Search dblp for Publications

export results for "toc:db/journals/tifs/tifs2.bht:"

 download as .bib file

@article{DBLP:journals/tifs/AgamS07,
  author       = {Gady Agam and
                  Suneel Suresh},
  title        = {Warping-Based Offline Signature Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {430--437},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902675},
  doi          = {10.1109/TIFS.2007.902675},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AgamS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AllinsonSGCA07,
  author       = {Nigel M. Allinson and
                  Jeevandra Sivarajah and
                  Ian Gledhill and
                  Michael Carling and
                  L. J. Allinson},
  title        = {Robust Wireless Transmission of Compressed Latent Fingerprint Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {331--340},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902684},
  doi          = {10.1109/TIFS.2007.902684},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AllinsonSGCA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Alonso-FernandezFOGFKB07,
  author       = {Fernando Alonso{-}Fernandez and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia and
                  Joaquin Gonzalez{-}Rodriguez and
                  Hartwig Fronthaler and
                  Klaus Kollreider and
                  Josef Big{\"{u}}n},
  title        = {A Comparative Study of Fingerprint Image-Quality Estimation Methods},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {734--743},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908228},
  doi          = {10.1109/TIFS.2007.908228},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Alonso-FernandezFOGFKB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaladoHMS07,
  author       = {F{\'{e}}lix Balado and
                  Neil J. Hurley and
                  Elizabeth P. McCarthy and
                  Guenole C. M. Silvestre},
  title        = {Performance Analysis of Robust Audio Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {254--266},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897258},
  doi          = {10.1109/TIFS.2007.897258},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BaladoHMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BeritelliS07,
  author       = {Francesco Beritelli and
                  Salvatore Serrano},
  title        = {Biometric Identification Based on Frequency Analysis of Cardiac Sounds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {596--604},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902922},
  doi          = {10.1109/TIFS.2007.902922},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BeritelliS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BhanuRKCB07,
  author       = {Bir Bhanu and
                  Nalini K. Ratha and
                  B. V. K. Vijaya Kumar and
                  Rama Chellappa and
                  Josef Big{\"{u}}n},
  title        = {Guest Editorial: Special Issue on Human Detection and Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {489--490},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.905740},
  doi          = {10.1109/TIFS.2007.905740},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BhanuRKCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoyerDB07,
  author       = {Jean{-}Philippe Boyer and
                  Pierre Duhamel and
                  Jacques Blanc{-}Talon},
  title        = {Performance Analysis of Scalar {DC-QIM} for Zero-Bit Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {283--289},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897279},
  doi          = {10.1109/TIFS.2007.897279},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BoyerDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangHL07,
  author       = {Chin{-}Chen Chang and
                  Yi{-}Pei Hsieh and
                  Chih{-}Yang Lin},
  title        = {Lossless Data Embedding With High Embedding Capacity Based on Declustering
                  for VQ-Compressed Codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {341--349},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902683},
  doi          = {10.1109/TIFS.2007.902683},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenSS07,
  author       = {Jianjun Chen and
                  Zoltan Safar and
                  John Aasted S{\o}rensen},
  title        = {Multimodal Wireless Networks: Communication and Surveillance on the
                  Same Infrastructure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {468--484},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.904944},
  doi          = {10.1109/TIFS.2007.904944},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoubassiM07,
  author       = {Maha El Choubassi and
                  Pierre Moulin},
  title        = {Noniterative Algorithms for Sensitivity Analysis Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {113--126},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897276},
  doi          = {10.1109/TIFS.2007.897276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChoubassiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CookCS07,
  author       = {Jamie Cook and
                  Vinod Chandran and
                  Sridha Sridharan},
  title        = {Multiscale Representation for 3-D Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {529--536},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902405},
  doi          = {10.1109/TIFS.2007.902405},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CookCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EkenelGS07,
  author       = {Hazim Kemal Ekenel and
                  Hua Gao and
                  Rainer Stiefelhagen},
  title        = {3-D Face Recognition Using Local Appearance-Based Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {630--636},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902924},
  doi          = {10.1109/TIFS.2007.902924},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EkenelGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Frattolillo07,
  author       = {Franco Frattolillo},
  title        = {Watermarking Protocol for Web Context},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {350--363},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.903849},
  doi          = {10.1109/TIFS.2007.903849},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Frattolillo07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Furon07,
  author       = {Teddy Furon},
  title        = {A Constructive and Unifying Framework for Zero-Bit Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {149--163},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897272},
  doi          = {10.1109/TIFS.2007.897272},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Furon07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GafurovSB07,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes and
                  Patrick Bours},
  title        = {Spoof Attacks on Gait Authentication System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {491--502},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902030},
  doi          = {10.1109/TIFS.2007.902030},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GafurovSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GoldmannMS07,
  author       = {Lutz Goldmann and
                  Ullrich J. M{\"{o}}nich and
                  Thomas Sikora},
  title        = {Components and Their Topology for Robust Face Detection in the Presence
                  of Partial Occlusions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {559--569},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902019},
  doi          = {10.1109/TIFS.2007.902019},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GoldmannMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gonzalez-JimenezA07,
  author       = {Daniel Gonz{\'{a}}lez{-}Jim{\'{e}}nez and
                  Jos{\'{e}} Luis Alba{-}Castro},
  title        = {Toward Pose-Invariant 2-D Face Recognition Through Point Distribution
                  Models and Facial Symmetry},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {413--429},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.903543},
  doi          = {10.1109/TIFS.2007.903543},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gonzalez-JimenezA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gonzalez-JimenezA07a,
  author       = {Daniel Gonz{\'{a}}lez{-}Jim{\'{e}}nez and
                  Jos{\'{e}} Luis Alba{-}Castro},
  title        = {Shape-Driven Gabor Jets for Face Description and Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {769--780},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910238},
  doi          = {10.1109/TIFS.2007.910238},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gonzalez-JimenezA07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GoudelisZTP07,
  author       = {Georgios Goudelis and
                  Stefanos Zafeiriou and
                  Anastasios Tefas and
                  Ioannis Pitas},
  title        = {Class-Specific Kernel-Discriminant Analysis for Face Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {570--587},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902915},
  doi          = {10.1109/TIFS.2007.902915},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GoudelisZTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeW07,
  author       = {Shan He and
                  Min Wu},
  title        = {Collusion-Resistant Video Fingerprinting for Large User Group},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {697--709},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908179},
  doi          = {10.1109/TIFS.2007.908179},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Hennings-YeomansKS07,
  author       = {Pablo H. Hennings{-}Yeomans and
                  B. V. K. Vijaya Kumar and
                  Marios Savvides},
  title        = {Palmprint Classification Using Multiple Advanced Correlation Filters
                  and Palm-Specific Segmentation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {613--622},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902039},
  doi          = {10.1109/TIFS.2007.902039},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Hennings-YeomansKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangW07,
  author       = {Sheng Huang and
                  Jian Kang Wu},
  title        = {Optical Watermarking for Printed Document Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {164--173},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897255},
  doi          = {10.1109/TIFS.2007.897255},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZ07,
  author       = {Xingliang Huang and
                  Bo Zhang},
  title        = {Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--13},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890309},
  doi          = {10.1109/TIFS.2006.890309},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IoannidisTDAM07,
  author       = {Dimosthenis Ioannidis and
                  Dimitrios Tzovaras and
                  Ioannis G. Damousis and
                  Savvas Argyropoulos and
                  Konstantinos Moustakas},
  title        = {Gait Recognition Using Compact Feature Extraction Transforms and Depth
                  Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {623--630},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902040},
  doi          = {10.1109/TIFS.2007.902040},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/IoannidisTDAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JohnsonF07,
  author       = {Micah K. Johnson and
                  Hany Farid},
  title        = {Exposing Digital Forgeries in Complex Lighting Environments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {450--461},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.903848},
  doi          = {10.1109/TIFS.2007.903848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JohnsonF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Ker07,
  author       = {Andrew D. Ker},
  title        = {Steganalysis of Embedding in Two Least-Significant Bits},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {46--54},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890519},
  doi          = {10.1109/TIFS.2006.890519},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Ker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Ker07a,
  author       = {Andrew D. Ker},
  title        = {Derivation of Error Distribution in Least Squares Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {140--148},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897265},
  doi          = {10.1109/TIFS.2007.897265},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Ker07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KirbizLCK07,
  author       = {Serap Kirbiz and
                  Aweke N. Lemma and
                  Mehmet Utku Celik and
                  Stefan Katzenbeisser},
  title        = {Decode-Time Forensic Watermarking of {AAC} Bitstreams},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {683--696},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908194},
  doi          = {10.1109/TIFS.2007.908194},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KirbizLCK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KollreiderFFB07,
  author       = {Klaus Kollreider and
                  Hartwig Fronthaler and
                  Maycel Isaac Faraj and
                  Josef Big{\"{u}}n},
  title        = {Real-Time Face Detection and Motion Analysis With Application in "Liveness"
                  Assessment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {548--558},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902037},
  doi          = {10.1109/TIFS.2007.902037},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KollreiderFFB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KotsiaZP07,
  author       = {Irene Kotsia and
                  Stefanos Zafeiriou and
                  Ioannis Pitas},
  title        = {A Novel Discriminant Non-Negative Matrix Factorization Algorithm With
                  Applications to Facial Image Characterization Problems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {588--595},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902017},
  doi          = {10.1109/TIFS.2007.902017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KotsiaZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarZ07,
  author       = {Ajay Kumar and
                  David Zhang},
  title        = {Hand-Geometry Recognition Using Entropy-Based Discretization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {181--187},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.896915},
  doi          = {10.1109/TIFS.2007.896915},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KumarZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeCSL07,
  author       = {Thanh{-}Ha Le and
                  Jessy Cl{\'{e}}di{\`{e}}re and
                  Christine Servi{\`{e}}re and
                  Jean{-}Louis Lacoume},
  title        = {Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {710--720},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910252},
  doi          = {10.1109/TIFS.2007.910252},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeCSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeYK07,
  author       = {Sunil Lee and
                  Chang Dong Yoo and
                  Ton Kalker},
  title        = {Reversible Image Watermarking Based on Integer-to-Integer Wavelet
                  Transform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {321--330},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.905146},
  doi          = {10.1109/TIFS.2007.905146},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiC07,
  author       = {Qiao Li and
                  Ingemar J. Cox},
  title        = {Using Perceptual Models to Improve Fidelity and Provide Resistance
                  to Valumetric Scaling for Quantization Index Modulation Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {127--139},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897266},
  doi          = {10.1109/TIFS.2007.897266},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiT07,
  author       = {Zhifeng Li and
                  Xiaoou Tang},
  title        = {Using Support Vector Machines to Enhance the Performance of Bayesian
                  Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {174--180},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897247},
  doi          = {10.1109/TIFS.2007.897247},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiT07a,
  author       = {Qing Li and
                  Wade Trappe},
  title        = {Detecting Spoofing and Anomalous Traffic in Wireless Networks via
                  Forge-Resistant Relationships},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {793--808},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910236},
  doi          = {10.1109/TIFS.2007.910236},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiT07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangBA07,
  author       = {Xuefeng Liang and
                  Arijit Bishnu and
                  Tetsuo Asano},
  title        = {A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure
                  and Low-Order Delaunay Triangles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {721--733},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910242},
  doi          = {10.1109/TIFS.2007.910242},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangBA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDZ07,
  author       = {Wei Liu and
                  Lina Dong and
                  Wenjun Zeng},
  title        = {Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {645--654},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908226},
  doi          = {10.1109/TIFS.2007.908226},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuT07,
  author       = {Tsung{-}Yuan Liu and
                  Wen{-}Hsiang Tsai},
  title        = {A New Steganographic Method for Data Hiding in Microsoft Word Documents
                  by a Change Tracking Technique},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {24--30},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890310},
  doi          = {10.1109/TIFS.2006.890310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoW07,
  author       = {Yinian Mao and
                  Min Wu},
  title        = {Tracing Malicious Relays in Cooperative Wireless Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {198--212},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897242},
  doi          = {10.1109/TIFS.2007.897242},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoW07a,
  author       = {Yinian Mao and
                  Min Wu},
  title        = {Unicity Distance of Robust Image Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {462--467},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902260},
  doi          = {10.1109/TIFS.2007.902260},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MongaM07,
  author       = {Vishal Monga and
                  Mehmet Kivan{\c{c}} Mih{\c{c}}ak},
  title        = {Robust and Secure Image Hashing via Non-Negative Matrix Factorizations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {376--390},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902670},
  doi          = {10.1109/TIFS.2007.902670},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MongaM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MpiperisMS07,
  author       = {Iordanis Mpiperis and
                  Sotiris Malassiotis and
                  Michael G. Strintzis},
  title        = {3-D Face Recognition With the Geodesic Polar Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {537--547},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902326},
  doi          = {10.1109/TIFS.2007.902326},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MpiperisMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NandakumarJP07,
  author       = {Karthik Nandakumar and
                  Anil K. Jain and
                  Sharath Pankanti},
  title        = {Fingerprint-Based Fuzzy Vault: Implementation and Performance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {744--757},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908165},
  doi          = {10.1109/TIFS.2007.908165},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NandakumarJP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NomirA07,
  author       = {Omaima Nomir and
                  Mohamed Abdel{-}Mottaleb},
  title        = {Human Identification From Dental X-Ray Images Based on the Shape and
                  Appearance of the Teeth},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {188--197},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897245},
  doi          = {10.1109/TIFS.2007.897245},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NomirA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NoorkamiM07,
  author       = {Maneli Noorkami and
                  Russell M. Mersereau},
  title        = {A Framework for Robust Watermarking of H.264-Encoded Video With Controllable
                  Detection Performance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {14--23},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890306},
  doi          = {10.1109/TIFS.2006.890306},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NoorkamiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NoorkamiM07a,
  author       = {Maneli Noorkami and
                  Russell M. Mersereau},
  title        = {Correction to "A Framework for Robust Watermarking of {H.264} Encoded
                  Video With Controllable Detection Performance"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {809--809},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910245},
  doi          = {10.1109/TIFS.2007.910245},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NoorkamiM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RakshitM07,
  author       = {Soumyadip Rakshit and
                  Donald M. Monro},
  title        = {An Evaluation of Image Sampling and Compression for Human Iris Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {605--612},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902401},
  doi          = {10.1109/TIFS.2007.902401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RakshitM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaoY07,
  author       = {Anil Kumar Sao and
                  B. Yegnanarayana},
  title        = {Face Verification Using Template Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {636--641},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902920},
  doi          = {10.1109/TIFS.2007.902920},
  timestamp    = {Fri, 21 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaoY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SencarM07,
  author       = {Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {664--682},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908211},
  doi          = {10.1109/TIFS.2007.908211},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SencarM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShengHFD07,
  author       = {Weiguo Sheng and
                  Gareth Howells and
                  Michael C. Fairhurst and
                  Farzin Deravi},
  title        = {A Memetic Fingerprint Matching Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {402--412},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902681},
  doi          = {10.1109/TIFS.2007.902681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShengHFD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunL07,
  author       = {Yan Lindsay Sun and
                  K. J. Ray Liu},
  title        = {Analysis and Protection of Dynamic Membership Information for Group
                  Key Distribution Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {213--226},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897274},
  doi          = {10.1109/TIFS.2007.897274},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SutcuLM07,
  author       = {Yagiz Sutcu and
                  Qiming Li and
                  Nasir D. Memon},
  title        = {Protecting Biometric Templates With Sketch: Theory and Practice},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {503--512},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902022},
  doi          = {10.1109/TIFS.2007.902022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SutcuLM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SwaminathanWL07,
  author       = {Ashwin Swaminathan and
                  Min Wu and
                  K. J. Ray Liu},
  title        = {Nonintrusive Component Forensics of Visual Sensors Using Output Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {91--106},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890307},
  doi          = {10.1109/TIFS.2006.890307},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SwaminathanWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangF07,
  author       = {Weihong Wang and
                  Hany Farid},
  title        = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {438--449},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902661},
  doi          = {10.1109/TIFS.2007.902661},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangL07,
  author       = {Shen{-}Zheng Wang and
                  Hsi{-}Jian Lee},
  title        = {A Cascade Framework for a Real-Time Statistical Plate Recognition
                  System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {267--282},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897251},
