


Остановите войну!
for scientists:


default search action
IEEE Transactions on Information Forensics and Security, Volume 10
Volume 10, Number 1, January 2015
- Manhua Liu, Xiaoying Chen, Xiaoduan Wang:
Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation. 6-15 - Ikenna Odinaka, Joseph A. O'Sullivan
, Erik J. Sirevaag, John W. Rohrbaugh:
Cardiovascular Biometrics: Combining Mechanical and Electrical Signals. 16-27 - Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra:
Live Video Forensics: Source Identification in Lossy Wireless Networks. 28-39 - Muhammad R. A. Khandaker
, Kai-Kit Wong:
Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers. 40-54 - Zhen Liu, Zhenfu Cao
, Duncan S. Wong:
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. 55-68 - Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. 69-78 - Jiwen Lu
, Gang Wang, Weihong Deng
, Kui Jia:
Reconstruction-Based Metric Learning for Unconstrained Face Verification. 79-89 - Lifeng Wang, Kyeong Jin Kim, Trung Quang Duong
, Maged Elkashlan, H. Vincent Poor
:
Security Enhancement of Cooperative Single Carrier Systems. 90-103 - Kai Cao, Anil K. Jain:
Learning Fingerprint Reconstruction: From Minutiae to Image. 104-117 - Chunsheng Zhu, Hasen Nicanfar, Victor C. M. Leung
, Laurence T. Yang:
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration. 118-131 - Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source. 132-141 - Gaurav Bansod
, Nishchal Raval
, Narayan Pisharoty:
Implementation of a New Lightweight Encryption Design for Embedded Security. 142-151 - Li Weng, Laurent Amsaleg, April Morton, Stéphane Marchand-Maillet:
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval. 152-167 - Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng
:
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. 168-177 - Joseph K. Liu
, Cheng-Kang Chu, Sherman S. M. Chow
, Xinyi Huang, Man Ho Au
, Jianying Zhou
:
Time-Bound Anonymous Authentication for Roaming Networks. 178-189 - Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. 190-199 - Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank:
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications. 200-212
Volume 10, Number 2, February 2015
- Vojtech Holub, Jessica J. Fridrich:
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. 219-228 - Tianqing Zhu, Ping Xiong, Gang Li
, Wanlei Zhou
:
Correlated Differential Privacy: Hiding Information in Non-IID Data Set. 229-242 - Bingwen Feng, Wei Lu, Wei Sun:
Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. 243-255 - Massoud Masoumi
, Mohammad Hadi Rezayati:
Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis. 256-265 - Honorio Martín
, Thomas Korak, Enrique San Millán, Michael Hutter:
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness. 266-277 - Taekyoung Kwon, Jin Hong
:
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. 278-292 - Hao Deng, Huiming Wang, Wei Guo, Wenjie Wang:
Secrecy Transmission With a Helper: To Relay or to Jam. 293-307 - Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu
:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. 308-320 - Hugo Proença
:
Iris Recognition: What Is Beyond Bit Fragility? 321-332 - Joseph Roth, Xiaoming Liu, Arun Ross, Dimitris N. Metaxas:
Investigating the Discriminative Power of Keystroke Sound. 333-345 - Yicong Liang, Xiaoqing Ding, Jing-Hao Xue:
Advanced Joint Bayesian Method for Face Verification. 346-354 - Avik Sengupta, Ravi Tandon, T. Charles Clancy:
Fundamental Limits of Caching With Secure Delivery. 355-370 - Seung-Hyun Seo
, Jongho Won, Salmin Sultana, Elisa Bertino:
Effective Key Management in Dynamic Wireless Sensor Networks. 371-383 - Jaroslav Sedenka, Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani:
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones. 384-396 - Y. Ma, Li-Min Zhang, H. Wang:
Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise. 397-408 - Alireza Jolfaei
, Xin-Wen Wu
, Vallipuram Muthukkumarasamy:
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability. 409-422 - Sayan Maity, Mohamed Abdel-Mottaleb
:
3D Ear Segmentation and Classification Through Indexing. 423-435
Volume 10, Number 3, March 2015
- Thijs Veugen, Robbert de Haan, Ronald Cramer, Frank Muller:
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations. 445-457 - Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. 458-470 - Guang Yao, Jun Bi, Athanasios V. Vasilakos
:
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter. 471-484 - Ayad F. Barsoum, M. Anwar Hasan:
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems. 485-497 - Thijs Veugen:
Linear Round Bit-Decomposition of Secret-Shared Values. 498-506 - Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. 507-518 - Mostafa M. I. Taha, Patrick Schaumont
:
Key Updating for Leakage Resiliency With Application to AES Modes of Operation. 519-528 - Sotirios Karachontzitis, Stelios Timotheou
, Ioannis Krikidis
, Kostas Berberidis:
Security-Aware Max-Min Resource Allocation in Multiuser OFDMA Downlink. 529-542 - Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li:
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. 543-557 - Bin Li, Tian-Tsong Ng
, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis. 558-573 - Gaojie Chen, Yu Gong, Pei Xiao, Jonathon A. Chambers:
Physical Layer Network Security in the Full-Duplex Relay System. 574-583 - Mario Cagalj, Toni Perkovic
, Marin Bugaric
:
Timing Attacks on Cognitive Authentication Schemes. 584-596 - Sevinc Bayram
, Husrev Taha Sencar, Nasir D. Memon:
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing. 597-612 - Peng Zhou, Siwei Jiang, Athirai Aravazhi Irissappane
, Jie Zhang, Jianying Zhou
, Joseph Chee Ming Teo:
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs. 613-625 - Hsin-Wen Kung, Yi-Han Tu, Chiou-Ting Hsu:
Dual Subspace Nonnegative Graph Embedding for Identity-Independent Expression Recognition. 626-639 - Yi Jin
, Jiwen Lu
, Qiuqi Ruan:
Coupled Discriminative Feature Learning for Heterogeneous Face Recognition. 640-652 - Xiaocheng Hu, Weiming Zhang, Xiaolong Li, Nenghai Yu:
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding. 653-664 - Jinguang Han
, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Allen Au
:
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. 665-678 - Jongkil Kim
, Willy Susilo
, Man Ho Au
, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. 679-693
Volume 10, Number 4, April 2015
- Nicholas W. D. Evans, Stan Z. Li, Sébastien Marcel
, Arun Ross:
Guest Editorial Special Issue on Biometric Spoofing and Countermeasures. 699-702 - Ramachandra Raghavendra
, Christoph Busch:
Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features. 703-715 - Oleg V. Komogortsev, Alexey Karpov
, Corey D. Holland:
Attack of Mechanical Replicas: Liveness Detection With Eye Movements. 716-725 - Adam Czajka:
Pupil Dynamics for Iris Liveness Detection. 726-735 - Daniel F. Smith, Arnold Wiliem
, Brian C. Lovell:
Face Recognition on Consumer Devices: Reflections on Replay Attacks. 736-745 - Di Wen, Hu Han
, Anil K. Jain:
Face Spoof Detection With Image Distortion Analysis. 746-761 - Santosh Tirunagari
, Norman Poh, David Windridge
, Aamo Iorliam
, Nik Suki, Anthony T. S. Ho
:
Detection of Face Spoofing Using Visual Dynamics. 762-777 - Diogo C. Garcia, Ricardo L. de Queiroz
:
Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis. 778-786 - Ivana Chingovska, André Rabello dos Anjos
:
On the Use of Client Identity Information for Face Antispoofing. 787-796 - Jianwei Yang, Zhen Lei, Dong Yi, Stan Z. Li:
Person-Specific Face Antispoofing With Subject Domain Adaptation. 797-809 - Jon Sánchez
, Ibon Saratxaga
, Inma Hernáez
, Eva Navas
, Daniel Erro, Tuomo Raitio:
Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information. 810-820 - Aleksandr Sizov, Elie Khoury, Tomi Kinnunen, Zhizheng Wu, Sébastien Marcel
:
Joint Speaker Verification and Antispoofing in the i-Vector Space. 821-832 - Mario Hildebrandt, Jana Dittmann:
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection. 833-848 - Diego Gragnaniello
, Giovanni Poggi, Carlo Sansone
, Luisa Verdoliva:
An Investigation of Local Descriptors for Biometric Spoofing Detection. 849-863 - David Menotti
, Giovani Chiachia, Allan da Silva Pinto
, William Robson Schwartz
, Hélio Pedrini, Alexandre Xavier Falcão
, Anderson Rocha:
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection. 864-879
Volume 10, Number 5, May 2015
- Fuyou Miao, Yan Xiong, Xingfu Wang, Moaman Badawy:
Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing. 889-899 - Emanuele Maiorana
, Gabriel Emile Hine
, Patrizio Campisi:
Hill-Climbing Attacks on Multibiometrics Recognition Systems. 900-915 - Arfika Nurhudatiana, Adams Wai-Kin Kong:
On Criminal Identification in Color Skin Images Using Skin Marks (RPPVSM) and Fusion With Inferred Vein Patterns. 916-931 - Qi Xiong, Ying-Chang Liang
, Kwok Hung Li
, Yi Gong:
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems. 932-940 - Augusto Ferrante, Nicola Laurenti, Chiara Masiero
, Michele Pavon, Stefano Tomasin
:
On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading. 941-952 - Thirapiroon Thongkamwitoon, Hani Muammar, Pier Luigi Dragotti
:
An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles. 953-968 - Ali Moeini, Hossein Moeini:
Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix. 969-984 - Benjamin Tams, Preda Mihailescu, Axel Munk:
Security Considerations in Minutiae-Based Fuzzy Vaults. 985-998 - Khosro Bahrami, Alex ChiChung Kot, Leida Li, Haoliang Li
:
Blurred Image Splicing Localization by Exposing Blur Type Inconsistency. 999-1009 - Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid. 1010-1024 - Allan da Silva Pinto
, William Robson Schwartz
, Hélio Pedrini, Anderson de Rezende Rocha:
Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks. 1025-1038 - Rhiannon Weaver:
Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity. 1039-1051 - Jung Hee Cheon, Jinsu Kim:
A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption. 1052-1063 - Andrey Garnaev
, Wade Trappe:
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. 1064-1075 - Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution. 1076-1091 - Xiaokui Shu, Danfeng Yao
, Elisa Bertino:
Privacy-Preserving Detection of Sensitive Data Exposure. 1092-1103
Volume 10, Number 6, June 2015
- Jung Yeon Hwang, Liqun Chen
, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. 1109-1124 - Adi Hajj-Ahmad, Ravi Garg, Min Wu
:
ENF-Based Region-of-Recording Identification for Media Signals. 1125-1136 - Jiliang Zhang, Yaping Lin, Yongqiang Lyu, Gang Qu:
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing. 1137-1150 - Amir Sonee
, Ghosheh Abed Hodtani
:
On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information. 1151-1166 - Jia Yu, Kui Ren
, Cong Wang
, Vijay Varadharajan
:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. 1167-1179 - Donald R. Reising, Michael A. Temple, Julie Ann Jackson:
Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints. 1180-1192 - Cai Li, Jiankun Hu
, Josef Pieprzyk
, Willy Susilo
:
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. 1193-1206 - Amanda Sgroi, Patrick J. Flynn, Kevin W. Bowyer
, P. Jonathon Phillips:
Strong, Neutral, or Weak: Exploring the Impostor Score Distribution. 1207-1220 - Boris Skoric:
Tally-Based Simple Decoders for Traitor Tracing and Group Testing. 1221-1233 - Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:
The CEO Problem With Secrecy Constraints. 1234-1249 - Shaoquan Jiang:
On the Optimality of Keyless Authentication in a Noisy Model. 1250-1261 - Johannes Richter, Christian Scheunert, Sabrina Engelmann, Eduard A. Jorswieck
:
Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward. 1262-1273 - Jianting Ning, Xiaolei Dong, Zhenfu Cao
, Lifei Wei, Xiaodong Lin:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. 1274-1288 - Tarique Anwar
, Muhammad Abulaish
:
Ranking Radically Influential Web Forum Users. 1289-1298 - Jun Zhou, Xiaolei Dong, Zhenfu Cao
, Athanasios V. Vasilakos
:
Secure and privacy preserving protocol for cloud-based vehicular DTNs. 1299-1314 - Jia-An Hong, Kaiping Xue, Wei Li:
Comments on "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems" / Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems. 1315-1317
Volume 10, Number 7, July 2015
- Kyle Guan, Antonia Maria Tulino
, Peter J. Winzer, Emina Soljanin
:
Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems. 1325-1335 - Xiaofeng Wang, Kemu Pang, Xiaorui Zhou, Yang Zhou, Lu Li, Jianru Xue:
A Visual Model-Based Perceptual Image Hash for Content Authentication. 1336-1349 - Sandra Zancajo-Blazquez, Susana Lagüela-Lopez
, Diego González-Aguilera
, Joaquin Martinez-Sanchez
:
Segmentation of Indoor Mapping Point Clouds Applied to Crime Scenes Reconstruction. 1350-1358 - Kevin Lin
, Shen-Chi Chen, Chu-Song Chen, Daw-Tung Lin, Yi-Ping Hung:
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance. 1359-1370 - Jiwen Lu
, Venice Erin Liong, Gang Wang, Pierre Moulin:
Joint Feature Learning for Face Recognition. 1371-1383 - Baodong Qin, Robert H. Deng
, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. 1384-1393 - Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki:
Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent. 1394-1401 - Xiaoyong Li
, Huadong Ma, Feng Zhou, Wenbin Yao:
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services. 1402-1415 - Xiaoyu Chu, Matthew Christopher Stamm, K. J. Ray Liu
:
Compressive Sensing Forensics. 1416-1431 - Lingyun Wen, Xin Li, Guodong Guo
, Yu Zhu:
Automated Depression Diagnosis Based on Facial Dynamic Analysis and Sparse Coding. 1432-1441 - Hu Xiong, Zhiguang Qin:
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. 1442-1455
Volume 10, Number 8, August 2015
- Erkam Uzun, Husrev Taha Sencar:
Carving Orphaned JPEG File Fragments. 1549-1563 - Seunghwan Park, Kwangsu Lee
, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption From Multilinear Maps. 1564-1577 - Kaitai Liang
, Willy Susilo
, Joseph K. Liu
:
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. 1578-1589 - Nadia Othman, Bernadette Dorizzi:
Impact of Quality-Based Fusion Techniques for Video-Based Iris Recognition at a Distance. 1590-1602 - Yi Wang
, Lipeng Wang, Yiu-ming Cheung
, Pong C. Yuen:
Learning Compact Binary Codes for Hash-Based Fingerprint Indexing. 1603-1616 - Jun Xiong, Yanqun Tang, Dongtang Ma, Pei Xiao, Kai-Kit Wong:
Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback. 1617-1629 - Le Zhang, Xuanyao Fong
, Chip-Hong Chang
, Zhi-Hui Kong, Kaushik Roy:
Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable Function With Multi-Response-Bits Per Cell. 1630-1642 - Hassan Jameel Asghar
, Ron Steinfeld, Shujun Li
, Mohamed Ali Kâafar
, Josef Pieprzyk
:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. 1643-1655 - Emin Islam Tatli
:
Cracking More Password Hashes With Patterns. 1656-1665 - Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Predicting Cyber Attack Rates With Extreme Values. 1666-1677