Zhu and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Yun Cao and
                  Gong Chen},
  title        = {A Steganalytic Scheme Based on Classifier Selection Using Joint Image
                  Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {1--14},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100101},
  doi          = {10.4018/IJDCF.2017100101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuGZCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuY17,
  author       = {Alex Zhu and
                  Wei Qi Yan},
  title        = {Exploring Defense of {SQL} Injection Attack in Penetration Testing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {62--71},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100106},
  doi          = {10.4018/IJDCF.2017100106},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Abdullah16,
  author       = {Nurul Azma Abdullah},
  title        = {X{\_}myKarve: Non-Contiguous {JPEG} File Carver},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {63--84},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070105},
  doi          = {10.4018/IJDCF.2016070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Abdullah16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ch16,
  author       = {Rupa Ch.},
  title        = {Squint Pixel Steganography: {A} Novel Approach to Detect Digital Crimes
                  and Recovery of Medical Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {4},
  pages        = {37--47},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016100104},
  doi          = {10.4018/IJDCF.2016100104},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ch16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Cho16,
  author       = {Gyu{-}Sang Cho},
  title        = {A New Timestamp Digital Forensic Method Using a Modified Superincreasing
                  Sequence},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {11--33},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070102},
  doi          = {10.4018/IJDCF.2016070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Cho16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CuiY16,
  author       = {Wei Cui and
                  Wei Qi Yan},
  title        = {A Scheme for Face Recognition in Complex Environments},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {1},
  pages        = {26--36},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016010102},
  doi          = {10.4018/IJDCF.2016010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CuiY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FangL16,
  author       = {Cheng Fang and
                  Bo Ya Liu},
  title        = {Exploration of Web Page Structural Patterns Based on Request Dependency
                  Graph Decomposition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {4},
  pages        = {1--13},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016100101},
  doi          = {10.4018/IJDCF.2016100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/FangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuNY16,
  author       = {Datong Gu and
                  Minh Nguyen and
                  WeiQi Yan},
  title        = {Cross Models for Twin Recognition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {4},
  pages        = {26--36},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016100103},
  doi          = {10.4018/IJDCF.2016100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuLML16,
  author       = {Chunlin Lu and
                  Yue Li and
                  Mingjie Ma and
                  Na Li},
  title        = {A Hybrid {NIDS} Model Using Artificial Neural Network and {D-S} Evidence},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {1},
  pages        = {37--50},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016010103},
  doi          = {10.4018/IJDCF.2016010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuLML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MireDMP16,
  author       = {Archana V. Mire and
                  Sanjay B. Dhok and
                  Naresh J. Mistry and
                  Prakash D. Porey},
  title        = {Tampering Localization in Double Compressed Images by Investigating
                  Noise Quantization},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {46--62},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070104},
  doi          = {10.4018/IJDCF.2016070104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MireDMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShengG16,
  author       = {Guorui Sheng and
                  Tiegang Gao},
  title        = {Detection of Seam-Carving Image Based on Benford's Law for Forensic
                  Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {1},
  pages        = {51--61},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016010104},
  doi          = {10.4018/IJDCF.2016010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShengG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunZDWL16,
  author       = {Fenggang Sun and
                  Lidong Zhai and
                  Yue{-}Jin Du and
                  Peng Wang and
                  Jun Li},
  title        = {Design of Mobile Botnet Based on Open Service},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {1--10},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070101},
  doi          = {10.4018/IJDCF.2016070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SunZDWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TsaiHLC16,
  author       = {Yuan{-}Yu Tsai and
                  Yao{-}Hsien Huang and
                  Ruo{-}Jhu Lin and
                  Chi{-}Shiang Chan},
  title        = {An Adjustable Interpolation-based Data Hiding Algorithm Based on {LSB}
                  Substitution and Histogram Shifting},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {48--61},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040105},
  doi          = {10.4018/IJDCF.2016040105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TsaiHLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Wang16,
  author       = {Nana Wang},
  title        = {Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons
                  in 2D Vector Maps},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {1},
  pages        = {1--25},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016010101},
  doi          = {10.4018/IJDCF.2016010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Wang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLY16,
  author       = {Guangyu Wang and
                  Feng Liu and
                  Wei Qi Yan},
  title        = {Basic Visual Cryptography Using Braille},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {85--93},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070106},
  doi          = {10.4018/IJDCF.2016070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLYL16,
  author       = {Ping Wang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Improving Scanned Binary Image Watermarking Based On Additive Model
                  and Sampling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {36--47},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040104},
  doi          = {10.4018/IJDCF.2016040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangLYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangY16,
  author       = {Jia Wang and
                  Wei Qi Yan},
  title        = {BP-Neural Network for Plate Number Recognition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {3},
  pages        = {34--45},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016070103},
  doi          = {10.4018/IJDCF.2016070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangC16,
  author       = {Zhihai Yang and
                  Zhongmin Cai},
  title        = {Detecting Anomalous Ratings in Collaborative Filtering Recommender
                  Systems},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {16--26},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040102},
  doi          = {10.4018/IJDCF.2016040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangGXG16,
  author       = {Liang Yang and
                  Tiegang Gao and
                  Yan Xuan and
                  Hang Gao},
  title        = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram
                  of Run Length},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {27--35},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040103},
  doi          = {10.4018/IJDCF.2016040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangGXG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoWGGY16,
  author       = {Jie Zhao and
                  Qiuzi Wang and
                  Jichang Guo and
                  Lin Gao and
                  Fusheng Yang},
  title        = {An Overview on Passive Image Forensics Technology for Automatic Computer
                  Forgery},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {4},
  pages        = {14--25},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016100102},
  doi          = {10.4018/IJDCF.2016100102},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoWGGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoZY16,
  author       = {Xianfeng Zhao and
                  Jie Zhu and
                  Haibo Yu},
  title        = {On More Paradigms of Steganalysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {1--15},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040101},
  doi          = {10.4018/IJDCF.2016040101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AchumbaOED15,
  author       = {Ifeyinwa Eucharia Achumba and
                  Kennedy Chinedu Okafor and
                  Gloria N. Ezeh and
                  Uchenna Hermes Diala},
  title        = {OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud
                  Forensic Spyware Robot},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {2},
  pages        = {31--52},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015040103},
  doi          = {10.4018/IJDCF.2015040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AchumbaOED15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AzzouziK15,
  author       = {Abdeslam El Azzouzi and
                  Kamal Eddine El Kadiri},
  title        = {Semantic System for Attacks and Intrusions Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {4},
  pages        = {19--32},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015100102},
  doi          = {10.4018/IJDCF.2015100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AzzouziK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CurranS15,
  author       = {Kevin Curran and
                  Andrew Snodgrass},
  title        = {A Novel Cue based Picture Word Shape Character Password Creation Scheme},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {3},
  pages        = {37--59},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015070103},
  doi          = {10.4018/IJDCF.2015070103},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CurranS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FaheemKL15,
  author       = {Muhammad Faheem and
                  M. Tahar Kechadi and
                  Nhien{-}An Le{-}Khac},
  title        = {The State of the Art Forensic Techniques in Mobile Cloud Environment:
                  {A} Survey, Challenges and Current Trends},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {2},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.4018/ijdcf.2015040101},
  doi          = {10.4018/IJDCF.2015040101},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/FaheemKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoGZ15,
  author       = {Lin Gao and
                  Tiegang Gao and
                  Jie Zhao},
  title        = {Reversible Watermarking in Medical Image Using {RDWT} and Sub-Sample},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {4},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015100101},
  doi          = {10.4018/IJDCF.2015100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GarhwalY15,
  author       = {Abhimanyu Singh Garhwal and
                  Wei Qi Yan},
  title        = {Evaluations of Image Degradation from Multiple Scan-Print},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {4},
  pages        = {55--65},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015100104},
  doi          = {10.4018/IJDCF.2015100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GarhwalY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoAT15,
  author       = {Yuanfang Guo and
                  Oscar C. Au and
                  Ketan Tang},
  title        = {Watermark Embedding for Multiscale Error Diffused Halftone Images
                  by Adopting Visual Cryptography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {1},
  pages        = {51--68},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015010103},
  doi          = {10.4018/IJDCF.2015010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuoAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongLP15,
  author       = {Min Long and
                  Yan Liu and
                  Fei Peng},
  title        = {A Semi-Fragile Reversible Watermarking for 2D {CAD} Engineering Graphics
                  with Accurate Tampering Localization},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {3},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.4018/ijdcf.2015070101},
  doi          = {10.4018/IJDCF.2015070101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LongLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ManimuruganN15,
  author       = {Manimurugan Shanmuganathan and
                  C. Narmatha},
  title        = {Secure and Efficient Medical Image Transmission by New Tailored Visual
                  Cryptography Scheme with {LS} Compressions},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {1},
  pages        = {26--50},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015010102},
  doi          = {10.4018/IJDCF.2015010102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ManimuruganN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MireDMP15,
  author       = {Archana V. Mire and
                  Sanjay B. Dhok and
                  Narendra J. Mistry and
                  Prakash D. Porey},
  title        = {Localization of Tampering Created with Facebook Images by Analyzing
                  Block Factor Histogram Voting},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {4},
  pages        = {33--54},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015100103},
  doi          = {10.4018/IJDCF.2015100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MireDMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PratBL15,
  author       = {Lionel Prat and
                  Cheryl Baker and
                  Nhien{-}An Le{-}Khac},
  title        = {MapExif: An Image Scanning and Mapping Tool for Investigators},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {2},
  pages        = {53--78},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015040104},
  doi          = {10.4018/IJDCF.2015040104},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PratBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SagheerA15,
  author       = {Ali Makki Sagheer and
                  Laith Hamid Abed},
  title        = {Visual Secret Sharing Without Pixel Expansion},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {2},
  pages        = {20--30},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015040102},
  doi          = {10.4018/IJDCF.2015040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SagheerA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TongYY15,
  author       = {Yi Jie Tong and
                  Wei Qi Yan and
                  Jin Yu},
  title        = {Analysis of a Secure Virtual Desktop Infrastructure System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {1},
  pages        = {69--84},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015010104},
  doi          = {10.4018/IJDCF.2015010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TongYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WanHLHZZM15,
  author       = {Xuejiao Wan and
                  Jingsha He and
                  Gongzheng Liu and
                  Na Huang and
                  Xingye Zhu and
                  Bin Zhao and
                  Yonghao Mai},
  title        = {Survey of Digital Forensics Technologies and Tools for Android based
                  Intelligent Devices},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {1},
  pages        = {1--25},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015010101},
  doi          = {10.4018/IJDCF.2015010101},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WanHLHZZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangZZ15,
  author       = {Nana Wang and
                  Xiangjun Zhao and
                  Han Zhang},
  title        = {Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {3},
  pages        = {60--80},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015070104},
  doi          = {10.4018/IJDCF.2015070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLW15,
  author       = {Fan Zhang and
                  Zhenghui Liu and
                  Hongxia Wang},
  title        = {A Secure Speech Content Authentication Algorithm Based on Discrete
                  Fractional Fourier Transform},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {7},
  number       = {3},
  pages        = {19--36},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDCF.2015070102},
  doi          = {10.4018/IJDCF.2015070102},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BhaleraoR14,
  author       = {Abhir Bhalerao and
                  Gregory Reynolds},
  title        = {Ruler Detection for Autoscaling Forensic Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {1},
  pages        = {9--27},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014010102},
  doi          = {10.4018/IJDCF.2014010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BhaleraoR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChandranY14,
  author       = {Rahul Chandran and
                  Wei Qi Yan},
  title        = {Attack Graph Analysis for Network Anti-Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {1},
  pages        = {28--50},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014010103},
  doi          = {10.4018/IJDCF.2014010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChandranY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GaoG14,
  author       = {Lin Gao and
                  Tiegang Gao},
  title        = {A Novel Medical Image Tamper Detection and Recovery Scheme using {LSB}
                  Embedding and {PWLCM}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {2},
  pages        = {1--22},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014040101},
  doi          = {10.4018/IJDCF.2014040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GaoG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuanWL14,
  author       = {Yu Guan and
                  Xingjie Wei and
                  Chang{-}Tsun Li},
  title        = {On the Generalization Power of Face and Gait in Gender Recognition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {1},
  pages        = {1--8},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014010101},
  doi          = {10.4018/IJDCF.2014010101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuanWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HanQFZ14,
  author       = {Xiyu Han and
                  Zhenxing Qian and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Reversible Data Hiding in Encrypted Images Based on Image Interpolation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {3},
  pages        = {16--29},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014070102},
  doi          = {10.4018/IJDCF.2014070102},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HanQFZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuZY14,
  author       = {Xiaocheng Hu and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {Optimizing Non-Local Pixel Predictors for Reversible Data Hiding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {3},
  pages        = {1--15},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014070101},
  doi          = {10.4018/IJDCF.2014070101},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiCL14,
  author       = {Jia{-}Hong Li and
                  Tzungher Chen and
                  Wei{-}Bin Lee},
  title        = {Tattooing Attack: {A} New Type of Watermarking Attacks on Image Authentication},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {3},
  pages        = {30--46},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014070103},
  doi          = {10.4018/IJDCF.2014070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PhongY14,
  author       = {Chiem Trieu Phong and
                  Wei Qi Yan},
  title        = {An Overview of Penetration Testing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {4},
  pages        = {50--74},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014100104},
  doi          = {10.4018/IJDCF.2014100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PhongY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SekharS14,
  author       = {Resmi Sekhar and
                  Shaji Ramaswamy Swarnammal},
  title        = {A Methodological Review on Copy-Move Forgery Detection for Image Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {4},
  pages        = {34--49},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014100103},
  doi          = {10.4018/IJDCF.2014100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SekharS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShangYWX14,
  author       = {Yueyun Shang and
                  Dengpan Ye and
                  Zhuo Wei and
                  Yajuan Xie},
  title        = {GPU-Based {MPEG-2} to Secure Scalable Video Transcoding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {2},
  pages        = {52--69},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014040104},
  doi          = {10.4018/IJDCF.2014040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShangYWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShengGZ14,
  author       = {Guorui Sheng and
                  Tiegang Gao and
                  Shun Zhang},
  title        = {Detection of Content-Aware Image Resizing for Forensic Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {2},
  pages        = {23--39},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014040102},
  doi          = {10.4018/IJDCF.2014040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShengGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TangMZY14,
  author       = {Qi Tang and
                  Guoli Ma and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {Reversible Data Hiding for {DNA} Sequences and Its Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {4},
  pages        = {1--13},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014100101},
  doi          = {10.4018/IJDCF.2014100101},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TangMZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XieR14,
  author       = {Li Xie and
                  Yanli Ren},
  title        = {Efficient Anonymous Identity-Based Broadcast Encryption without Random
                  Oracles},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {2},
  pages        = {40--51},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014040103},
  doi          = {10.4018/IJDCF.2014040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XieR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangG14,
  author       = {Qunting Yang and
                  Tiegang Gao},
  title        = {Robust Reversible Data Hiding Scheme Based on Gravity Center Difference},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {4},
  pages        = {14--33},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014100102},
  doi          = {10.4018/IJDCF.2014100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangG14,
  author       = {Shun Zhang and
                  Tiegang Gao},
  title        = {Visible Watermarking Scheme for Quick Response Code Based on Reversible
                  Data Hiding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {3},
  pages        = {47--63},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014070104},
  doi          = {10.4018/IJDCF.2014070104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangGY14,
  author       = {Shun Zhang and
                  Tiegang Gao and
                  Fusheng Yang},
  title        = {A High Capacity Reversible Data Hiding Scheme Based on Multi-Level
                  Integer {DWT} and Histogram Modification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {1},
  pages        = {51--64},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014010104},
  doi          = {10.4018/IJDCF.2014010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AdeyemiRA13,