  doi          = {10.1109/TIFS.2007.897251},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangM07,
  author       = {Ying Wang and
                  Pierre Moulin},
  title        = {Optimized Feature Extraction for Learning-Based Image Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {31--45},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890517},
  doi          = {10.1109/TIFS.2006.890517},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSXN07,
  author       = {Xiao Tong Wang and
                  Cheng Yong Shao and
                  X. G. Xu and
                  Xiamu Niu},
  title        = {Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference
                  Expansion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {311--320},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902677},
  doi          = {10.1109/TIFS.2007.902677},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSXN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWN07,
  author       = {Xiangyang Wang and
                  Jun Wu and
                  Panpan Niu},
  title        = {A New Digital Image Watermarking Algorithm Resilient to Desynchronization
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {655--663},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908233},
  doi          = {10.1109/TIFS.2007.908233},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WilsonTS07,
  author       = {Robert D. Wilson and
                  David Tse and
                  Robert A. Scholtz},
  title        = {Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {364--375},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902666},
  doi          = {10.1109/TIFS.2007.902666},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WilsonTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanLTH07,
  author       = {Shuicheng Yan and
                  Jianzhuang Liu and
                  Xiaoou Tang and
                  Thomas S. Huang},
  title        = {A Parameter-Free Framework for General Supervised Subspace Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {69--76},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890313},
  doi          = {10.1109/TIFS.2006.890313},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanLTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangL07,
  author       = {Jian Yang and
                  Chengjun Liu},
  title        = {Horizontal and Vertical 2DPCA-Based Discriminant Analysis for Face
                  Verification on a Large-Scale Database},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {781--792},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.910239},
  doi          = {10.1109/TIFS.2007.910239},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuJL07,
  author       = {Wei Yu and
                  Zhu Ji and
                  K. J. Ray Liu},
  title        = {Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring:
                  Strategies and Game Theoretic Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {240--253},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897270},
  doi          = {10.1109/TIFS.2007.897270},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuL07,
  author       = {Wei Yu and
                  K. J. Ray Liu},
  title        = {Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {2},
  pages        = {227--239},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.897269},
  doi          = {10.1109/TIFS.2007.897269},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZafeiriouTP07,
  author       = {Stefanos Zafeiriou and
                  Anastasios Tefas and
                  Ioannis Pitas},
  title        = {Learning Discriminant Person-Specific Facial Models Using Expandable
                  Graphs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {55--68},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890308},
  doi          = {10.1109/TIFS.2006.890308},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZafeiriouTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengWB07,
  author       = {Gang Zheng and
                  Chia{-}Jiu Wang and
                  Terrance E. Boult},
  title        = {Application of Projective Invariants in Hand Geometry Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {4},
  pages        = {758--768},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.908239},
  doi          = {10.1109/TIFS.2007.908239},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengWB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhongH07,
  author       = {Jidong Zhong and
                  Shangteng Huang},
  title        = {Double-Sided Watermark Embedding and Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {297--310},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902663},
  doi          = {10.1109/TIFS.2007.902663},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhongH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuDJ07,
  author       = {Yongfang Zhu and
                  Sarat C. Dass and
                  Anil K. Jain},
  title        = {Statistical Models for Assessing the Individuality of Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-1},
  pages        = {391--401},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.903846},
  doi          = {10.1109/TIFS.2007.903846},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuDJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZouCXLC07,
  author       = {Le Zou and
                  Samuel Cheng and
                  Zixiang Xiong and
                  Mi Lu and
                  Kenneth R. Castleman},
  title        = {3-D Face Recognition Based on Warped Example Faces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {513--528},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902023},
  doi          = {10.1109/TIFS.2007.902023},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZouCXLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZuoSC07,
  author       = {Jinyu Zuo and
                  Natalia A. Schmid and
                  Xiaohan Chen},
  title        = {On Generation and Analysis of Synthetic Iris Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {1},
  pages        = {77--90},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2006.890305},
  doi          = {10.1109/TIFS.2006.890305},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZuoSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics