Subjects -> LAW (Total: 1535 journals)
    - CIVIL LAW (37 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (88 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (167 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (171 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (935 journals)
    - LAW: GENERAL (11 journals)

CRIMINAL LAW (28 journals)

Showing 1 - 26 of 26 Journals sorted alphabetically
American Criminal Law Review     Free   (Followers: 9)
Anuario Iberoamericano de Derecho Internacional Penal     Open Access   (Followers: 3)
Bergen Journal of Criminal Law & Criminal Justice     Open Access   (Followers: 2)
Berkeley Journal of Criminal Law     Open Access   (Followers: 6)
Cambridge journal of evidence-based policing     Hybrid Journal   (Followers: 60)
Derecho Penal y Criminología     Open Access   (Followers: 4)
European Criminal Law Review     Full-text available via subscription   (Followers: 15)
Howard Journal of Crime and Justice The     Hybrid Journal   (Followers: 17)
Indonesian Journal of Criminal Law     Open Access   (Followers: 3)
International Journal of Digital Crime and Forensics     Full-text available via subscription   (Followers: 11)
Journal of Criminal Law     Full-text available via subscription   (Followers: 416)
Journal of Criminal Law and Criminology     Full-text available via subscription   (Followers: 51)
Justitiële verkenningen     Full-text available via subscription   (Followers: 4)
Legal and Criminological Psychology     Full-text available via subscription   (Followers: 15)
Monatsschrift für Kriminologie und Strafrechtsreform / Journal of Criminology an Penal Reform     Hybrid Journal   (Followers: 2)
Money Laundering Bulletin     Full-text available via subscription   (Followers: 8)
New Journal of European Criminal Law     Full-text available via subscription   (Followers: 8)
PROCES     Full-text available via subscription   (Followers: 2)
Psychiatry, Psychology and Law     Hybrid Journal   (Followers: 459)
Revista Eletrônica de Direito Penal e Política Criminal     Open Access   (Followers: 1)
SASI     Open Access   (Followers: 6)
Sexual Abuse A Journal of Research and Treatment     Hybrid Journal   (Followers: 47)
Strafverteidiger     Hybrid Journal   (Followers: 2)
Te Wharenga : New Zealand Criminal Law Review     Open Access   (Followers: 1)
Tidsskrift for strafferett     Full-text available via subscription   (Followers: 2)
Tijdschrift voor Criminologie     Full-text available via subscription   (Followers: 2)
Similar Journals
Journal Cover
International Journal of Digital Crime and Forensics
Journal Prestige (SJR): 0.17
Citation Impact (citeScore): 1
Number of Followers: 11  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1941-6210 - ISSN (Online) 1941-6229
Published by IGI Global Homepage  [147 journals]
  • Information Hiding Model Based on Channel Construction of Orthogonal Basis
    • Authors: Kangsheng; Bao
      Pages: 1 - 18
      Abstract: Secret information communication model based on channel construction of orthogonal basis can implement secret information hiding and recovery without a key. The orthogonal basis is constructed by the media carrier's self-correlation. Carrier and secret information channels are constructed independently. And it has good properties of avoiding detection. The experiments show that the model with proper carrier components and threshold of secret information coding has the capacity of secret information and robustness. And the secret information capacity and anti-noise capability can be improved by compressed and error correcting or checking codes.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 3 (2021) Pages: 1-18
      PubDate: 2021-05-01T04:00:00Z
      DOI: 10.4018/IJDCF.20210501.oa1
      Issue No: Vol. 13, No. 3 (2021)
       
  • A HEVC Video Steganalysis Against DCT/DST-Based Steganography
    • Authors: Shi; Henan, Sun, Tanfeng, Jiang, Xinghao, Dong, Yi, Xu, Ke
      Pages: 19 - 33
      Abstract: The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency video coding (HEVC) videos. The new steganalysis employs special frames extraction (SFE) and accordion unfolding (AU) transformation to target the latest DCT/DST domain HEVC video steganography algorithms by merging temporal and spatial correlation. In this article, the distortion process of DCT/DST-based HEVC steganography is firstly analyzed. Then, based on the analysis, two kinds of distortion, the intra-frame distortion and the inter-frame distortion, are mainly caused by DCT/DST-based steganography. Finally, to effectively detect these distortions, an innovative method of HEVC steganalysis is proposed, which gives a combination feature of SFE and a temporal to spatial transformation, AU. The experiment results show that the proposed steganalysis performs better than other methods.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 3 (2021) Pages: 19-33
      PubDate: 2021-05-01T04:00:00Z
      DOI: 10.4018/IJDCF.20210501.oa2
      Issue No: Vol. 13, No. 3 (2021)
       
  • Virtual Sample Generation and Ensemble Learning Based Image Source
           Identification With Small Training Samples
    • Authors: Wu; Shiqi, Wang, Bo, Zhao, Jianxiang, Zhao, Mengnan, Zhong, Kun, Guo, Yanqing
      Pages: 34 - 46
      Abstract: Nowadays, source camera identification, which aims to identify the source camera of images, is quite important in the field of forensics. There is a problem that cannot be ignored that the existing methods are unreliable and even out of work in the case of the small training sample. To solve this problem, a virtual sample generation-based method is proposed in this paper, combined with the ensemble learning. In this paper, after constructing sub-sets of LBP features, the authors generate a virtual sample-based on the mega-trend-diffusion (MTD) method, which calculates the diffusion range of samples according to the trend diffusion theory, and then randomly generates virtual sample according to uniform distribution within this range. In the aspect of the classifier, an ensemble learning scheme is proposed to train multiple SVM-based classifiers to improve the accuracy of image source identification. The experimental results demonstrate that the proposed method achieves higher average accuracy than the state-of-the-art, which uses a small number of samples as the training sample set.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 3 (2021) Pages: 34-46
      PubDate: 2021-05-01T04:00:00Z
      DOI: 10.4018/IJDCF.20210501.oa3
      Issue No: Vol. 13, No. 3 (2021)
       
  • A Modification-Free Steganography Algorithm Based on Image Classification
           and CNN
    • Authors: Wu; Jian Bin, Zhang, Yang, Luo, Chu Wei, Yuan, Lin Feng, Shen, Xiao Kang
      Pages: 47 - 58
      Abstract: In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social platforms, a semi-structured modification-free steganography algorithm is introduced in the paper. By constructing the mapping relationship between small icons and binary numbers, the idea of image stitching is utilized, and small icons are stitched together according to the behavioral habits of people's social platforms to implement the graphical representation of secret messages. The convolutional neural network (CNN) has been used to train the small icon recognition and classification data set in the algorithm. In order to improve the robustness of the algorithm, the icons processed by various attack methods are introduced as interference samples in the training set. The experimental results show that the algorithm has good anti-attack ability, and the hiding capacity can be improved, which can be used in the covert communication.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 3 (2021) Pages: 47-58
      PubDate: 2021-05-01T04:00:00Z
      DOI: 10.4018/IJDCF.20210501.oa4
      Issue No: Vol. 13, No. 3 (2021)
       
  • Color Image Encryption Using Angular Graph Fourier Transform
    • Authors: Yang; Liuqing, Meng, Wei, Zhao, Xudong
      Pages: 59 - 82
      Abstract: In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties of angular transform and graph transform. In the proposed encryption method, color images are encoded by DNA sequences and confused under the control of chaotic key streams firstly. Secondly, sparse decomposition based on the random walk is applied to scramble pixels spatially, and a series of sub-images are obtained. This step increases encryption efficiency. Finally, the intrinsic sub-image structure is reflected by graphs, and the signals on different subgraphs are transformed into different AGFT domains with particular angular parameters, which makes the proposed method relevant to the original image structure and enhances security. The experimental results demonstrate that the proposed algorithm can resist various potential attacks and achieve better performance than the state-of-the-art algorithms.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 3 (2021) Pages: 59-82
      PubDate: 2021-05-01T04:00:00Z
      DOI: 10.4018/IJDCF.20210501.oa5
      Issue No: Vol. 13, No. 3 (2021)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.236.231.61
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-