default search action
International Journal of Information and Computer Security, Volume 10
Volume 10, Number 1, 2018
- Sanchita Pathak, Ratnakirti Roy, Suvamoy Changder:
Performance analysis of image steganalysis techniques and future research directives. 1-24 - M. Sumana, K. S. Hareesha:
Modelling a secure support vector machine classifier for private data. 25-40 - C. Pavan Kumar, R. Selvakumar, Raghunadh K. Bhattar:
Reliable and secure communication using fundamental cut-sets and fundamental circuits. 41-62 - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang:
An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. 63-79 - H. S. Hota, Dinesh K. Sharma, Akhilesh Kumar Shrivas:
Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system. 80-101
Volume 10, Numbers 2/3, 2018
- Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari:
WeChat traffic classification using machine learning algorithms and comparative analysis of datasets. 109-128 - Vandana Mohindru, Yashwant Singh:
Node authentication algorithm for securing static wireless sensor networks from node clone attack. 129-148 - Shaojing Li, Wanli Su:
The research of reputation incentive mechanism of P2P network file sharing system. 149-169 - Shashank Gupta, Brij Bhooshan Gupta:
Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks. 170-200 - Sujarani Rajendran, Manivannan Doraipandian:
A nonlinear two dimensional logistic-tent map for secure image communication. 201-215 - Soumitra Roy, Arup Kumar Pal:
A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification. 216-236 - Lihua Song, Xiaofeng Zhang:
Improved pixel relevance based on Mahalanobis distance for image segmentation. 237-247 - Yujuan Sun, Xiaofeng Zhang, Muwei Jian:
3D reconstruction of human face from an input image under random lighting condition. 248-260 - Amita, Amandeep Kaur, Marut Kumar:
Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique. 261-275 - Dulal C. Kar, Anusha Madhuri Nakka, Ajay K. Katangur:
A new statistical attack resilient steganography scheme for hiding messages in audio files. 276-302 - Rohit Raja, Tilendra Shishir Sinha, Raj Kumar Patra, Shrikant Tiwari:
Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques. 303-320
Volume 10, Number 4, 2018
- Arup Kumar Pal, Soumitra Roy:
A robust and blind image watermarking scheme in DCT domain. 321-340 - Ross Gore, Saikou Y. Diallo, Jose J. Padilla, Barry Ezell:
Assessing cyber-incidents using machine learning. 341-360 - Soufiane El Moumni, Mohamed Fettach, Abderrahim Tragha:
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices. 361-373 - Sunil K. Moon, Rajeshree D. Raut:
Innovative data security model using forensic audio video steganography for improving hidden data security and robustness. 374-397 - Ankit Kumar Jain, Brij B. Gupta:
Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation. 398-417 - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li:
Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme. 418-436 - Muhammad Azeem, Yongquan Cai, Allah Ditta, Khurram Gulzar Rana, Faheem Akhtar Rajpoot:
Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters. 437-453
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.