Search dblp for Publications

export results for "toc:db/journals/tifs/tifs4.bht:"

 download as .bib file

@article{DBLP:journals/tifs/AgarwalP09,
  author       = {Parag Agarwal and
                  Balakrishnan Prabhakaran},
  title        = {Robust blind watermarking of point-sampled geometry},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {36--48},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011081},
  doi          = {10.1109/TIFS.2008.2011081},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AgarwalP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AntonyanDKKMNRS09,
  author       = {Tigran Antonyan and
                  Seda Davtyan and
                  Sotiris Kentros and
                  Aggelos Kiayias and
                  Laurent Michel and
                  Nicolas C. Nicolaou and
                  Alexander Russell and
                  Alexander A. Shvartsman},
  title        = {State-wide elections, optical scan voting systems, and the pursuit
                  of integrity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {597--610},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033232},
  doi          = {10.1109/TIFS.2009.2033232},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AntonyanDKKMNRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArgyropoulosTIS09,
  author       = {Savvas Argyropoulos and
                  Dimitrios Tzovaras and
                  Dimosthenis Ioannidis and
                  Michael G. Strintzis},
  title        = {A channel coding approach for human authentication from gait sequences},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {428--440},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025858},
  doi          = {10.1109/TIFS.2009.2025858},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ArgyropoulosTIS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BelcherD09,
  author       = {Craig Belcher and
                  Yingzi Du},
  title        = {Corrections to "A selective feature information approach for iris
                  image-quality measure"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {578},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2028260},
  doi          = {10.1109/TIFS.2009.2028260},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BelcherD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BenalohMNRT09,
  author       = {Josh Benaloh and
                  Tal Moran and
                  Lee Naish and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Shuffle-sum: coercion-resistant verifiable tallying for {STV} voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {685--698},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033757},
  doi          = {10.1109/TIFS.2009.2033757},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BenalohMNRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BianchiPB09,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {On the implementation of the discrete Fourier transform in the encrypted
                  domain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {86--97},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011087},
  doi          = {10.1109/TIFS.2008.2011087},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BianchiPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoatoCNF09,
  author       = {Giulia Boato and
                  Valentina Conotter and
                  Francesco G. B. De Natale and
                  Claudio Fontanari},
  title        = {Watermarking robustness evaluation based on perceptual quality via
                  genetic algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {207--216},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2020362},
  doi          = {10.1109/TIFS.2009.2020362},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BoatoCNF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BohliHKMR09,
  author       = {Jens{-}Matthias Bohli and
                  Christian Henrich and
                  Carmen Kempka and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Stefan R{\"{o}}hrich},
  title        = {Enhancing electronic voting machines on the example of Bingo voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {745--750},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033755},
  doi          = {10.1109/TIFS.2009.2033755},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BohliHKMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CampbellB09,
  author       = {Bryan A. Campbell and
                  Michael D. Byrne},
  title        = {Straight-party voting: what do voters think?},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {718--728},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031947},
  doi          = {10.1109/TIFS.2009.2031947},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CampbellB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CancelliB09,
  author       = {Giacomo Cancelli and
                  Mauro Barni},
  title        = {MPSteg-color: data hiding through redundant basis decomposition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {346--358},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024028},
  doi          = {10.1109/TIFS.2009.2024028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CancelliB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoK09,
  author       = {Hong Cao and
                  Alex C. Kot},
  title        = {Accurate detection of demosaicing regularity for digital image forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {899--910},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033749},
  doi          = {10.1109/TIFS.2009.2033749},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaK09,
  author       = {Byung{-}Ho Cha and
                  C.{-}C. Jay Kuo},
  title        = {Robust MC-CDMA-based fingerprinting against time-varying collusion
                  attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {302--317},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025849},
  doi          = {10.1109/TIFS.2009.2025849},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangLLL09,
  author       = {Chin{-}Chen Chang and
                  Chia{-}Chen Lin and
                  T. Hoang Ngan Le and
                  Hoai Bac Le},
  title        = {Self-verifying visual secret sharing using error diffusion and interpolation
                  techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {790--801},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034203},
  doi          = {10.1109/TIFS.2009.2034203},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangLLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangYKAA09,
  author       = {Hong Chang and
                  Yi Yao and
                  Andreas F. Koschan and
                  Besma R. Abidi and
                  Mongi A. Abidi},
  title        = {Improving face recognition via narrowband spectral range selection
                  using Jeffrey divergence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {111--122},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2012211},
  doi          = {10.1109/TIFS.2008.2012211},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangYKAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity {II:} end-to-end verifiability by voters of optical scan
                  elections through confirmation codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {611--627},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034919},
  doi          = {10.1109/TIFS.2009.2034919},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenJ09,
  author       = {Zesheng Chen and
                  Chuanyi Ji},
  title        = {An information-theoretic view of network-aware malware attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {530--541},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025847},
  doi          = {10.1109/TIFS.2009.2025847},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenL09,
  author       = {Lin Chen and
                  Jean Leneutre},
  title        = {A game theoretical framework on intrusion detection in heterogeneous
                  networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {165--178},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2019154},
  doi          = {10.1109/TIFS.2009.2019154},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoubassiM09,
  author       = {Maha El Choubassi and
                  Pierre Moulin},
  title        = {On reliability and security of randomized detectors against sensitivity
                  analysis attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {273--283},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2021783},
  doi          = {10.1109/TIFS.2009.2021783},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChoubassiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DattaLW09,
  author       = {Ritendra Datta and
                  Jia Li and
                  James Ze Wang},
  title        = {Exploiting the human-machine gap in image recognition for designing
                  CAPTCHAs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {504--518},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2022709},
  doi          = {10.1109/TIFS.2009.2022709},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DattaLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Dominguez-CondeCP09,
  author       = {Gabriel Dom{\'{\i}}nguez{-}Conde and
                  Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Performance analysis of Fridrich-Goljan self-embedding authentication
                  method},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {570--577},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026463},
  doi          = {10.1109/TIFS.2009.2026463},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Dominguez-CondeCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanL09,
  author       = {Chun{-}I Fan and
                  Yi{-}Hui Lin},
  title        = {Provably secure remote truly three-factor authentication scheme with
                  privacy protection on biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {933--945},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031942},
  doi          = {10.1109/TIFS.2009.2031942},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Farid09,
  author       = {Hany Farid},
  title        = {Exposing digital forgeries from {JPEG} ghosts},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {154--160},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2012215},
  doi          = {10.1109/TIFS.2008.2012215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Farid09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FeiKK09,
  author       = {Chuhong Fei and
                  Raymond H. Kwong and
                  Deepa Kundur},
  title        = {A hypothesis testing approach to semifragile watermark-based authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {179--192},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2015039},
  doi          = {10.1109/TIFS.2009.2015039},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FeiKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerroPTCR09,
  author       = {Marcello Ferro and
                  Giovanni Pioggia and
                  Alessandro Tognetti and
                  Nicola Carbonaro and
                  Danilo De Rossi},
  title        = {A sensing seat for human authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {451--459},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2019156},
  doi          = {10.1109/TIFS.2009.2019156},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerroPTCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FinkSC09,
  author       = {Russell A. Fink and
                  Alan T. Sherman and
                  Richard Carback},
  title        = {{TPM} meets {DRE:} reducing the trust base for electronic voting using
                  trusted platform modules},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {628--637},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034900},
  doi          = {10.1109/TIFS.2009.2034900},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FinkSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Fridrich09,
  author       = {Jessica J. Fridrich},
  title        = {Asymptotic behavior of the {ZZW} embedding construction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {151--154},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011082},
  doi          = {10.1109/TIFS.2008.2011082},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Fridrich09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuYLH09,
  author       = {Bo Fu and
                  Simon X. Yang and
                  Jianping Li and
                  Dekun Hu},
  title        = {Multibiometric cryptosystem: model structure and performance analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {867--882},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033227},
  doi          = {10.1109/TIFS.2009.2033227},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuYLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GardnerGR09,
  author       = {Ryan W. Gardner and
                  Sujata Garera and
                  Aviel D. Rubin},
  title        = {Detecting code alteration by creating a temporary memory bottleneck},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {638--650},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033231},
  doi          = {10.1109/TIFS.2009.2033231},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GardnerGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GottschlichMM09,
  author       = {Carsten Gottschlich and
                  Preda Mihailescu and
                  Axel Munk},
  title        = {Robust orientation field estimation and extrapolation using semilocal
                  line sensors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {802--811},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033219},
  doi          = {10.1109/TIFS.2009.2033219},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GottschlichMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GouSW09,
  author       = {Hongmei Gou and
                  Ashwin Swaminathan and
                  Min Wu},
  title        = {Intrinsic sensor noise features for forensic analysis on scanners
                  and scanned images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {476--491},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026458},
  doi          = {10.1109/TIFS.2009.2026458},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GouSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Graaf09,
  author       = {Jeroen van de Graaf},
  title        = {Voting with unconditional privacy by merging Pr{\^{e}}t {\`{a}} voter
                  and PunchScan},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {674--684},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034207},
  doi          = {10.1109/TIFS.2009.2034207},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Graaf09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuccioneS09,
  author       = {Pietro Guccione and
                  Michele Scagliola},
  title        = {Hyperbolic {RDM} for nonlinear valumetric distortions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {25--35},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011080},
  doi          = {10.1109/TIFS.2008.2011080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuccioneS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeHSNL09,
  author       = {Wenbo He and
                  Ying Huang and
                  Ravishankar Sathyam and
                  Klara Nahrstedt and
                  Whay Chiou Lee},
  title        = {{SMOCK:} a scalable method of cryptographic key management for mission-critical
                  wireless ad-hoc networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {140--150},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2009601},
  doi          = {10.1109/TIFS.2008.2009601},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeHSNL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HenrySS09,
  author       = {Kevin J. Henry and
                  Douglas R. Stinson and
                  Jiayuan Sui},
  title        = {The effectiveness of receipt-based attacks on ThreeBallot},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {699--707},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031914},
  doi          = {10.1109/TIFS.2009.2031914},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HenrySS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HollingsworthPBF09,
  author       = {Karen Hollingsworth and
                  Tanya Peters and
                  Kevin W. Bowyer and
                  Patrick J. Flynn},
  title        = {Iris recognition using signal-level fusion of frames from video},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {837--848},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033759},
  doi          = {10.1109/TIFS.2009.2033759},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HollingsworthPBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangCHW09,
  author       = {Chun{-}Hsiang Huang and
                  Shang{-}Chih Chuang and
                  Yen{-}Lin Huang and
                  Ja{-}Ling Wu},
  title        = {Unseen visible watermarking: a novel methodology for auxiliary information
                  delivery via visual contents},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {193--206},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2020778},
  doi          = {10.1109/TIFS.2009.2020778},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangCHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IgnatenkoW09,
  author       = {Tanya Ignatenko and
                  Frans M. J. Willems},
  title        = {Biometric systems: privacy and secrecy aspects},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {956--973},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033228},
  doi          = {10.1109/TIFS.2009.2033228},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IgnatenkoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JangYLKK09,
  author       = {Dalwon Jang and
                  Chang Dong Yoo and
                  Sunil Lee and
                  Sungwoong Kim and
                  Ton Kalker},
  title        = {Pairwise boosted audio fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {995--1004},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034452},
  doi          = {10.1109/TIFS.2009.2034452},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JangYLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinY09,
  author       = {Minho Jin and
                  Chang Dong Yoo},
  title        = {Quantum hashing for multimedia},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {982--994},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033221},
  doi          = {10.1109/TIFS.2009.2033221},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JinY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JourdasM09,
  author       = {Jean{-}Fran{\c{c}}ois Jourdas and
                  Pierre Moulin},
  title        = {High-rate random-like spherical fingerprinting codes with linear decoding
                  complexity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {768--780},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034188},
  doi          = {10.1109/TIFS.2009.2034188},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JourdasM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhannaMD09,
  author       = {Nitin Khanna and
                  Aravind K. Mikkilineni and
                  Edward J. Delp},
  title        = {Scanner identification using feature-based processing and analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {123--139},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2009604},
  doi          = {10.1109/TIFS.2008.2009604},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhannaMD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KiyavashM09,
  author       = {Negar Kiyavash and
                  Pierre Moulin},
  title        = {Performance of orthogonal fingerprinting codes under worst-case noise},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {293--301},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026462},
  doi          = {10.1109/TIFS.2009.2026462},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KiyavashM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KiyavashMK09,
  author       = {Negar Kiyavash and
                  Pierre Moulin and
                  Ton Kalker},
  title        = {Regular simplex fingerprints and their optimality properties},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {318--329},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025855},
  doi          = {10.1109/TIFS.2009.2025855},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KiyavashMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarR09,
  author       = {Ajay Kumar and
                  Ch. Ravikanth},
  title        = {Personal authentication using finger knuckle surface},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {98--110},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011089},
  doi          = {10.1109/TIFS.2008.2011089},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KumarR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHS09,
  author       = {Bin Li and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Steganalysis of {YASS}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {369--382},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025841},
  doi          = {10.1109/TIFS.2009.2025841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinSG09,
  author       = {Shih{-}Chun Lin and
                  Mohammad Shahmohammadi and
                  Hesham El Gamal},
  title        = {Fingerprinting with minimum distance decoding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {59--69},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2012201},
  doi          = {10.1109/TIFS.2008.2012201},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinTZL09,
  author       = {W. Sabrina Lin and
                  Steven K. Tjoa and
                  H. Vicky Zhao and
                  K. J. Ray Liu},
  title        = {Digital image source coder forensics via intrinsic fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {460--475},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024715},
  doi          = {10.1109/TIFS.2009.2024715},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinTZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinZL09,
  author       = {W. Sabrina Lin and
                  H. Vicky Zhao and
                  K. J. Ray Liu},
  title        = {Behavior forensics with side information for multimedia fingerprinting
                  social networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {911--927},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033224},
  doi          = {10.1109/TIFS.2009.2033224},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuSQ09,
  author       = {Qingzhong Liu and
                  Andrew H. Sung and
                  Mengyu Qiao},
  title        = {Temporal derivative-based spectrum and mel-cepstrum audio steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {359--368},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024718},
  doi          = {10.1109/TIFS.2009.2024718},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuSQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Macia-FernandezDT09,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Pedro Garcia{-}Teodoro},
  title        = {Mathematical model for low-rate DoS attacks against application servers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {519--529},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024719},
  doi          = {10.1109/TIFS.2009.2024719},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Macia-FernandezDT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Memon09,
  author       = {Nasir D. Memon},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2014407},
  doi          = {10.1109/TIFS.2009.2014407},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Memon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MiratrixS09,
  author       = {Luke Miratrix and
                  Philip B. Stark},
  title        = {Election audits using a trinomial bound},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {974--981},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034189},
  doi          = {10.1109/TIFS.2009.2034189},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MiratrixS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangLYTP09,
  author       = {Yanwei Pang and
                  Xuelong Li and
                  Yuan Yuan and
                  Dacheng Tao and
                  Jing Pan},
  title        = {Fast Haar transform based feature extraction for face representation
                  and recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {441--450},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026455},
  doi          = {10.1109/TIFS.2009.2026455},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PangLYTP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PankajakshanDB09,
  author       = {Vinod Pankajakshan and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Prabin Kumar Bora},
  title        = {Detection of motion-incoherent components in video streams},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {49--58},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2012199},
  doi          = {10.1109/TIFS.2008.2012199},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PankajakshanDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Perez-FreireP09,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Spread-spectrum watermarking security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {2--24},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2009603},
  doi          = {10.1109/TIFS.2008.2009603},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Perez-FreireP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PohBKAAABDFFGOMSSV09,
  author       = {Norman Poh and
                  Thirimachos Bourlai and
                  Josef Kittler and
                  Lor{\`{e}}ne Allano and
                  Fernando Alonso{-}Fernandez and
                  Onkar Ambekar and
                  John P. Baker and
                  Bernadette Dorizzi and
                  Omolara Fatukasi and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Harald Ganster and
                  Javier Ortega{-}Garcia and
                  Donald E. Maurer and
                  Albert Ali Salah and
                  Tobias Scheidat and
                  Claus Vielhauer},
  title        = {Benchmarking quality-dependent and cost-sensitive score-level multimodal
                  biometric fusion algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {849--866},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034885},
  doi          = {10.1109/TIFS.2009.2034885},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PohBKAAABDFFGOMSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PopovskiS09,
  author       = {Petar Popovski and
                  Osvaldo Simeone},
  title        = {Wireless secrecy in cellular systems with infrastructure-aided cooperation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {242--256},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2020776},
  doi          = {10.1109/TIFS.2009.2020776},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PopovskiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RakvicUBIS09,
  author       = {Ryan N. Rakvic and
                  Bradley J. Ulis and
                  Randy P. Broussard and
                  Robert W. Ives and
                  Neil Steiner},
  title        = {Parallelizing iris recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {812--823},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2032012},
  doi          = {10.1109/TIFS.2009.2032012},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RakvicUBIS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RivestCPRSV09,
  author       = {Ronald L. Rivest and
                  David Chaum and
                  Bart Preneel and
                  Aviel D. Rubin and
                  Donald G. Saari and
                  Poorvi L. Vora},
  title        = {Guest editorial: special issue on electronic voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {593--596},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034721},
  doi          = {10.1109/TIFS.2009.2034721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RyanBHSX09,
  author       = {Peter Y. A. Ryan and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  title        = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {662--673},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033233},
  doi          = {10.1109/TIFS.2009.2033233},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SadasivamM09,
  author       = {Shankar Sadasivam and
                  Pierre Moulin},
  title        = {On estimation accuracy of desynchronization attack channel parameters},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {284--292},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025852},
  doi          = {10.1109/TIFS.2009.2025852},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SadasivamM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaY09,
  author       = {Nitesh Saxena and
                  Jeong Hyun Yi},
  title        = {Noninteractive self-certification for long-lived mobile ad hoc networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {946--955},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031946},
  doi          = {10.1109/TIFS.2009.2031946},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Sayed09,
  author       = {Ali H. Sayed},
  title        = {Free electronic access to {SP} publications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {757},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2036059},
  doi          = {10.1109/TIFS.2009.2036059},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Sayed09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchryenR09,
  author       = {Guido Schryen and
                  Eliot Rich},
  title        = {Security in large-scale internet elections: a retrospective analysis
                  of elections in Estonia, the Netherlands, and Switzerland},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {729--744},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033230},
  doi          = {10.1109/TIFS.2009.2033230},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SchryenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Schuckers09,
  author       = {Michael E. Schuckers},
  title        = {A parametric correlation framework for the statistical evaluation
                  and estimation of biometric-based classification performance in a
                  single environment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {231--241},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2012206},
  doi          = {10.1109/TIFS.2008.2012206},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Schuckers09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShahR09,
  author       = {Samir Shah and
                  Arun Ross},
  title        = {Iris segmentation using geodesic active contours},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {824--836},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033225},
  doi          = {10.1109/TIFS.2009.2033225},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShahR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SinghK09,
  author       = {Vivek K. Singh and
                  Mohan S. Kankanhalli},
  title        = {Adversary aware surveillance systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {552--563},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026459},
  doi          = {10.1109/TIFS.2009.2026459},
  timestamp    = {Tue, 10 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SinghK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Stark09,
  author       = {Philip B. Stark},
  title        = {{CAST:} Canvass audits by sampling and testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {708--717},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034210},
  doi          = {10.1109/TIFS.2009.2034210},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Stark09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Stark09a,
  author       = {Philip B. Stark},
  title        = {Risk-limiting postelection audits: conservative P-values from common
                  probability inequalities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {1005--1014},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034190},
  doi          = {10.1109/TIFS.2009.2034190},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Stark09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunWT09,
  author       = {Hung{-}Min Sun and
                  King{-}Hang Wang and
                  Wei{-}Chih Ting},
  title        = {On the security of the secure arithmetic code},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {781--789},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031944},
  doi          = {10.1109/TIFS.2009.2031944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanCZL09,
  author       = {Xiaoyang Tan and
                  Songcan Chen and
                  Zhi{-}Hua Zhou and
                  Jun Liu},
  title        = {Face recognition under occlusions and variant expressions with partial
                  similarity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {217--230},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2020772},
  doi          = {10.1109/TIFS.2009.2020772},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanCZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ThomasB09,
  author       = {Ciza Thomas and
                  N. Balakrishnan},
  title        = {Improvement in intrusion detection with advances in sensor fusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {542--551},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026954},
  doi          = {10.1109/TIFS.2009.2026954},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ThomasB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ThomasESK09,
  author       = {Tony Thomas and
                  Sabu Emmanuel and
                  A. Venkata Subramanyam and
                  Mohan S. Kankanhalli},
  title        = {Joint watermarking scheme for multiparty multilevel {DRM} architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {758--767},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033229},
  doi          = {10.1109/TIFS.2009.2033229},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ThomasESK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TsaiHW09,
  author       = {Hsin{-}Yi Tsai and
                  Yu{-}Lun Huang and
                  David A. Wagner},
  title        = {A graph approach to quantitative analysis of control-flow obfuscating
                  transformations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {2},
  pages        = {257--267},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2011077},
  doi          = {10.1109/TIFS.2008.2011077},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TsaiHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VarnaHSW09,
  author       = {Avinash L. Varna and
                  Shan He and
                  Ashwin Swaminathan and
                  Min Wu},
  title        = {Fingerprinting compressed multimedia signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {330--345},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025860},
  doi          = {10.1109/TIFS.2009.2025860},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VarnaHSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Velisavljevic09,
  author       = {Vladan Velisavljevic},
  title        = {Low-complexity iris coding and recognition based on directionlets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {410--417},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024025},
  doi          = {10.1109/TIFS.2009.2024025},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Velisavljevic09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VillafioritaWT09,
  author       = {Adolfo Villafiorita and
                  Komminist Weldemariam and
                  Roberto Tiella},
  title        = {Development, formal verification, and evaluation of an E-voting system
                  with {VVPAT}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {651--661},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034903},
  doi          = {10.1109/TIFS.2009.2034903},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VillafioritaWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangAC09,
  author       = {Zhongmin Wang and
                  Gonzalo R. Arce and
                  Giovanni Di Crescenzo},
  title        = {Halftone visual cryptography via error diffusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {383--396},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024721},
  doi          = {10.1109/TIFS.2009.2024721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangAC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoGMT09,
  author       = {Liang Xiao and
                  Larry J. Greenstein and
                  Narayan B. Mandayam and
                  Wade Trappe},
  title        = {Channel-based detection of Sybil attacks in wireless networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {492--503},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2026454},
  doi          = {10.1109/TIFS.2009.2026454},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaoGMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuVBKAG09,
  author       = {Haiyun Xu and
                  Raymond N. J. Veldhuis and
                  Asker M. Bazen and
                  Tom A. M. Kevenaar and
                  Anton H. M. Akkermans and
                  Berk G{\"{o}}kberk},
  title        = {Fingerprint verification using spectral minutiae representations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {397--409},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2021692},
  doi          = {10.1109/TIFS.2009.2021692},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuVBKAG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSKY09,
  author       = {Yafei Yang and
                  Yan Sun and
                  Steven Kay and
                  Qing Yang},
  title        = {Securing rating aggregation systems using statistical detectors and
                  trust},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {883--898},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033741},
  doi          = {10.1109/TIFS.2009.2033741},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZaidiV09,
  author       = {Abdellatif Zaidi and
                  Luc Vandendorpe},
  title        = {Coding schemes for relay-assisted information embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {1},
  pages        = {70--85},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2008.2009588},
  doi          = {10.1109/TIFS.2008.2009588},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZaidiV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangW09,
  author       = {Weiming Zhang and
                  Xin Wang},
  title        = {Generalization of the {ZZW} embedding construction for steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {564--569},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2024720},
  doi          = {10.1109/TIFS.2009.2024720},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengT09,
  author       = {Wenming Zheng and
                  Xiaoou Tang},
  title        = {Fast algorithm for updating the discriminant vectors of dual-space
                  {LDA}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {418--427},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025844},
  doi          = {10.1109/TIFS.2009.2025844},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuHKY09,
  author       = {Guopu Zhu and
                  Jiwu Huang and
                  Sam Kwong and
                  Jianquan Yang},
  title        = {A study on the randomness measure of image hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {928--932},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033737},
  doi          = {10.1109/TIFS.2009.2033737},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuHKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics