Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 16 Oct 2024Bibliometrics
Skip Table Of Content Section
article
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the secret communication ...

article
User Identity Hiding Method of Android

With an 86.1% global market share, Android takes the top spot smartphone operating system. Due to its open environment, Android suffers from various kinds of attacks, which cause a serious privacy leakage problem. To protect users' privacy information,...

article
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features

Copy-move forgery (CMF) is an established process to copy an image segment and pastes it within the same image to hide or duplicate a portion of the image. Several CMF detection techniques are available; however, better detection accuracy with low ...

article
Anti-Forensics of Double Compressed MP3 Audio

The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been ...

article
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications

Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous growth due to the ...

article
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution

One of the major challenges faced by video surveillance is recognition from low-resolution videos or person identification. Image enhancement methods play a significant role in enhancing the resolution of the video. This article introduces a technique ...

article
A Common General Access Structure Construction Approach in Secret Image Sharing

(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS), polynomial-based SIS, ...

article
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings

As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic evidence validity, and how to ...

Comments