Journal: Computer Security and Data Forensics(JCSDF)

Establishment Year: 2021

Administrator: Shandong Provincial Education Department

Sponsor: Shandong University of Science and Technology

Editor in Chief: Jeng-Shyang PAN

E-mail: JengShyangPan@gmail.com

8. Forensics towards image super-resolution gen...
Haichao Yao, Rongrong Ni*, and Yao Zhao*
Abstract:With the help of deep networks, image super-resolution (SR) has developed rapidly in recent years....
7. Double QR codes secret sharing scheme based ...
Tao Liu, Bin Yan, Hong-Mei Yang, and Jeng-Shyang Pan*
Abstract:Quick response code secret sharing (QRCSS) scheme is a technology that can divide the secret QR co...
6. Recent advances in predictive models for rev...
Xiao-zhu Xie, and Ching-Chun Chang*
Abstract:Reversible data hiding (RDH) is a technique that permits marked carriers to be restored to their p...
5. Overview of reversible data hiding
Tiancong Zhang, Shaowei Weng*, and Shu-Chuan Chu
Abstract:Reversible data hiding (abbreviated as RDH), also called as lossless or erasable data hiding, has ...
4. Color transparency based visual cryptography...
Hao Luo*, Ajith Abraham, and Jeng-Shyang Pan
Abstract:Visual cryptography is a powerful technique for image encryption and secret sharing. The main adva...
3. A survey of QR code solutions for hiding sec...
Peng-Cheng Huang, and Ching-Chun Chang *
Abstract:Two-dimensional barcode is an optical machine-readable label widely used for information transmiss...
2. An extreme rainfall monitoring based on impl...
Trong-The Nguyen, Tien-Thanh Nguyen, Thi-Kien Dao*, Thi-Xuan-Huong Nguyen, Huu-Trung Tran, and Truon
Abstract:This paper presents a design rainfall monitoring system based on a wireless sensor network (WSN) i...
1. Password-based authenticated key exchange fr...
Jen-Chien Hsu, Yi-Siou Jheng, Sk Md Mizanur Rahman, and Raylin Tso*
Abstract:The password-based authenticated key exchange is a technology that allows both parties to perform ...