Journal: Comput. J.

Volume 55, Issue 6

649 -- 650Fairouz Kamareddine. Capsule Reviews
651 -- 652Wojciech Mazurczyk, Krzysztof Szczypiorski. Toward Effective and Reliable Digital Forensics
653 -- 666Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux. Steganography: A Class of Secure and Robust Algorithms
667 -- 685Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Image and Video Encryption based on Dual Space-Filling Curves
686 -- 701Xiaofeng Wang, Nanning Zheng, Jianru Xue, Zhenli Liu. A Novel Image Signature Method for Content Authentication
702 -- 716Hui Tian, Hong Jiang, Ke Zhou, Dan Feng. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
717 -- 727Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang. Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane
728 -- 739Ronaldo M. Salles, Donato A. Marino Jr.. Strategies and Metric for Resilience in Computer Networks
740 -- 755João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
756 -- 768Chao-Hsien Lee, Chung-Ming Huang, Chia-Ching Yang, Tai-Hsiang Wang. Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks
769 -- 775Antoine Bossard, Keiichi Kaneko. The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes