Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs2.bht:"
@article{DBLP:journals/tifs/AgamS07, author = {Gady Agam and Suneel Suresh}, title = {Warping-Based Offline Signature Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {430--437}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902675}, doi = {10.1109/TIFS.2007.902675}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AgamS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AllinsonSGCA07, author = {Nigel M. Allinson and Jeevandra Sivarajah and Ian Gledhill and Michael Carling and L. J. Allinson}, title = {Robust Wireless Transmission of Compressed Latent Fingerprint Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {331--340}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902684}, doi = {10.1109/TIFS.2007.902684}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AllinsonSGCA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Alonso-FernandezFOGFKB07, author = {Fernando Alonso{-}Fernandez and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and Joaquin Gonzalez{-}Rodriguez and Hartwig Fronthaler and Klaus Kollreider and Josef Big{\"{u}}n}, title = {A Comparative Study of Fingerprint Image-Quality Estimation Methods}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {734--743}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908228}, doi = {10.1109/TIFS.2007.908228}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Alonso-FernandezFOGFKB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BaladoHMS07, author = {F{\'{e}}lix Balado and Neil J. Hurley and Elizabeth P. McCarthy and Guenole C. M. Silvestre}, title = {Performance Analysis of Robust Audio Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {254--266}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897258}, doi = {10.1109/TIFS.2007.897258}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BaladoHMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BeritelliS07, author = {Francesco Beritelli and Salvatore Serrano}, title = {Biometric Identification Based on Frequency Analysis of Cardiac Sounds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {596--604}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902922}, doi = {10.1109/TIFS.2007.902922}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BeritelliS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BhanuRKCB07, author = {Bir Bhanu and Nalini K. Ratha and B. V. K. Vijaya Kumar and Rama Chellappa and Josef Big{\"{u}}n}, title = {Guest Editorial: Special Issue on Human Detection and Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {489--490}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.905740}, doi = {10.1109/TIFS.2007.905740}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BhanuRKCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoyerDB07, author = {Jean{-}Philippe Boyer and Pierre Duhamel and Jacques Blanc{-}Talon}, title = {Performance Analysis of Scalar {DC-QIM} for Zero-Bit Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {283--289}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897279}, doi = {10.1109/TIFS.2007.897279}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BoyerDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangHL07, author = {Chin{-}Chen Chang and Yi{-}Pei Hsieh and Chih{-}Yang Lin}, title = {Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {341--349}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902683}, doi = {10.1109/TIFS.2007.902683}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChangHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenSS07, author = {Jianjun Chen and Zoltan Safar and John Aasted S{\o}rensen}, title = {Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {468--484}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.904944}, doi = {10.1109/TIFS.2007.904944}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChoubassiM07, author = {Maha El Choubassi and Pierre Moulin}, title = {Noniterative Algorithms for Sensitivity Analysis Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {113--126}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897276}, doi = {10.1109/TIFS.2007.897276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChoubassiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CookCS07, author = {Jamie Cook and Vinod Chandran and Sridha Sridharan}, title = {Multiscale Representation for 3-D Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {529--536}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902405}, doi = {10.1109/TIFS.2007.902405}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CookCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EkenelGS07, author = {Hazim Kemal Ekenel and Hua Gao and Rainer Stiefelhagen}, title = {3-D Face Recognition Using Local Appearance-Based Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {630--636}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902924}, doi = {10.1109/TIFS.2007.902924}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EkenelGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Frattolillo07, author = {Franco Frattolillo}, title = {Watermarking Protocol for Web Context}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {350--363}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.903849}, doi = {10.1109/TIFS.2007.903849}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Frattolillo07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Furon07, author = {Teddy Furon}, title = {A Constructive and Unifying Framework for Zero-Bit Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {149--163}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897272}, doi = {10.1109/TIFS.2007.897272}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Furon07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GafurovSB07, author = {Davrondzhon Gafurov and Einar Snekkenes and Patrick Bours}, title = {Spoof Attacks on Gait Authentication System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {491--502}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902030}, doi = {10.1109/TIFS.2007.902030}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GafurovSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GoldmannMS07, author = {Lutz Goldmann and Ullrich J. M{\"{o}}nich and Thomas Sikora}, title = {Components and Their Topology for Robust Face Detection in the Presence of Partial Occlusions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {559--569}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902019}, doi = {10.1109/TIFS.2007.902019}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GoldmannMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gonzalez-JimenezA07, author = {Daniel Gonz{\'{a}}lez{-}Jim{\'{e}}nez and Jos{\'{e}} Luis Alba{-}Castro}, title = {Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {413--429}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.903543}, doi = {10.1109/TIFS.2007.903543}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gonzalez-JimenezA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gonzalez-JimenezA07a, author = {Daniel Gonz{\'{a}}lez{-}Jim{\'{e}}nez and Jos{\'{e}} Luis Alba{-}Castro}, title = {Shape-Driven Gabor Jets for Face Description and Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {769--780}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910238}, doi = {10.1109/TIFS.2007.910238}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gonzalez-JimenezA07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GoudelisZTP07, author = {Georgios Goudelis and Stefanos Zafeiriou and Anastasios Tefas and Ioannis Pitas}, title = {Class-Specific Kernel-Discriminant Analysis for Face Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {570--587}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902915}, doi = {10.1109/TIFS.2007.902915}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GoudelisZTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeW07, author = {Shan He and Min Wu}, title = {Collusion-Resistant Video Fingerprinting for Large User Group}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {697--709}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908179}, doi = {10.1109/TIFS.2007.908179}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hennings-YeomansKS07, author = {Pablo H. Hennings{-}Yeomans and B. V. K. Vijaya Kumar and Marios Savvides}, title = {Palmprint Classification Using Multiple Advanced Correlation Filters and Palm-Specific Segmentation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {613--622}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902039}, doi = {10.1109/TIFS.2007.902039}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Hennings-YeomansKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangW07, author = {Sheng Huang and Jian Kang Wu}, title = {Optical Watermarking for Printed Document Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {164--173}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897255}, doi = {10.1109/TIFS.2007.897255}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangZ07, author = {Xingliang Huang and Bo Zhang}, title = {Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {1--13}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890309}, doi = {10.1109/TIFS.2006.890309}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IoannidisTDAM07, author = {Dimosthenis Ioannidis and Dimitrios Tzovaras and Ioannis G. Damousis and Savvas Argyropoulos and Konstantinos Moustakas}, title = {Gait Recognition Using Compact Feature Extraction Transforms and Depth Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {623--630}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902040}, doi = {10.1109/TIFS.2007.902040}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/IoannidisTDAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JohnsonF07, author = {Micah K. Johnson and Hany Farid}, title = {Exposing Digital Forgeries in Complex Lighting Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {450--461}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.903848}, doi = {10.1109/TIFS.2007.903848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JohnsonF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Ker07, author = {Andrew D. Ker}, title = {Steganalysis of Embedding in Two Least-Significant Bits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {46--54}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890519}, doi = {10.1109/TIFS.2006.890519}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Ker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Ker07a, author = {Andrew D. Ker}, title = {Derivation of Error Distribution in Least Squares Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {140--148}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897265}, doi = {10.1109/TIFS.2007.897265}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Ker07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KirbizLCK07, author = {Serap Kirbiz and Aweke N. Lemma and Mehmet Utku Celik and Stefan Katzenbeisser}, title = {Decode-Time Forensic Watermarking of {AAC} Bitstreams}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {683--696}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908194}, doi = {10.1109/TIFS.2007.908194}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KirbizLCK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KollreiderFFB07, author = {Klaus Kollreider and Hartwig Fronthaler and Maycel Isaac Faraj and Josef Big{\"{u}}n}, title = {Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {548--558}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902037}, doi = {10.1109/TIFS.2007.902037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KollreiderFFB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KotsiaZP07, author = {Irene Kotsia and Stefanos Zafeiriou and Ioannis Pitas}, title = {A Novel Discriminant Non-Negative Matrix Factorization Algorithm With Applications to Facial Image Characterization Problems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {588--595}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902017}, doi = {10.1109/TIFS.2007.902017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KotsiaZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KumarZ07, author = {Ajay Kumar and David Zhang}, title = {Hand-Geometry Recognition Using Entropy-Based Discretization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {181--187}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.896915}, doi = {10.1109/TIFS.2007.896915}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KumarZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeCSL07, author = {Thanh{-}Ha Le and Jessy Cl{\'{e}}di{\`{e}}re and Christine Servi{\`{e}}re and Jean{-}Louis Lacoume}, title = {Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {710--720}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910252}, doi = {10.1109/TIFS.2007.910252}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeCSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeYK07, author = {Sunil Lee and Chang Dong Yoo and Ton Kalker}, title = {Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {321--330}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.905146}, doi = {10.1109/TIFS.2007.905146}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeYK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiC07, author = {Qiao Li and Ingemar J. Cox}, title = {Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {127--139}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897266}, doi = {10.1109/TIFS.2007.897266}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiT07, author = {Zhifeng Li and Xiaoou Tang}, title = {Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {174--180}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897247}, doi = {10.1109/TIFS.2007.897247}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiT07a, author = {Qing Li and Wade Trappe}, title = {Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {793--808}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910236}, doi = {10.1109/TIFS.2007.910236}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiT07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangBA07, author = {Xuefeng Liang and Arijit Bishnu and Tetsuo Asano}, title = {A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {721--733}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910242}, doi = {10.1109/TIFS.2007.910242}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangBA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDZ07, author = {Wei Liu and Lina Dong and Wenjun Zeng}, title = {Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {645--654}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908226}, doi = {10.1109/TIFS.2007.908226}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuDZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuT07, author = {Tsung{-}Yuan Liu and Wen{-}Hsiang Tsai}, title = {A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {24--30}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890310}, doi = {10.1109/TIFS.2006.890310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaoW07, author = {Yinian Mao and Min Wu}, title = {Tracing Malicious Relays in Cooperative Wireless Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {198--212}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897242}, doi = {10.1109/TIFS.2007.897242}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaoW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaoW07a, author = {Yinian Mao and Min Wu}, title = {Unicity Distance of Robust Image Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {462--467}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902260}, doi = {10.1109/TIFS.2007.902260}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaoW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MongaM07, author = {Vishal Monga and Mehmet Kivan{\c{c}} Mih{\c{c}}ak}, title = {Robust and Secure Image Hashing via Non-Negative Matrix Factorizations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {376--390}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902670}, doi = {10.1109/TIFS.2007.902670}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MongaM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MpiperisMS07, author = {Iordanis Mpiperis and Sotiris Malassiotis and Michael G. Strintzis}, title = {3-D Face Recognition With the Geodesic Polar Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {537--547}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902326}, doi = {10.1109/TIFS.2007.902326}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MpiperisMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NandakumarJP07, author = {Karthik Nandakumar and Anil K. Jain and Sharath Pankanti}, title = {Fingerprint-Based Fuzzy Vault: Implementation and Performance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {744--757}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908165}, doi = {10.1109/TIFS.2007.908165}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NandakumarJP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NomirA07, author = {Omaima Nomir and Mohamed Abdel{-}Mottaleb}, title = {Human Identification From Dental X-Ray Images Based on the Shape and Appearance of the Teeth}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {188--197}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897245}, doi = {10.1109/TIFS.2007.897245}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NomirA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NoorkamiM07, author = {Maneli Noorkami and Russell M. Mersereau}, title = {A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {14--23}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890306}, doi = {10.1109/TIFS.2006.890306}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NoorkamiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NoorkamiM07a, author = {Maneli Noorkami and Russell M. Mersereau}, title = {Correction to "A Framework for Robust Watermarking of {H.264} Encoded Video With Controllable Detection Performance"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {809--809}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910245}, doi = {10.1109/TIFS.2007.910245}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NoorkamiM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RakshitM07, author = {Soumyadip Rakshit and Donald M. Monro}, title = {An Evaluation of Image Sampling and Compression for Human Iris Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {605--612}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902401}, doi = {10.1109/TIFS.2007.902401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RakshitM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaoY07, author = {Anil Kumar Sao and B. Yegnanarayana}, title = {Face Verification Using Template Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {636--641}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902920}, doi = {10.1109/TIFS.2007.902920}, timestamp = {Fri, 21 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaoY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SencarM07, author = {Husrev T. Sencar and Nasir D. Memon}, title = {Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {664--682}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908211}, doi = {10.1109/TIFS.2007.908211}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SencarM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShengHFD07, author = {Weiguo Sheng and Gareth Howells and Michael C. Fairhurst and Farzin Deravi}, title = {A Memetic Fingerprint Matching Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {402--412}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902681}, doi = {10.1109/TIFS.2007.902681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShengHFD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunL07, author = {Yan Lindsay Sun and K. J. Ray Liu}, title = {Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {213--226}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897274}, doi = {10.1109/TIFS.2007.897274}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SutcuLM07, author = {Yagiz Sutcu and Qiming Li and Nasir D. Memon}, title = {Protecting Biometric Templates With Sketch: Theory and Practice}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {503--512}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902022}, doi = {10.1109/TIFS.2007.902022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SutcuLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SwaminathanWL07, author = {Ashwin Swaminathan and Min Wu and K. J. Ray Liu}, title = {Nonintrusive Component Forensics of Visual Sensors Using Output Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {91--106}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890307}, doi = {10.1109/TIFS.2006.890307}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SwaminathanWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangF07, author = {Weihong Wang and Hany Farid}, title = {Exposing Digital Forgeries in Interlaced and Deinterlaced Video}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {438--449}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902661}, doi = {10.1109/TIFS.2007.902661}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangL07, author = {Shen{-}Zheng Wang and Hsi{-}Jian Lee}, title = {A Cascade Framework for a Real-Time Statistical Plate Recognition System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {267--282}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897251}, doi = {10.1109/TIFS.2007.897251}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangM07, author = {Ying Wang and Pierre Moulin}, title = {Optimized Feature Extraction for Learning-Based Image Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {31--45}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890517}, doi = {10.1109/TIFS.2006.890517}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSXN07, author = {Xiao Tong Wang and Cheng Yong Shao and X. G. Xu and Xiamu Niu}, title = {Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {311--320}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902677}, doi = {10.1109/TIFS.2007.902677}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangSXN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWN07, author = {Xiangyang Wang and Jun Wu and Panpan Niu}, title = {A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {655--663}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908233}, doi = {10.1109/TIFS.2007.908233}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WilsonTS07, author = {Robert D. Wilson and David Tse and Robert A. Scholtz}, title = {Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {364--375}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902666}, doi = {10.1109/TIFS.2007.902666}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WilsonTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanLTH07, author = {Shuicheng Yan and Jianzhuang Liu and Xiaoou Tang and Thomas S. Huang}, title = {A Parameter-Free Framework for General Supervised Subspace Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {69--76}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890313}, doi = {10.1109/TIFS.2006.890313}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanLTH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangL07, author = {Jian Yang and Chengjun Liu}, title = {Horizontal and Vertical 2DPCA-Based Discriminant Analysis for Face Verification on a Large-Scale Database}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {781--792}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.910239}, doi = {10.1109/TIFS.2007.910239}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuJL07, author = {Wei Yu and Zhu Ji and K. J. Ray Liu}, title = {Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {240--253}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897270}, doi = {10.1109/TIFS.2007.897270}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuL07, author = {Wei Yu and K. J. Ray Liu}, title = {Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {2}, pages = {227--239}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.897269}, doi = {10.1109/TIFS.2007.897269}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZafeiriouTP07, author = {Stefanos Zafeiriou and Anastasios Tefas and Ioannis Pitas}, title = {Learning Discriminant Person-Specific Facial Models Using Expandable Graphs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {55--68}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890308}, doi = {10.1109/TIFS.2006.890308}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZafeiriouTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengWB07, author = {Gang Zheng and Chia{-}Jiu Wang and Terrance E. Boult}, title = {Application of Projective Invariants in Hand Geometry Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {4}, pages = {758--768}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.908239}, doi = {10.1109/TIFS.2007.908239}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengWB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhongH07, author = {Jidong Zhong and Shangteng Huang}, title = {Double-Sided Watermark Embedding and Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {297--310}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902663}, doi = {10.1109/TIFS.2007.902663}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhongH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuDJ07, author = {Yongfang Zhu and Sarat C. Dass and Anil K. Jain}, title = {Statistical Models for Assessing the Individuality of Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-1}, pages = {391--401}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.903846}, doi = {10.1109/TIFS.2007.903846}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuDJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZouCXLC07, author = {Le Zou and Samuel Cheng and Zixiang Xiong and Mi Lu and Kenneth R. Castleman}, title = {3-D Face Recognition Based on Warped Example Faces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {513--528}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902023}, doi = {10.1109/TIFS.2007.902023}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZouCXLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZuoSC07, author = {Jinyu Zuo and Natalia A. Schmid and Xiaohan Chen}, title = {On Generation and Analysis of Synthetic Iris Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {1}, pages = {77--90}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2006.890305}, doi = {10.1109/TIFS.2006.890305}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZuoSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.