  author       = {Adeyemi R. Ikuesan and
                  Shukor Abd Razak and
                  Nor Amira Nor Azhan},
  title        = {A Review of Current Research in Network Forensic Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {1--26},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010101},
  doi          = {10.4018/JDCF.2013010101},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AdeyemiRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AndriotisTMIO13,
  author       = {Panagiotis Andriotis and
                  Zacharias Tzermias and
                  Anthi Mparmpaki and
                  Sotiris Ioannidis and
                  George C. Oikonomou},
  title        = {Multilevel Visualization Using Enhanced Social Network Analysis with
                  Smartphone Data},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {4},
  pages        = {34--54},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijdcf.2013100103},
  doi          = {10.4018/IJDCF.2013100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AndriotisTMIO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AuerBEUU13,
  author       = {Stefan Auer and
                  Alexander Bliem and
                  Dominik Engel and
                  Andreas Uhl and
                  Andreas Unterweger},
  title        = {Bitstream-Based {JPEG} Encryption in Real-time},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {3},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013070101},
  doi          = {10.4018/JDCF.2013070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AuerBEUU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AzizBI13,
  author       = {Benjamin Aziz and
                  Clive Blackwell and
                  Shareeful Islam},
  title        = {A Framework for Digital Forensics and Investigations: The Goal-Driven
                  Approach},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {2},
  pages        = {1--22},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013040101},
  doi          = {10.4018/JDCF.2013040101},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AzizBI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BarniFT13,
  author       = {Mauro Barni and
                  Marco Fontani and
                  Benedetta Tondi},
  title        = {A Universal Attack Against Histogram-Based Image Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {3},
  pages        = {35--52},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013070103},
  doi          = {10.4018/JDCF.2013070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BarniFT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/FontaniBRPB13,
  author       = {Marco Fontani and
                  Tiziano Bianchi and
                  Alessia De Rosa and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {A Forensic Tool for Investigating Image Forgeries},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {4},
  pages        = {15--33},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijdcf.2013100102},
  doi          = {10.4018/IJDCF.2013100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/FontaniBRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GnasigamoneyS13,
  author       = {Selvi Salome Gnasigamoney and
                  Manjit Singh Sidhu},
  title        = {E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and
                  Adolescents},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {2},
  pages        = {50--62},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013040104},
  doi          = {10.4018/JDCF.2013040104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GnasigamoneyS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KaravarsamisNBP13,
  author       = {Sotiris Karavarsamis and
                  Nikos Ntarmos and
                  Konstantinos Blekas and
                  Ioannis Pitas},
  title        = {Detecting Pornographic Images by Localizing Skin ROIs},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {39--53},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010103},
  doi          = {10.4018/JDCF.2013010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KaravarsamisNBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuW13,
  author       = {Zhenghui Liu and
                  Hongxia Wang},
  title        = {A Speech Content Authentication Algorithm Based on Pseudo-Zernike
                  Moments in {DCT} Domain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {3},
  pages        = {15--34},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013070102},
  doi          = {10.4018/JDCF.2013070102},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LongW13,
  author       = {Min Long and
                  Hao Wang},
  title        = {Collision Analysis and Improvement of a Parallel Hash Function based
                  on Chaotic Maps with Changeable Parameters},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {2},
  pages        = {23--34},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013040102},
  doi          = {10.4018/JDCF.2013040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LongW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuYX13,
  author       = {Laijie Lu and
                  Gaobo Yang and
                  Ming Xia},
  title        = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {3},
  pages        = {53--65},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013070104},
  doi          = {10.4018/JDCF.2013070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuYX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MartinOJ13,
  author       = {Thomas Anthony Martin and
                  Laurence O'Toole and
                  Andrew Jones},
  title        = {On the Reliability of Cryptopometry},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {27--38},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010102},
  doi          = {10.4018/JDCF.2013010102},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MartinOJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PanagakisK13,
  author       = {Yannis Panagakis and
                  Constantine Kotropoulos},
  title        = {Telephone Handset Identification by Collaborative Representations},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {4},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijdcf.2013100101},
  doi          = {10.4018/IJDCF.2013100101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PanagakisK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengZL13,
  author       = {Fei Peng and
                  Xiao{-}wen Zhu and
                  Min Long},
  title        = {An Effective Selective Encryption Scheme for {H.264} Video based on
                  Chaotic Qi System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {2},
  pages        = {35--49},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013040103},
  doi          = {10.4018/JDCF.2013040103},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShebaroPC13,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Exploiting Geometrical Structure for Forensic Applications of Timing
                  Inference Channels},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {54--69},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010104},
  doi          = {10.4018/JDCF.2013010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShebaroPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/alZahirI13,
  author       = {Saif alZahir and
                  Md Wahedul Islam},
  title        = {Audio Watermarking Scheme Using IMFs and {HHT} for Forensic Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {4},
  pages        = {55--67},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijdcf.2013100104},
  doi          = {10.4018/IJDCF.2013100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/alZahirI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BattenPK12,
  author       = {Lynn Margaret Batten and
                  Lei Pan and
                  Nisar Khan},
  title        = {Hypothesis Generation and Testing in Event Profiling for Digital Forensic
                  Investigations},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {1--14},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100101},
  doi          = {10.4018/JDCF.2012100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BattenPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLN12,
  author       = {Likai Chen and
                  Wei Lu and
                  Jiangqun Ni},
  title        = {An Image Region Description Method Based on Step Sector Statistics
                  and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {49--62},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010104},
  doi          = {10.4018/JDCF.2012010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GidwaniAYI12,
  author       = {T. Gidwani and
                  M. J. Argano and
                  Wei{-}Qi Yan and
                  F. Issa},
  title        = {A Comprehensive Survey of Event Analytics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {33--46},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070103},
  doi          = {10.4018/JDCF.2012070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GidwaniAYI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GrisposSG12,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Calm Before the Storm: The Challenges of Cloud Computing in Digital
                  Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {28--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040103},
  doi          = {10.4018/JDCF.2012040103},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Grobler12,
  author       = {Marthie Grobler},
  title        = {The Need for Digital Evidence Standardisation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040101},
  doi          = {10.4018/JDCF.2012040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaggertyCHT12,
  author       = {John Haggerty and
                  Mark C. Casson and
                  Sheryllynne Haggerty and
                  Mark John Taylor},
  title        = {A Framework for the Forensic Analysis of User Interaction with Social
                  Media},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {15--30},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100102},
  doi          = {10.4018/JDCF.2012100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HaggertyCHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HayatiP12,
  author       = {Pedram Hayati and
                  Vidyasagar M. Potdar},
  title        = {Spam 2.0 State of the Art},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {17--36},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010102},
  doi          = {10.4018/JDCF.2012010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HayatiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuLWL12,
  author       = {Yongjian Hu and
                  Chang{-}Tsun Li and
                  Yufei Wang and
                  Bei{-}Bei Liu},
  title        = {An Improved Fingerprinting Algorithm for Detection of Video Frame
                  Duplication Forgery},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {20--32},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070102},
  doi          = {10.4018/JDCF.2012070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuLWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ishihara12,
  author       = {Shunichi Ishihara},
  title        = {Probabilistic Evaluation of {SMS} Messages as Forensic Evidence: Likelihood
                  Ratio Based Approach with Lexical Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {47--57},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070104},
  doi          = {10.4018/JDCF.2012070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ishihara12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LempereurMS12,
  author       = {Brett Lempereur and
                  Madjid Merabti and
                  Qi Shi},
  title        = {Pypette: {A} Platform for the Evaluation of Live Digital Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {31--46},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100103},
  doi          = {10.4018/JDCF.2012100103},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LempereurMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MarcialisCR12,
  author       = {Gian Luca Marcialis and
                  Pietro Coli and
                  Fabio Roli},
  title        = {Fingerprint Liveness Detection Based on Fake Finger Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {1--19},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070101},
  doi          = {10.4018/JDCF.2012070101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MarcialisCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengLL12,
  author       = {Fei Peng and
                  Juan Liu and
                  Min Long},
  title        = {Identification of Natural Images and Computer Generated Graphics Based
                  on Hybrid Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {1--16},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010101},
  doi          = {10.4018/JDCF.2012010101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLYS12,
  author       = {Wei Sun and
                  Zhe{-}Ming Lu and
                  Fa{-}Xin Yu and
                  Rong{-}Jun Shen},
  title        = {Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based
                  Audio Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {49--69},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040104},
  doi          = {10.4018/JDCF.2012040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SunLYS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/VlachopoulosMC12,
  author       = {Konstantinos Vlachopoulos and
                  Emmanouil Magkos and
                  Vassilios Chrissikopoulos},
  title        = {A Model for Hybrid Evidence Investigation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {47--62},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100104},
  doi          = {10.4018/JDCF.2012100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/VlachopoulosMC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNWZ12,
  author       = {Chang Wang and
                  Jiangqun Ni and
                  Chuntao Wang and
                  Ruiyu Zhang},
  title        = {An Adaptive {JPEG} Steganographic Scheme Based on the Block Entropy
                  of {DCT} Coefficients},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {13--27},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040102},
  doi          = {10.4018/JDCF.2012040102},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangNWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSZNC12,
  author       = {Lifang Yu and
                  Yun Q. Shi and
                  Yao Zhao and
                  Rongrong Ni and
                  Gang Cao},
  title        = {A Study on Embedding Efficiency of Matrix Encoding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {37--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010103},
  doi          = {10.4018/JDCF.2012010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuSZNC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AbouzakharCC11,
  author       = {Nasser Abouzakhar and
                  Huankai Chen and
                  Bruce Christianson},
  title        = {An Enhanced Fuzzy {ARM} Approach for Intrusion Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {2},
  pages        = {41--61},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011040104},
  doi          = {10.4018/JDCF.2011040104},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AbouzakharCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AnandJW11,
  author       = {Sarabjot Singh Anand and
                  Arshad Jhumka and
                  Kimberley Wade},
  title        = {Towards the Ordering of Events from Multiple Textual Evidence Sources},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {2},
  pages        = {16--34},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011040102},
  doi          = {10.4018/JDCF.2011040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AnandJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuruNMD11,
  author       = {Devanur S. Guru and
                  K. B. Nagasundara and
                  S. Manjunath and
                  R. Dinesh},
  title        = {An Approach for Hand Vein Representation and Indexing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {2},
  pages        = {1--15},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011040101},
  doi          = {10.4018/JDCF.2011040101},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuruNMD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaggertyKLT11,
  author       = {John Haggerty and
                  Alexander John Karran and
                  David J. Lamb and
                  Mark John Taylor},
  title        = {A Framework for the Forensic Investigation of Unstructured Email Relationship
                  Data},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {3},
  pages        = {1--18},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011070101},
  doi          = {10.4018/JDCF.2011070101},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HaggertyKLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuLZL11,
  author       = {Yongjian Hu and
                  Chang{-}Tsun Li and
                  Changhui Zhou and
                  Xufeng Lin},
  title        = {Source Camera Identification Issues: Forensic Features Selection and
                  Robustness},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {4},
  pages        = {1--15},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011100101},
  doi          = {10.4018/JDCF.2011100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuLZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KalajdzicPT11,
  author       = {Kenan Kalajdzic and
                  Ahmed Patel and
                  Mona Taghavi},
  title        = {Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning
                  Man-in-the-Middle Attacks on Switched Ethernet LANs},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {3},
  pages        = {50--60},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011070104},
  doi          = {10.4018/JDCF.2011070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KalajdzicPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MagklarasFP11,
  author       = {George Magklaras and
                  Steven Furnell and
                  Maria Papadaki},
  title        = {{LUARM:} An Audit Engine for Insider Misuse Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {3},
  pages        = {37--49},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011070103},
  doi          = {10.4018/JDCF.2011070103},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MagklarasFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MichalasKP11,
  author       = {Antonis Michalas and
                  Nikos Komninos and
                  Neeli R. Prasad},
  title        = {Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {1},
  pages        = {14--36},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011010102},
  doi          = {10.4018/JDCF.2011010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MichalasKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengL11,
  author       = {Fei Peng and
                  Yu{-}Zhou Lei},
  title        = {An Effective Reversible Watermarking for 2D {CAD} Engineering Graphics
                  Based on Improved {QIM}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {1},
  pages        = {53--69},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011010104},
  doi          = {10.4018/JDCF.2011010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengL11a,
  author       = {Fei Peng and
                  Honglin Li},
  title        = {A Steganalysis Method for 2D Engineering Graphics Based on the Statistic
                  of Geometric Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {2},
  pages        = {35--40},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011040103},
  doi          = {10.4018/JDCF.2011040103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengL11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SoobhanLL11,
  author       = {Ahmad Ryad Soobhany and
                  Richard Leary and
                  K. P. Lam},
  title        = {On the Performance of Li's Unsupervised Image Classifier and the Optimal
                  Cropping Position of Images for Forensic Investigations},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {1},
  pages        = {1--13},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011010101},
  doi          = {10.4018/JDCF.2011010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SoobhanLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SpyridopoulosK11,
  author       = {Theodoros Spyridopoulos and
                  Vasilios Katos},
  title        = {Requirements for a Forensically Ready Cloud Storage Service},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {3},
  pages        = {19--36},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011070102},
  doi          = {10.4018/JDCF.2011070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SpyridopoulosK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TiwariM11,
  author       = {Rajesh Kumar Tiwari and
                  G. Sahoo Mesra},
  title        = {Microsoft Power Point Files: {A} Secure Steganographic Carrier},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {4},
  pages        = {16--28},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011100102},
  doi          = {10.4018/JDCF.2011100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TiwariM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TiwariS11,
  author       = {Rajesh Kumar Tiwari and
                  G. Sahoo Mesra},
  title        = {Microsoft Excel File: {A} Steganographic Carrier File},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {1},
  pages        = {37--52},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011010103},
  doi          = {10.4018/JDCF.2011010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TiwariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YangL11,
  author       = {Chun{-}Ning Yang and
                  Zhe{-}Ming Lu},
  title        = {A Blind Image Watermarking Scheme Utilizing {BTC} Bitplanes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {4},
  pages        = {42--53},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011100104},
  doi          = {10.4018/JDCF.2011100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZaharisMTIP11,
  author       = {Alexandros Zaharis and
                  Adamantini Martini and
                  Theo Tryfonas and
                  Christos Ilioudis and
                  George Pangalos},
  title        = {Lightweight Steganalysis Based on Image Reconstruction and Lead Digit
                  Distribution Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {4},
  pages        = {29--41},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011100103},
  doi          = {10.4018/JDCF.2011100103},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZaharisMTIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AmeriniCCPP10,
  author       = {Irene Amerini and
                  Roberto Caldelli and
                  Vito Cappellini and
                  Francesco Picchioni and
                  Alessandro Piva},
  title        = {Estimate of {PRNU} Noise Based on Different Noise Models for Source
                  Camera Identification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {21--33},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040102},
  doi          = {10.4018/JDCF.2010040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AmeriniCCPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaldelliAP10,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni},
  title        = {A DFT-Based Analysis to Discern Between Camera and Scanned Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {21--29},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010102},
  doi          = {10.4018/JDCF.2010010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaldelliAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChennammaR10,
  author       = {H. R. Chennamma and
                  Lalitha Rangarajan},
  title        = {Source Camera Identification Based on Sensor Readout Noise},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {28--42},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070103},
  doi          = {10.4018/JDCF.2010070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChennammaR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CurranRPC10,
  author       = {Kevin Curran and
                  Andrew Robinson and
                  Stephen Peacocke and
                  Sean Cassidy},
  title        = {Mobile Phone Forensic Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {15--27},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070102},
  doi          = {10.4018/JDCF.2010070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CurranRPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DavisS10,
  author       = {Michael Davis and
                  Alice Sedsman},
  title        = {Grey Areas - The Legal Dimensions of Cloud Computing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {30--39},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010103},
  doi          = {10.4018/JDCF.2010010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DavisS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Edmond10,
  author       = {Gary Edmond},
  title        = {Suspect sciences? Evidentiary Problems with Emerging Technologies},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {40--72},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010104},
  doi          = {10.4018/JDCF.2010010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Edmond10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaltisSB10,
  author       = {Kosta Haltis and
                  Matthew Sorell and
                  Russell S. A. Brinkworth},
  title        = {A Biologically Inspired Smart Camera for Use in Surveillance Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {1--14},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070101},
  doi          = {10.4018/JDCF.2010070101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HaltisSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KwittMU10,
  author       = {Roland Kwitt and
                  Peter Meerwald and
                  Andreas Uhl},
  title        = {Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree
                  Complex Wavelet Transform Domain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {34--46},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040103},
  doi          = {10.4018/JDCF.2010040103},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KwittMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LaadjelBKY10,
  author       = {Moussadek Laadjel and
                  Ahmed Bouridane and
                  Fatih Kurugollu and
                  WeiQi Yan},
  title        = {Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {1--15},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100101},
  doi          = {10.4018/JDCF.2010100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LaadjelBKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiR10,
  author       = {Qiming Li and
                  Sujoy Roy},
  title        = {Secure Robust Hash Functions and Their Applications in Non-interactive
                  Communications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {51--62},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100104},
  doi          = {10.4018/JDCF.2010100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLZYL10,
  author       = {Jin Liu and
                  Hefei Ling and
                  Fuhao Zou and
                  WeiQi Yan and
                  Zhengding Lu},
  title        = {Digital Image Forensics Using Multi-Resolution Histograms},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {37--50},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100103},
  doi          = {10.4018/JDCF.2010100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLZYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MatamL10,
  author       = {B. R. Matam and
                  David Lowe},
  title        = {Watermark-Only Security Attack on {DM-QIM} Watermarking: Vulnerability
                  to Guided Key Guessing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {64--87},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040105},
  doi          = {10.4018/JDCF.2010040105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MatamL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McGrathGC10,
  author       = {Niall McGrath and
                  Pavel Gladyshev and
                  Joe Carthy},
  title        = {Cryptopometry as a Methodology for Investigating Encrypted Material},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {1--20},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010101},
  doi          = {10.4018/JDCF.2010010101},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/McGrathGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NiuKZ10,
  author       = {Yaqing Niu and
                  Sridhar Krishnan and
                  Qin Zhang},
  title        = {Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {16--36},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100102},
  doi          = {10.4018/JDCF.2010100102},
  timestamp    = {Sun, 19 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/NiuKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SamphaiboonD10,
  author       = {Natthawut Samphaiboon and
                  Matthew M. Dailey},
  title        = {Steganography in Thai Text},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {43--64},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070104},
  doi          = {10.4018/JDCF.2010070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SamphaiboonD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WeirLY10,
  author       = {Jonathan Weir and
                  Raymond Lau and
                  WeiQi Yan},
  title        = {Digital Image Splicing Using Edges},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {63--75},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100105},
  doi          = {10.4018/JDCF.2010100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WeirLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zarri10,
  author       = {Gian Piero Zarri},
  title        = {A Conceptual Methodology for Dealing with Terrorism "Narratives"},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {47--63},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040104},
  doi          = {10.4018/JDCF.2010040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zarri10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoHS10,
  author       = {Xi Zhao and
                  Anthony Tung Shuen Ho and
                  Yun Q. Shi},
  title        = {Image Forensics Using Generalised Benford's Law for Improving Image
                  Authentication Detection Rates in Semi-Fragile Watermarking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {1--20},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040101},
  doi          = {10.4018/JDCF.2010040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenDW09,
  author       = {Yan Chen and
                  Xiaoqing Ding and
                  Patrick S. P. Wang},
  title        = {Dynamic Structural Statistical Model Based Online Signature Verification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {3},
  pages        = {21--41},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009070102},
  doi          = {10.4018/JDCF.2009070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChennammaRR09,
  author       = {H. R. Chennamma and
                  Lalitha Rangarajan and
                  M. S. Rao},
  title        = {Robust Near Duplicate Image Matching for Digital Image Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {3},
  pages        = {62--79},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009070104},
  doi          = {10.4018/JDCF.2009070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChennammaRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Eggendorfer09,
  author       = {Tobias Eggendorfer},
  title        = {Methods to Identify Spammers},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {55--68},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040105},
  doi          = {10.4018/JDCF.2009040105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Eggendorfer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Garfinkel09,
  author       = {Simson L. Garfinkel},
  title        = {Providing Cryptographic Security and Evidentiary Chain-of-Custody
                  with the Advanced Forensic Format, Library, and Tools},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {1--28},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010101},
  doi          = {10.4018/JDCF.2009010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Garfinkel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GottschalkK09,
  author       = {Petter Gottschalk and
                  Ragnar Kristoffersen},
  title        = {Understanding the Process of Online Grooming: The Behavior of Men
                  who Target Young People Online in Norway},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {4},
  pages        = {1--18},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009062401},
  doi          = {10.4018/JDCF.2009062401},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GottschalkK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuptaP09,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  title        = {Reversible and Blind Database Watermarking Using Difference Expansion},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {42--54},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040104},
  doi          = {10.4018/JDCF.2009040104},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuptaP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Jin09,
  author       = {Hongxia Jin},
  title        = {Efficient Forensic Analysis for Anonymous Attack in Secure Content
                  Distribution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {59--74},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010104},
  doi          = {10.4018/JDCF.2009010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Jin09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ker09,
  author       = {Andrew D. Ker},
  title        = {Locally Square Distortion and Batch Steganographic Capacity},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {29--44},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010102},
  doi          = {10.4018/JDCF.2009010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiL09,
  author       = {Chang{-}Tsun Li and
                  Yue Li},
  title        = {Medical Images Authentication through Repetitive Index Modulation
                  Based Watermarking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {4},
  pages        = {32--39},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009062403},
  doi          = {10.4018/JDCF.2009062403},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiLW09,
  author       = {Chang{-}Tsun Li and
                  Yue Li and
                  Chia{-}Hung Wei},
  title        = {Protection of Digital Mammograms on PACSs Using Data Hiding Techniques},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {75--88},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010105},
  doi          = {10.4018/JDCF.2009010105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MaioranaCN09,
  author       = {Emanuele Maiorana and
                  Patrizio Campisi and
                  Alessandro Neri},
  title        = {Template Protection and Renewability for Dynamic Time Warping Based
                  Biometric Signature Verification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {4},
  pages        = {40--57},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009062404},
  doi          = {10.4018/JDCF.2009062404},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MaioranaCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NilssonL09,
  author       = {Dennis K. Nilsson and
                  Ulf Larson},
  title        = {Conducting Forensic Investigations of Cyber Attacks on Automobile
                  In-Vehicle Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {28--41},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040103},
  doi          = {10.4018/JDCF.2009040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/NilssonL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PoursoltanmohammadiS09,
  author       = {Amirsaman Poursoltanmohammadi and
                  Matthew Sorell},
  title        = {Reliable Motion Detection, Location and Audit in Surveillance Video},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {4},
  pages        = {19--31},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009062402},
  doi          = {10.4018/JDCF.2009062402},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PoursoltanmohammadiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ridder09,
  author       = {Chris K. Ridder},
  title        = {Evidentiary Implications of Potential Security Weaknesses in Forensic
                  Software},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {3},
  pages        = {80--91},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009070105},
  doi          = {10.4018/JDCF.2009070105},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ridder09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SablatnigLGC09,
  author       = {Jan Sablatnig and
                  Fritz Lehmann{-}Grube and
                  Sven Grottke and
                  Sabine Cikic},
  title        = {Dealing with Multiple Truths in Online Virtual Worlds},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {69--82},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040106},
  doi          = {10.4018/JDCF.2009040106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SablatnigLGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SavoldiG09,
  author       = {Antonio Savoldi and
                  Paolo Gubian},
  title        = {Volatile Memory Collection and Analysis for Windows Mission-Critical
                  Computer Systems},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {3},
  pages        = {42--61},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009070103},
  doi          = {10.4018/JDCF.2009070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SavoldiG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SlayS09,
  author       = {Jill Slay and
                  Matthew Simon},
  title        = {Voice Over {IP:} Privacy and Forensic Implications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {89--101},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010106},
  doi          = {10.4018/JDCF.2009010106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SlayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Sorell09,
  author       = {Matthew Sorell},
  title        = {Unexpected Artifacts in a Digital Photograph},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {45--58},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010103},
  doi          = {10.4018/JDCF.2009010103},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Sorell09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Sorell09a,
  author       = {Matthew Sorell},
  title        = {Conditions for Effective Detection and Identification of Primary Quantisation
                  of Re-Quantized {JPEG} Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {13--27},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040102},
  doi          = {10.4018/JDCF.2009040102},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Sorell09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Steel09,
  author       = {Chad M. S. Steel},
  title        = {Web-Based Child Pornography: Quantification and Qualification of Demand},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {4},
  pages        = {58--69},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009062405},
  doi          = {10.4018/JDCF.2009062405},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Steel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Willassen09,
  author       = {Svein Yngvar Willassen},
  title        = {A Model Based Approach to Timestamp Evidence Interpretation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {2},
  pages        = {1--12},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009040101},
  doi          = {10.4018/JDCF.2009040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Willassen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangCCYW09,
  author       = {Chengcui Zhang and
                  Xin Chen and
                  Wei{-}bang Chen and
                  Lin Yang and
                  Gary Warner},
  title        = {Spam Image Clustering for Identifying Common Sources of Unsolicited
                  Emails},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {3},
  pages        = {1--20},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009070101},
  doi          = {10.4018/JDCF.2009070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangCCYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics