default search action
IEEE Transactions on Information Forensics and Security, Volume 5
Volume 5, Number 1, March 2010
- Xiangui Kang, Jiwu Huang, Wenjun Zeng:
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. 1-12 - Alessandro Piva, Tiziano Bianchi, Alessia De Rosa:
Secure client-side ST-DM watermark embedding. 13-26 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Step construction of visual cryptography schemes. 27-38 - Mahalingam Ramkumar:
The subset keys and identity tickets (SKIT) key distribution scheme. 39-51 - Heeseung Choi, Kyoungtaek Choi, Jaihie Kim:
Mosaicing touchless and mirror-reflected fingerprint images. 52-61 - Sarat C. Dass:
Assessing fingerprint individuality in presence of noisy minutiae. 62-70 - Jiwen Lu, Yap-Peng Tan:
A doubly weighted approach for appearance-based subspace learning methods. 71-81 - Haibin Ling, Stefano Soatto, Narayanan Ramanathan, David W. Jacobs:
Face verification across age progression using discriminative methods. 82-91 - Ajay Kumar, Vivek Kanhangad, David Zhang:
A new framework for adaptive multimodal biometrics management. 92-102 - Yi Cheng Feng, Pong Chi Yuen, Anil K. Jain:
A hybrid approach for generating secure and discriminating face template. 103-117 - Francis Minhthang Bui, Karl Martin, Haiping Lu, Konstantinos N. Plataniotis, Dimitrios Hatzinakos:
Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications. 118-132 - Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang:
Fragility analysis of adaptive quantization-based image hashing. 133-147 - Santhanakrishnan Anand, Rajarathnam Chandramouli:
On the location of an eavesdropper in multiterminal networks. 148-157 - Guilin Wang:
An abuse-free fair contract-signing protocol based on the RSA signature. 158-168 - Shari Lawrence Pfleeger, Joel B. Predd, Jeffrey Hunker, Carla Bulford:
Insiders behaving badly: addressing bad actors and their actions. 169-179 - Tiziano Bianchi, Alessandro Piva, Mauro Barni:
Composite signal representation for fast and storage-efficient processing of encrypted signals. 180-187 - Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, Zhang Xiong:
Reversible image watermarking using interpolation technique. 187-193 - David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. 194 - Russell A. Fink, Alan T. Sherman, Richard Carback:
Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. 194
Volume 5, Number 2, June 2010
- Weiqi Luo, Fangjun Huang, Jiwu Huang:
Edge adaptive image steganography based on LSB matching revisited. 201-214 - Tomás Pevný, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. 215-224 - Anindya Sarkar, Upamanyu Madhow, B. S. Manjunath:
Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. 225-239 - Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:
Information-theoretically secret key generation for fading wireless channels. 240-254 - Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar:
Blind authentication: a secure crypto-biometric verification protocol. 255-268 - Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general nondiscrete signals. 269-279 - Chang-Tsun Li:
Source camera identification using enhanced sensor pattern noise. 280-287 - Mehmet Celenk, Thomas Conley, John Willis, James Graham:
Predictive network anomaly detection and visualization. 288-299 - Hidehisa Nakayama, Abbas Jamalipour, Nei Kato:
Network-based traitor-tracing technique using traffic pattern. 300-313 - Hong Cao, Alex C. Kot:
Lossless data embedding in electronic inks. 314-323 - Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. 324-336 - Tanya Ignatenko, Frans M. J. Willems:
Information leakage in fuzzy commitment schemes. 337-348 - Gokhan Gul, Fatih Kurugollu:
SVD-based universal spatial domain image steganalysis. 349-353 - Graeme Bell, Yeuan-Kuen Lee:
A method for automatic identification of signatures of steganography software. 354-358
Volume 5, Number 3, September 2010
- Xiaoli Li, Sridhar Krishnan, Ngok-Wah Ma:
A wavelet-PCA-based fingerprinting scheme for peer-to-peer video file sharing. 365-373 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
An experimental study on the security performance of YASS. 374-380 - Jon W. Wallace, Rajesh K. Sharma:
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. 381-392 - Paul C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe:
Purely automated attacks on passpoints-style graphical passwords. 393-405 - Unsang Park, Anil K. Jain:
Face matching and retrieval using soft biometrics. 406-415 - Richard M. Jiang, Danny Crookes, Nie Luo:
Face recognition in global harmonic subspace. 416-424 - Nese Alyüz, Berk Gökberk, Lale Akarun:
Regional registration for expression resistant 3-D face recognition. 425-440 - Richa Singh, Mayank Vatsa, Himanshu S. Bhatt, Samarth Bharadwaj, Afzel Noore, Shahin S. Nooreyezdan:
Plastic surgery: a new dimension to face recognition. 441-448 - Mei Chen, Joseph A. O'Sullivan, Naveen Singla, Erik J. Sirevaag, Sean D. Kristjansson, Po-Hsiang Lai, Alan David Kaplan, John W. Rohrbaugh:
Laser Doppler vibrometry measures of physiological function: evaluation of biometric capabilities. 449-460 - Norman Poh, David Windridge, Vadim Mottl, Alexander Tatarchuk, Andrey Eliseyev:
Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution. 461-469 - Mayank Vatsa, Richa Singh, Afzel Noore, Arun Ross:
On the dynamic selection of biometric fusion algorithms. 470-479 - Weiqi Luo, Jiwu Huang, Guoping Qiu:
JPEG error analysis and its applications to digital image forensics. 480-491 - Matthew C. Stamm, K. J. Ray Liu:
Forensic detection of image manipulation using statistical intrinsic fingerprints. 492-506 - Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. 507-517 - Sutharshan Rajasegarar, Christopher Leckie, James C. Bezdek, Marimuthu Palaniswami:
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. 518-533 - Daniel Patricio Nicolalde Rodríguez, José Antonio Apolinário, Luiz Wagner Pereira Biscainho:
Audio authenticity: detecting ENF discontinuity with high precision phase analysis. 534-543 - Wei Zhang, Xiaochun Cao, Yanling Qu, Yuexian Hou, Handong Zhao, Chenyang Zhang:
Detecting and extracting the photo composites using planar homography and graph cut. 544-555 - Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Noninteractive pairwise key establishment for sensor networks. 556-569 - Sara Motahari, Sotirios G. Ziavras, Quentin Jones:
Online anonymity protection in computer-mediated communication. 570-580 - Lourdes Araujo, Juan Martínez-Romo:
Web spam detection: new classification features based on qualified link analysis and language models. 581-590 - Zulfiqar Hassan Khan, Irene Yu-Hua Gu:
Joint feature correspondences and appearance similarity for robust visual object tracking. 591-606
Volume 5, Number 4, December 2010
- Peter K. K. Loh, Deepak Subramanian:
Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting. 613-624 - Hui-Yu Huang, Cheng-Han Yang, Wen-Hsing Hsu:
A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation. 625-637 - Jiann-Der Lee, Yaw-Hwang Chiou, Jing-Ming Guo:
Reversible Data Hiding Based on Histogram Modification of SMVQ Indices. 638-648 - Azadeh Mansouri, Ahmad Mahmoudi Aznaveh, Farah Torkamani-Azar, Fatih Kurugollu:
A Low Complexity Video Watermarking in H.264 Compressed Domain. 649-657 - Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, Mehmet Kivanç Mihçak:
A Detection Theoretic Approach to Digital Fingerprinting With Focused Receivers Under Uniform Linear Averaging Gaussian Attacks. 658-669 - Minoru Kuribayashi, Hiroshi Kato:
Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme. 670-680 - Jan Kodovský, Jessica J. Fridrich:
Quantitative Structural Steganalysis of Jsteg. 681-693 - Weiming Zhang, Jiufen Liu, Xin Wang, Nenghai Yu:
Generalization and Analysis of the Paper Folding Method for Steganography. 694-704 - Tomás Filler, Jessica J. Fridrich:
Gibbs Construction in Steganography. 705-720 - Kwangtaek Kim, Mauro Barni, Hong Z. Tan:
Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness. 721-733 - Ran Tao, Xiangyi Meng, Yue Wang:
Image Encryption With Multiorders of Fractional Fourier Transforms. 734-738 - Stanislaw Jarecki, Nitesh Saxena:
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. 739-749 - Yongchang Wang, Laurence G. Hassebrook, Daniel L. Lau:
Data Acquisition and Processing of 3-D Fingerprints. 750-760 - Jiwen Lu, Yap-Peng Tan:
Gait-Based Human Age Estimation. 761-770 - Koichiro Niinuma, Unsang Park, Anil K. Jain:
Soft Biometric Traits for Continuous User Authentication. 771-780 - Norman Poh, Chi-Ho Chan, Josef Kittler, Sébastien Marcel, Chris McCool, Enrique Argones-Rúa, José Luis Alba-Castro, Mauricio Villegas, Roberto Paredes, Vitomir Struc, Nikola Pavesic, Albert Ali Salah, Hui Fang, Nicholas Costen:
An Evaluation of Video-to-Video Face Verification. 781-801 - Mitchell McLaren, Robert Vogt, Brendan Baker, Sridha Sridharan:
A Comparison of Session Variability Compensation Approaches for Speaker Verification. 802-809 - Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. 810-815 - Yu-Feng Hsu, Shih-Fu Chang:
Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection. 816-825 - Yan Gao, Alok N. Choudhary, Gang Hua:
A Comprehensive Approach to Image Spam Detection: From Server to Client Solution. 826-836 - Marie-Francine Moens, Jan De Beer, Erik Boiy, Juan-Carlos Gomez:
Identifying and Resolving Hidden Text Salting. 837-847 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
Detecting Double JPEG Compression With the Same Quantization Matrix. 848-856 - Xunyu Pan, Siwei Lyu:
Region Duplication Detection Using Image Feature Matching. 857-867 - Simson L. Garfinkel, Aleatha Parker-Wood, Daniel Huynh, James J. Migletz:
An Automated Solution to the Multiuser Carved Data Ascription Problem. 868-882 - Michihiro Kobayashi, Takahiro Okabe, Yoichi Sato:
Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions. 883-892 - Jim Aarestad, Dhruva Acharyya, Reza M. Rad, Jim Plusquellic:
Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQ s. 893-904 - Xiaohong Guan, Tao Qin, Wei Li, Pinghui Wang:
Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring. 905-919 - Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessandro Piva, Bart Preneel:
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol. 920-931 - Dalwon Jang, Chang Dong Yoo, Ton Kalker:
Distance Metric Learning for Content Identification. 932-944 - Tsung-Yuan Liu, Wen-Hsiang Tsai:
Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques. 945-954 - Manas Baveja, Hongsong Yuan, Lawrence M. Wein:
Asymptotic Biometric Analysis for Large Gallery Sizes. 955-964
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.