Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf2.bht:"
@article{DBLP:journals/ijdcf/AmeriniCCPP10, author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and Alessandro Piva}, title = {Estimate of {PRNU} Noise Based on Different Noise Models for Source Camera Identification}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {21--33}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040102}, doi = {10.4018/JDCF.2010040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AmeriniCCPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaldelliAP10, author = {Roberto Caldelli and Irene Amerini and Francesco Picchioni}, title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {21--29}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010102}, doi = {10.4018/JDCF.2010010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CaldelliAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChennammaR10, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Source Camera Identification Based on Sensor Readout Noise}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {28--42}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070103}, doi = {10.4018/JDCF.2010070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChennammaR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CurranRPC10, author = {Kevin Curran and Andrew Robinson and Stephen Peacocke and Sean Cassidy}, title = {Mobile Phone Forensic Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {15--27}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070102}, doi = {10.4018/JDCF.2010070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CurranRPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DavisS10, author = {Michael Davis and Alice Sedsman}, title = {Grey Areas - The Legal Dimensions of Cloud Computing}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {30--39}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010103}, doi = {10.4018/JDCF.2010010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DavisS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Edmond10, author = {Gary Edmond}, title = {Suspect sciences? Evidentiary Problems with Emerging Technologies}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {40--72}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010104}, doi = {10.4018/JDCF.2010010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Edmond10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HaltisSB10, author = {Kosta Haltis and Matthew Sorell and Russell S. A. Brinkworth}, title = {A Biologically Inspired Smart Camera for Use in Surveillance Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {1--14}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070101}, doi = {10.4018/JDCF.2010070101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HaltisSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KwittMU10, author = {Roland Kwitt and Peter Meerwald and Andreas Uhl}, title = {Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {34--46}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040103}, doi = {10.4018/JDCF.2010040103}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KwittMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LaadjelBKY10, author = {Moussadek Laadjel and Ahmed Bouridane and Fatih Kurugollu and WeiQi Yan}, title = {Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {1--15}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100101}, doi = {10.4018/JDCF.2010100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LaadjelBKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiR10, author = {Qiming Li and Sujoy Roy}, title = {Secure Robust Hash Functions and Their Applications in Non-interactive Communications}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {51--62}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100104}, doi = {10.4018/JDCF.2010100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLZYL10, author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and Zhengding Lu}, title = {Digital Image Forensics Using Multi-Resolution Histograms}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {37--50}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100103}, doi = {10.4018/JDCF.2010100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLZYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MatamL10, author = {B. R. Matam and David Lowe}, title = {Watermark-Only Security Attack on {DM-QIM} Watermarking: Vulnerability to Guided Key Guessing}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {64--87}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040105}, doi = {10.4018/JDCF.2010040105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MatamL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/McGrathGC10, author = {Niall McGrath and Pavel Gladyshev and Joe Carthy}, title = {Cryptopometry as a Methodology for Investigating Encrypted Material}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {1--20}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010101}, doi = {10.4018/JDCF.2010010101}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/McGrathGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/NiuKZ10, author = {Yaqing Niu and Sridhar Krishnan and Qin Zhang}, title = {Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {16--36}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100102}, doi = {10.4018/JDCF.2010100102}, timestamp = {Sun, 19 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/NiuKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SamphaiboonD10, author = {Natthawut Samphaiboon and Matthew M. Dailey}, title = {Steganography in Thai Text}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {43--64}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070104}, doi = {10.4018/JDCF.2010070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SamphaiboonD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WeirLY10, author = {Jonathan Weir and Raymond Lau and WeiQi Yan}, title = {Digital Image Splicing Using Edges}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {63--75}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100105}, doi = {10.4018/JDCF.2010100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WeirLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zarri10, author = {Gian Piero Zarri}, title = {A Conceptual Methodology for Dealing with Terrorism "Narratives"}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {47--63}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040104}, doi = {10.4018/JDCF.2010040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Zarri10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoHS10, author = {Xi Zhao and Anthony Tung Shuen Ho and Yun Q. Shi}, title = {Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {1--20}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040101}, doi = {10.4018/JDCF.2010040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.