Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf2.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/AmeriniCCPP10,
  author       = {Irene Amerini and
                  Roberto Caldelli and
                  Vito Cappellini and
                  Francesco Picchioni and
                  Alessandro Piva},
  title        = {Estimate of {PRNU} Noise Based on Different Noise Models for Source
                  Camera Identification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {21--33},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040102},
  doi          = {10.4018/JDCF.2010040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AmeriniCCPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaldelliAP10,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni},
  title        = {A DFT-Based Analysis to Discern Between Camera and Scanned Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {21--29},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010102},
  doi          = {10.4018/JDCF.2010010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaldelliAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChennammaR10,
  author       = {H. R. Chennamma and
                  Lalitha Rangarajan},
  title        = {Source Camera Identification Based on Sensor Readout Noise},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {28--42},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070103},
  doi          = {10.4018/JDCF.2010070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChennammaR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CurranRPC10,
  author       = {Kevin Curran and
                  Andrew Robinson and
                  Stephen Peacocke and
                  Sean Cassidy},
  title        = {Mobile Phone Forensic Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {15--27},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070102},
  doi          = {10.4018/JDCF.2010070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CurranRPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DavisS10,
  author       = {Michael Davis and
                  Alice Sedsman},
  title        = {Grey Areas - The Legal Dimensions of Cloud Computing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {30--39},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010103},
  doi          = {10.4018/JDCF.2010010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DavisS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Edmond10,
  author       = {Gary Edmond},
  title        = {Suspect sciences? Evidentiary Problems with Emerging Technologies},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {40--72},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010104},
  doi          = {10.4018/JDCF.2010010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Edmond10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaltisSB10,
  author       = {Kosta Haltis and
                  Matthew Sorell and
                  Russell S. A. Brinkworth},
  title        = {A Biologically Inspired Smart Camera for Use in Surveillance Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {1--14},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070101},
  doi          = {10.4018/JDCF.2010070101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HaltisSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KwittMU10,
  author       = {Roland Kwitt and
                  Peter Meerwald and
                  Andreas Uhl},
  title        = {Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree
                  Complex Wavelet Transform Domain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {34--46},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040103},
  doi          = {10.4018/JDCF.2010040103},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KwittMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LaadjelBKY10,
  author       = {Moussadek Laadjel and
                  Ahmed Bouridane and
                  Fatih Kurugollu and
                  WeiQi Yan},
  title        = {Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {1--15},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100101},
  doi          = {10.4018/JDCF.2010100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LaadjelBKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiR10,
  author       = {Qiming Li and
                  Sujoy Roy},
  title        = {Secure Robust Hash Functions and Their Applications in Non-interactive
                  Communications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {51--62},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100104},
  doi          = {10.4018/JDCF.2010100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLZYL10,
  author       = {Jin Liu and
                  Hefei Ling and
                  Fuhao Zou and
                  WeiQi Yan and
                  Zhengding Lu},
  title        = {Digital Image Forensics Using Multi-Resolution Histograms},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {37--50},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100103},
  doi          = {10.4018/JDCF.2010100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLZYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MatamL10,
  author       = {B. R. Matam and
                  David Lowe},
  title        = {Watermark-Only Security Attack on {DM-QIM} Watermarking: Vulnerability
                  to Guided Key Guessing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {64--87},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040105},
  doi          = {10.4018/JDCF.2010040105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MatamL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/McGrathGC10,
  author       = {Niall McGrath and
                  Pavel Gladyshev and
                  Joe Carthy},
  title        = {Cryptopometry as a Methodology for Investigating Encrypted Material},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {1},
  pages        = {1--20},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010010101},
  doi          = {10.4018/JDCF.2010010101},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/McGrathGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NiuKZ10,
  author       = {Yaqing Niu and
                  Sridhar Krishnan and
                  Qin Zhang},
  title        = {Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {16--36},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100102},
  doi          = {10.4018/JDCF.2010100102},
  timestamp    = {Sun, 19 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/NiuKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SamphaiboonD10,
  author       = {Natthawut Samphaiboon and
                  Matthew M. Dailey},
  title        = {Steganography in Thai Text},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {3},
  pages        = {43--64},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010070104},
  doi          = {10.4018/JDCF.2010070104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SamphaiboonD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WeirLY10,
  author       = {Jonathan Weir and
                  Raymond Lau and
                  WeiQi Yan},
  title        = {Digital Image Splicing Using Edges},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {4},
  pages        = {63--75},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010100105},
  doi          = {10.4018/JDCF.2010100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WeirLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zarri10,
  author       = {Gian Piero Zarri},
  title        = {A Conceptual Methodology for Dealing with Terrorism "Narratives"},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {47--63},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040104},
  doi          = {10.4018/JDCF.2010040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zarri10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoHS10,
  author       = {Xi Zhao and
                  Anthony Tung Shuen Ho and
                  Yun Q. Shi},
  title        = {Image Forensics Using Generalised Benford's Law for Improving Image
                  Authentication Detection Rates in Semi-Fragile Watermarking},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {2},
  number       = {2},
  pages        = {1--20},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdcf.2010040101},
  doi          = {10.4018/JDCF.2010040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics