Journal: Computer Security and Data Forensics(JCSDF)

Establishment Year: 2021

Administrator: Shandong Provincial Education Department

Sponsor: Shandong University of Science and Technology

Editor in Chief: Jeng-Shyang PAN

E-mail: JengShyangPan@gmail.com

[Volume 1, Issue 2] 2. Security analysis and im...
Jen-Chien Hsu, Jhe-Wei Lin, Sk Md Mizanur Rahman, and Raylin Tso*
​Abstract:In the research of cryptography, a very important technique is “pairing-based cryptography ”. ...
[Volume 1, Issue 2] 1. A novel watermarking met...
Xiao-Xue Sun, Tao Liu, Lingping Kong, and Shu-Chuan Chu*
Abstract:With the progress of the information technology, the network has brought great convenience to diff...
[Volume 1, Issue 1] 8. Forensics towards image ...
Haichao Yao, Rongrong Ni*, and Yao Zhao*
Abstract:With the help of deep networks, image super-resolution (SR) has developed rapidly in recent years....
[Volume 1, Issue 1] 7. Double QR codes secret s...
Tao Liu, Bin Yan, Hong-Mei Yang, and Jeng-Shyang Pan*
Abstract:Quick response code secret sharing (QRCSS) scheme is a technology that can divide the secret QR co...
[Volume 1, Issue 1] 6. Recent advances in predi...
Xiao-zhu Xie, and Ching-Chun Chang*
Abstract:Reversible data hiding (RDH) is a technique that permits marked carriers to be restored to their p...
[Volume 1, Issue 1] 5. Overview of reversible d...
Tiancong Zhang, Shaowei Weng*, and Shu-Chuan Chu
Abstract:Reversible data hiding (abbreviated as RDH), also called as lossless or erasable data hiding, has ...
[Volume 1, Issue 1] 4. Color transparency based...
Hao Luo*, Ajith Abraham, and Jeng-Shyang Pan
Abstract:Visual cryptography is a powerful technique for image encryption and secret sharing. The main adva...
[Volume 1, Issue 1] 3. A survey of QR code solu...
Peng-Cheng Huang, and Ching-Chun Chang *
Abstract:Two-dimensional barcode is an optical machine-readable label widely used for information transmiss...
[Volume 1, Issue 1] 2. An extreme rainfall moni...
Trong-The Nguyen, Tien-Thanh Nguyen, Thi-Kien Dao*, Thi-Xuan-Huong Nguyen, Huu-Trung Tran, and Truon
Abstract:This paper presents a design rainfall monitoring system based on a wireless sensor network (WSN) i...
[Volume 1, Issue 1] 1. Password-based authentic...
Jen-Chien Hsu, Yi-Siou Jheng, Sk Md Mizanur Rahman, and Raylin Tso*
Abstract:The password-based authenticated key exchange is a technology that allows both parties to perform ...