Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2018
- Sani M. Abdullahi, Hongxia Wang, Asad Malik:
Fingerprint Image Hashing Based on Minutiae Points and Shape Context. Int. J. Digit. Crime Forensics 10(4): 1-20 (2018) - Muhammad Abulaish, Nur Al Hasan Haldar:
Advances in Digital Forensics Frameworks and Tools: A Comparative Insight and Ranking. Int. J. Digit. Crime Forensics 10(2): 95-119 (2018) - Guangxuan Chen, Liping Ding, Guangxiao Chen, Panke Qin:
Reliable Security Strategy for Message-Oriented Middleware. Int. J. Digit. Crime Forensics 10(1): 12-23 (2018) - Guangxuan Chen, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen, Qiang Liu:
Trust Evaluation Strategy for Single Sign-on Solution in Cloud. Int. J. Digit. Crime Forensics 10(1): 1-11 (2018) - Juan Chen, Fei Peng:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. Int. J. Digit. Crime Forensics 10(1): 67-78 (2018) - Kai Chen, Dawen Xu:
An Efficient Reversible Data Hiding Scheme for Encrypted Images. Int. J. Digit. Crime Forensics 10(2): 1-22 (2018) - Wanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu:
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery. Int. J. Digit. Crime Forensics 10(2): 120-136 (2018) - Xiaojuan Dong, Weiming Zhang, Xianjun Hu, Keyang Liu:
A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images. Int. J. Digit. Crime Forensics 10(4): 118-139 (2018) - Lin Gao, Tiegang Gao, Jie Zhao, Yonglei Liu:
Reversible Watermarking in Digital Image Using PVO and RDWT. Int. J. Digit. Crime Forensics 10(2): 40-55 (2018) - Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng:
Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud. Int. J. Digit. Crime Forensics 10(1): 24-39 (2018) - Teng Guo, Feng Liu, Wen Wang:
Visual Gambling. Int. J. Digit. Crime Forensics 10(3): 43-49 (2018) - Peng Li, Zuquan Liu:
An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size. Int. J. Digit. Crime Forensics 10(3): 78-94 (2018) - Zhuoqian Liang, Bingwen Feng, Xuba Xu, Xiaotian Wu, Tao Yang:
Geometrically Invariant Image Watermarking Using Histogram Adjustment. Int. J. Digit. Crime Forensics 10(1): 54-66 (2018) - Xiaoxi Liu, Ju Liu, Lingchen Gu, Yannan Ren:
Keyframe-Based Vehicle Surveillance Video Retrieval. Int. J. Digit. Crime Forensics 10(4): 52-61 (2018) - Yimin Liu, Wenyan Liu, Xiangyang Luo:
Survey on the Indoor Localization Technique of Wi-Fi Access Points. Int. J. Digit. Crime Forensics 10(3): 27-42 (2018) - Lu Liu, Yao Zhao, Rongrong Ni, Qi Tian:
Copy-Move Forgery Localization Using Convolutional Neural Networks and CFA Features. Int. J. Digit. Crime Forensics 10(4): 140-155 (2018) - Min Long, Fei Peng, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - Jonathan McKeague, Kevin Curran:
Detecting the Use of Anonymous Proxies. Int. J. Digit. Crime Forensics 10(2): 74-94 (2018) - Fei Peng, Shuai-ping Wang, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling. Int. J. Digit. Crime Forensics 10(4): 80-89 (2018) - Preetish Ranjan, Vrijendra Singh, Prabhat Kumar, Satya Prakash:
Models for the Detection of Malicious Intent People in Society. Int. J. Digit. Crime Forensics 10(3): 15-26 (2018) - Yueqiu Ren, Minh Nguyen, Wei-Qi Yan:
Real-Time Recognition of Series Seven New Zealand Banknotes. Int. J. Digit. Crime Forensics 10(3): 50-65 (2018) - Min Tu, Shiyang Xu, Jianfeng Xu:
Evaluation Method of Public Transportation System Based on Fuzzy Cloud Model. Int. J. Digit. Crime Forensics 10(4): 36-51 (2018) - Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang:
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain. Int. J. Digit. Crime Forensics 10(4): 90-107 (2018) - Fan Wu, Ran Sun, Wenhao Fan, Yuanan Liu, Feng Liu, Hui Lu:
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control. Int. J. Digit. Crime Forensics 10(3): 95-113 (2018) - Jianying Xiong, Min Tu, Ying Zhou:
Using Weighted Similarity to Assess Risk of Illegal Fund Raising in Online P2P Lending. Int. J. Digit. Crime Forensics 10(4): 62-79 (2018) - Xuehu Yan, Yuliang Lu, Lintao Liu, Duohe Ma:
Image Secret Sharing Construction for General Access Structure with Meaningful Share. Int. J. Digit. Crime Forensics 10(3): 66-77 (2018) - Wei Qi Yan, Xiaotian Wu, Feng Liu:
Progressive Scrambling for Social Media. Int. J. Digit. Crime Forensics 10(2): 56-73 (2018) - Qing Ye, Mingxing Hu, Guangxuan Chen, Panke Qin:
An Improved Encryption Scheme for Traitor Tracing from Lattice. Int. J. Digit. Crime Forensics 10(4): 21-35 (2018) - Chen Yue, Tianliang Lu, Cai Manchun, Jingying Li:
Evaluation of the Attack Effect Based on Improved Grey Clustering Model. Int. J. Digit. Crime Forensics 10(1): 92-100 (2018) - Sun Yuting, Jing Guo, Ling Du, Yongzhen Ke:
Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation. Int. J. Digit. Crime Forensics 10(3): 1-14 (2018)
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-01 03:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint