0.8(top 50%)
impact factor
334(top 50%)
papers
1.4K(top 50%)
citations
17(top 50%)
h-index
0.9(top 50%)
extended IF
411
all documents
1.5K
doc citations
25(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1Calm Before the StormInternational Journal of Digital Crime and Forensics201292
2Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS CompressionsInternational Journal of Digital Crime and Forensics201534
3Basic Visual Cryptography Using BrailleInternational Journal of Digital Crime and Forensics201634
4Bitstream-Based JPEG Encryption in Real-timeInternational Journal of Digital Crime and Forensics201332
5A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)International Journal of Digital Crime and Forensics201931
6Exploiting the Homomorphic Property of Visual CryptographyInternational Journal of Digital Crime and Forensics201726
7A Review of Current Research in Network Forensic AnalysisInternational Journal of Digital Crime and Forensics201325
8Polynomial-Based Secret Image Sharing Scheme with Fully Lossless RecoveryInternational Journal of Digital Crime and Forensics201823
9A DFT-Based Analysis to Discern Between Camera and Scanned ImagesInternational Journal of Digital Crime and Forensics201023
10Reversible and Blind Database Watermarking Using Difference ExpansionInternational Journal of Digital Crime and Forensics200922
11The State of the Art Forensic Techniques in Mobile Cloud EnvironmentInternational Journal of Digital Crime and Forensics201522
12A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine ApplicationsInternational Journal of Digital Crime and Forensics201921
13Age Detection Through Keystroke Dynamics from User Authentication FailuresInternational Journal of Digital Crime and Forensics201720
14Detecting Pornographic Images by Localizing Skin ROIsInternational Journal of Digital Crime and Forensics201319
15Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and ToolsInternational Journal of Digital Crime and Forensics200918
16Mobile Phone Forensic AnalysisInternational Journal of Digital Crime and Forensics201018
17A Framework for the Forensic Investigation of Unstructured Email Relationship DataInternational Journal of Digital Crime and Forensics201118
18An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIMInternational Journal of Digital Crime and Forensics201118
19Anti-Forensics for Unsharp Masking Sharpening in Digital ImagesInternational Journal of Digital Crime and Forensics201317
20A Universal Attack Against Histogram-Based Image ForensicsInternational Journal of Digital Crime and Forensics201316
21Efficient Anonymous Identity-Based Broadcast Encryption without Random OraclesInternational Journal of Digital Crime and Forensics201416
22Estimate of PRNU Noise Based on Different Noise Models for Source Camera IdentificationInternational Journal of Digital Crime and Forensics201015
23Requirements for a Forensically Ready Cloud Storage ServiceInternational Journal of Digital Crime and Forensics201115
24Detection of Phishing in Internet of Things Using Machine Learning ApproachInternational Journal of Digital Crime and Forensics202114
25An Improved Essential Secret Image Sharing Scheme with Smaller Shadow SizeInternational Journal of Digital Crime and Forensics201814
26Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized JPEG ImagesInternational Journal of Digital Crime and Forensics200913
27Identification of Natural Images and Computer Generated Graphics Based on Hybrid FeaturesInternational Journal of Digital Crime and Forensics201213
28Reversible Watermarking in Medical Image Using RDWT and Sub-SampleInternational Journal of Digital Crime and Forensics201512
29Fast and Effective Copy-Move Detection of Digital Audio Based on Auto SegmentInternational Journal of Digital Crime and Forensics201912
30Investigation Approach for Network Attack Intention RecognitionInternational Journal of Digital Crime and Forensics201711
31Digital Image Splicing Detection Based on Markov Features in QDCT and QWT DomainInternational Journal of Digital Crime and Forensics201811
32Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted ImageInternational Journal of Digital Crime and Forensics201911
33Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL TreeInternational Journal of Digital Crime and Forensics201911
34The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital ForensicsInternational Journal of Digital Crime and Forensics202011
35ENF Based Video Forgery Detection AlgorithmInternational Journal of Digital Crime and Forensics202011
36Towards a Better Understanding of Drone ForensicsInternational Journal of Digital Crime and Forensics202011
37Drone ForensicsInternational Journal of Digital Crime and Forensics202111
38Protection of Digital Mammograms on PACSs Using Data Hiding TechniquesInternational Journal of Digital Crime and Forensics200911
39Web-Based Child PornographyInternational Journal of Digital Crime and Forensics200911
40LUARMInternational Journal of Digital Crime and Forensics201110
41A Model for Hybrid Evidence InvestigationInternational Journal of Digital Crime and Forensics201210
42Detection of Seam-Carving Image Based on Benford's Law for Forensic ApplicationsInternational Journal of Digital Crime and Forensics201610
43An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud EnvironmentInternational Journal of Digital Crime and Forensics202110
44Fingerprint Liveness Detection Based on Fake Finger CharacteristicsInternational Journal of Digital Crime and Forensics20129
45Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian ContextInternational Journal of Digital Crime and Forensics20209
46An Empirical Study for Human Behavior AnalysisInternational Journal of Digital Crime and Forensics20179
47Robust Near Duplicate Image Matching for Digital Image ForensicsInternational Journal of Digital Crime and Forensics20098
48Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle NetworksInternational Journal of Digital Crime and Forensics20098
49Mitigate DoS and DDoS Attack in Mobile Ad Hoc NetworksInternational Journal of Digital Crime and Forensics20118
50A Framework for Digital Forensics and InvestigationsInternational Journal of Digital Crime and Forensics20138