Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs4.bht:"
@article{DBLP:journals/tifs/AgarwalP09, author = {Parag Agarwal and Balakrishnan Prabhakaran}, title = {Robust blind watermarking of point-sampled geometry}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {36--48}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011081}, doi = {10.1109/TIFS.2008.2011081}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AgarwalP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AntonyanDKKMNRS09, author = {Tigran Antonyan and Seda Davtyan and Sotiris Kentros and Aggelos Kiayias and Laurent Michel and Nicolas C. Nicolaou and Alexander Russell and Alexander A. Shvartsman}, title = {State-wide elections, optical scan voting systems, and the pursuit of integrity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {597--610}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033232}, doi = {10.1109/TIFS.2009.2033232}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AntonyanDKKMNRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArgyropoulosTIS09, author = {Savvas Argyropoulos and Dimitrios Tzovaras and Dimosthenis Ioannidis and Michael G. Strintzis}, title = {A channel coding approach for human authentication from gait sequences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {428--440}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025858}, doi = {10.1109/TIFS.2009.2025858}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ArgyropoulosTIS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BelcherD09, author = {Craig Belcher and Yingzi Du}, title = {Corrections to "A selective feature information approach for iris image-quality measure"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {578}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2028260}, doi = {10.1109/TIFS.2009.2028260}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BelcherD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BenalohMNRT09, author = {Josh Benaloh and Tal Moran and Lee Naish and Kim Ramchen and Vanessa Teague}, title = {Shuffle-sum: coercion-resistant verifiable tallying for {STV} voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {685--698}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033757}, doi = {10.1109/TIFS.2009.2033757}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BenalohMNRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BianchiPB09, author = {Tiziano Bianchi and Alessandro Piva and Mauro Barni}, title = {On the implementation of the discrete Fourier transform in the encrypted domain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {86--97}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011087}, doi = {10.1109/TIFS.2008.2011087}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BianchiPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoatoCNF09, author = {Giulia Boato and Valentina Conotter and Francesco G. B. De Natale and Claudio Fontanari}, title = {Watermarking robustness evaluation based on perceptual quality via genetic algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {207--216}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2020362}, doi = {10.1109/TIFS.2009.2020362}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BoatoCNF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BohliHKMR09, author = {Jens{-}Matthias Bohli and Christian Henrich and Carmen Kempka and J{\"{o}}rn M{\"{u}}ller{-}Quade and Stefan R{\"{o}}hrich}, title = {Enhancing electronic voting machines on the example of Bingo voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {745--750}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033755}, doi = {10.1109/TIFS.2009.2033755}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BohliHKMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CampbellB09, author = {Bryan A. Campbell and Michael D. Byrne}, title = {Straight-party voting: what do voters think?}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {718--728}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031947}, doi = {10.1109/TIFS.2009.2031947}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CampbellB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CancelliB09, author = {Giacomo Cancelli and Mauro Barni}, title = {MPSteg-color: data hiding through redundant basis decomposition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {346--358}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024028}, doi = {10.1109/TIFS.2009.2024028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CancelliB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoK09, author = {Hong Cao and Alex C. Kot}, title = {Accurate detection of demosaicing regularity for digital image forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {899--910}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033749}, doi = {10.1109/TIFS.2009.2033749}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaK09, author = {Byung{-}Ho Cha and C.{-}C. Jay Kuo}, title = {Robust MC-CDMA-based fingerprinting against time-varying collusion attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {302--317}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025849}, doi = {10.1109/TIFS.2009.2025849}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangLLL09, author = {Chin{-}Chen Chang and Chia{-}Chen Lin and T. Hoang Ngan Le and Hoai Bac Le}, title = {Self-verifying visual secret sharing using error diffusion and interpolation techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {790--801}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034203}, doi = {10.1109/TIFS.2009.2034203}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChangLLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangYKAA09, author = {Hong Chang and Yi Yao and Andreas F. Koschan and Besma R. Abidi and Mongi A. Abidi}, title = {Improving face recognition via narrowband spectral range selection using Jeffrey divergence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {111--122}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2012211}, doi = {10.1109/TIFS.2008.2012211}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChangYKAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Scantegrity {II:} end-to-end verifiability by voters of optical scan elections through confirmation codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {611--627}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034919}, doi = {10.1109/TIFS.2009.2034919}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenJ09, author = {Zesheng Chen and Chuanyi Ji}, title = {An information-theoretic view of network-aware malware attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {530--541}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025847}, doi = {10.1109/TIFS.2009.2025847}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenL09, author = {Lin Chen and Jean Leneutre}, title = {A game theoretical framework on intrusion detection in heterogeneous networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {165--178}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2019154}, doi = {10.1109/TIFS.2009.2019154}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChoubassiM09, author = {Maha El Choubassi and Pierre Moulin}, title = {On reliability and security of randomized detectors against sensitivity analysis attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {273--283}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2021783}, doi = {10.1109/TIFS.2009.2021783}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChoubassiM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DattaLW09, author = {Ritendra Datta and Jia Li and James Ze Wang}, title = {Exploiting the human-machine gap in image recognition for designing CAPTCHAs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {504--518}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2022709}, doi = {10.1109/TIFS.2009.2022709}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DattaLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Dominguez-CondeCP09, author = {Gabriel Dom{\'{\i}}nguez{-}Conde and Pedro Comesa{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Performance analysis of Fridrich-Goljan self-embedding authentication method}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {570--577}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026463}, doi = {10.1109/TIFS.2009.2026463}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Dominguez-CondeCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanL09, author = {Chun{-}I Fan and Yi{-}Hui Lin}, title = {Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {933--945}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031942}, doi = {10.1109/TIFS.2009.2031942}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FanL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Farid09, author = {Hany Farid}, title = {Exposing digital forgeries from {JPEG} ghosts}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {154--160}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2012215}, doi = {10.1109/TIFS.2008.2012215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Farid09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FeiKK09, author = {Chuhong Fei and Raymond H. Kwong and Deepa Kundur}, title = {A hypothesis testing approach to semifragile watermark-based authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {179--192}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2015039}, doi = {10.1109/TIFS.2009.2015039}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FeiKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerroPTCR09, author = {Marcello Ferro and Giovanni Pioggia and Alessandro Tognetti and Nicola Carbonaro and Danilo De Rossi}, title = {A sensing seat for human authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {451--459}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2019156}, doi = {10.1109/TIFS.2009.2019156}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerroPTCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FinkSC09, author = {Russell A. Fink and Alan T. Sherman and Richard Carback}, title = {{TPM} meets {DRE:} reducing the trust base for electronic voting using trusted platform modules}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {628--637}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034900}, doi = {10.1109/TIFS.2009.2034900}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FinkSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Fridrich09, author = {Jessica J. Fridrich}, title = {Asymptotic behavior of the {ZZW} embedding construction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {151--154}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011082}, doi = {10.1109/TIFS.2008.2011082}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Fridrich09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuYLH09, author = {Bo Fu and Simon X. Yang and Jianping Li and Dekun Hu}, title = {Multibiometric cryptosystem: model structure and performance analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {867--882}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033227}, doi = {10.1109/TIFS.2009.2033227}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuYLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GardnerGR09, author = {Ryan W. Gardner and Sujata Garera and Aviel D. Rubin}, title = {Detecting code alteration by creating a temporary memory bottleneck}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {638--650}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033231}, doi = {10.1109/TIFS.2009.2033231}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GardnerGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GottschlichMM09, author = {Carsten Gottschlich and Preda Mihailescu and Axel Munk}, title = {Robust orientation field estimation and extrapolation using semilocal line sensors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {802--811}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033219}, doi = {10.1109/TIFS.2009.2033219}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GottschlichMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GouSW09, author = {Hongmei Gou and Ashwin Swaminathan and Min Wu}, title = {Intrinsic sensor noise features for forensic analysis on scanners and scanned images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {476--491}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026458}, doi = {10.1109/TIFS.2009.2026458}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GouSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Graaf09, author = {Jeroen van de Graaf}, title = {Voting with unconditional privacy by merging Pr{\^{e}}t {\`{a}} voter and PunchScan}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {674--684}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034207}, doi = {10.1109/TIFS.2009.2034207}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Graaf09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuccioneS09, author = {Pietro Guccione and Michele Scagliola}, title = {Hyperbolic {RDM} for nonlinear valumetric distortions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {25--35}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011080}, doi = {10.1109/TIFS.2008.2011080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuccioneS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeHSNL09, author = {Wenbo He and Ying Huang and Ravishankar Sathyam and Klara Nahrstedt and Whay Chiou Lee}, title = {{SMOCK:} a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {140--150}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2009601}, doi = {10.1109/TIFS.2008.2009601}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeHSNL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HenrySS09, author = {Kevin J. Henry and Douglas R. Stinson and Jiayuan Sui}, title = {The effectiveness of receipt-based attacks on ThreeBallot}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {699--707}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031914}, doi = {10.1109/TIFS.2009.2031914}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HenrySS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HollingsworthPBF09, author = {Karen Hollingsworth and Tanya Peters and Kevin W. Bowyer and Patrick J. Flynn}, title = {Iris recognition using signal-level fusion of frames from video}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {837--848}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033759}, doi = {10.1109/TIFS.2009.2033759}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HollingsworthPBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangCHW09, author = {Chun{-}Hsiang Huang and Shang{-}Chih Chuang and Yen{-}Lin Huang and Ja{-}Ling Wu}, title = {Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {193--206}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2020778}, doi = {10.1109/TIFS.2009.2020778}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangCHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IgnatenkoW09, author = {Tanya Ignatenko and Frans M. J. Willems}, title = {Biometric systems: privacy and secrecy aspects}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {956--973}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033228}, doi = {10.1109/TIFS.2009.2033228}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IgnatenkoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JangYLKK09, author = {Dalwon Jang and Chang Dong Yoo and Sunil Lee and Sungwoong Kim and Ton Kalker}, title = {Pairwise boosted audio fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {995--1004}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034452}, doi = {10.1109/TIFS.2009.2034452}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JangYLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinY09, author = {Minho Jin and Chang Dong Yoo}, title = {Quantum hashing for multimedia}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {982--994}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033221}, doi = {10.1109/TIFS.2009.2033221}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JinY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JourdasM09, author = {Jean{-}Fran{\c{c}}ois Jourdas and Pierre Moulin}, title = {High-rate random-like spherical fingerprinting codes with linear decoding complexity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {768--780}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034188}, doi = {10.1109/TIFS.2009.2034188}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JourdasM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhannaMD09, author = {Nitin Khanna and Aravind K. Mikkilineni and Edward J. Delp}, title = {Scanner identification using feature-based processing and analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {123--139}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2009604}, doi = {10.1109/TIFS.2008.2009604}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhannaMD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KiyavashM09, author = {Negar Kiyavash and Pierre Moulin}, title = {Performance of orthogonal fingerprinting codes under worst-case noise}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {293--301}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026462}, doi = {10.1109/TIFS.2009.2026462}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KiyavashM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KiyavashMK09, author = {Negar Kiyavash and Pierre Moulin and Ton Kalker}, title = {Regular simplex fingerprints and their optimality properties}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {318--329}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025855}, doi = {10.1109/TIFS.2009.2025855}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KiyavashMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KumarR09, author = {Ajay Kumar and Ch. Ravikanth}, title = {Personal authentication using finger knuckle surface}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {98--110}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011089}, doi = {10.1109/TIFS.2008.2011089}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KumarR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHS09, author = {Bin Li and Jiwu Huang and Yun{-}Qing Shi}, title = {Steganalysis of {YASS}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {369--382}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025841}, doi = {10.1109/TIFS.2009.2025841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinSG09, author = {Shih{-}Chun Lin and Mohammad Shahmohammadi and Hesham El Gamal}, title = {Fingerprinting with minimum distance decoding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {59--69}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2012201}, doi = {10.1109/TIFS.2008.2012201}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinTZL09, author = {W. Sabrina Lin and Steven K. Tjoa and H. Vicky Zhao and K. J. Ray Liu}, title = {Digital image source coder forensics via intrinsic fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {460--475}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024715}, doi = {10.1109/TIFS.2009.2024715}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinTZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinZL09, author = {W. Sabrina Lin and H. Vicky Zhao and K. J. Ray Liu}, title = {Behavior forensics with side information for multimedia fingerprinting social networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {911--927}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033224}, doi = {10.1109/TIFS.2009.2033224}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuSQ09, author = {Qingzhong Liu and Andrew H. Sung and Mengyu Qiao}, title = {Temporal derivative-based spectrum and mel-cepstrum audio steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {359--368}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024718}, doi = {10.1109/TIFS.2009.2024718}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuSQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Macia-FernandezDT09, author = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Pedro Garcia{-}Teodoro}, title = {Mathematical model for low-rate DoS attacks against application servers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {519--529}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024719}, doi = {10.1109/TIFS.2009.2024719}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Macia-FernandezDT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Memon09, author = {Nasir D. Memon}, title = {Editorial}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {1}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2014407}, doi = {10.1109/TIFS.2009.2014407}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Memon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiratrixS09, author = {Luke Miratrix and Philip B. Stark}, title = {Election audits using a trinomial bound}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {974--981}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034189}, doi = {10.1109/TIFS.2009.2034189}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MiratrixS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PangLYTP09, author = {Yanwei Pang and Xuelong Li and Yuan Yuan and Dacheng Tao and Jing Pan}, title = {Fast Haar transform based feature extraction for face representation and recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {441--450}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026455}, doi = {10.1109/TIFS.2009.2026455}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PangLYTP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PankajakshanDB09, author = {Vinod Pankajakshan and Gwena{\"{e}}l J. Do{\"{e}}rr and Prabin Kumar Bora}, title = {Detection of motion-incoherent components in video streams}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {49--58}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2012199}, doi = {10.1109/TIFS.2008.2012199}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PankajakshanDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Perez-FreireP09, author = {Luis P{\'{e}}rez{-}Freire and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Spread-spectrum watermarking security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {2--24}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2009603}, doi = {10.1109/TIFS.2008.2009603}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Perez-FreireP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PohBKAAABDFFGOMSSV09, author = {Norman Poh and Thirimachos Bourlai and Josef Kittler and Lor{\`{e}}ne Allano and Fernando Alonso{-}Fernandez and Onkar Ambekar and John P. Baker and Bernadette Dorizzi and Omolara Fatukasi and Julian Fi{\'{e}}rrez{-}Aguilar and Harald Ganster and Javier Ortega{-}Garcia and Donald E. Maurer and Albert Ali Salah and Tobias Scheidat and Claus Vielhauer}, title = {Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {849--866}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034885}, doi = {10.1109/TIFS.2009.2034885}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PohBKAAABDFFGOMSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PopovskiS09, author = {Petar Popovski and Osvaldo Simeone}, title = {Wireless secrecy in cellular systems with infrastructure-aided cooperation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {242--256}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2020776}, doi = {10.1109/TIFS.2009.2020776}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PopovskiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RakvicUBIS09, author = {Ryan N. Rakvic and Bradley J. Ulis and Randy P. Broussard and Robert W. Ives and Neil Steiner}, title = {Parallelizing iris recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {812--823}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2032012}, doi = {10.1109/TIFS.2009.2032012}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RakvicUBIS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RivestCPRSV09, author = {Ronald L. Rivest and David Chaum and Bart Preneel and Aviel D. Rubin and Donald G. Saari and Poorvi L. Vora}, title = {Guest editorial: special issue on electronic voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {593--596}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034721}, doi = {10.1109/TIFS.2009.2034721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RyanBHSX09, author = {Peter Y. A. Ryan and David Bismark and James Heather and Steve A. Schneider and Zhe Xia}, title = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {662--673}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033233}, doi = {10.1109/TIFS.2009.2033233}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SadasivamM09, author = {Shankar Sadasivam and Pierre Moulin}, title = {On estimation accuracy of desynchronization attack channel parameters}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {284--292}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025852}, doi = {10.1109/TIFS.2009.2025852}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SadasivamM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaY09, author = {Nitesh Saxena and Jeong Hyun Yi}, title = {Noninteractive self-certification for long-lived mobile ad hoc networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {946--955}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031946}, doi = {10.1109/TIFS.2009.2031946}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Sayed09, author = {Ali H. Sayed}, title = {Free electronic access to {SP} publications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {757}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2036059}, doi = {10.1109/TIFS.2009.2036059}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Sayed09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SchryenR09, author = {Guido Schryen and Eliot Rich}, title = {Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {729--744}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033230}, doi = {10.1109/TIFS.2009.2033230}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SchryenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Schuckers09, author = {Michael E. Schuckers}, title = {A parametric correlation framework for the statistical evaluation and estimation of biometric-based classification performance in a single environment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {231--241}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2012206}, doi = {10.1109/TIFS.2008.2012206}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Schuckers09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShahR09, author = {Samir Shah and Arun Ross}, title = {Iris segmentation using geodesic active contours}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {824--836}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033225}, doi = {10.1109/TIFS.2009.2033225}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShahR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SinghK09, author = {Vivek K. Singh and Mohan S. Kankanhalli}, title = {Adversary aware surveillance systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {552--563}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026459}, doi = {10.1109/TIFS.2009.2026459}, timestamp = {Tue, 10 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SinghK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Stark09, author = {Philip B. Stark}, title = {{CAST:} Canvass audits by sampling and testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {708--717}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034210}, doi = {10.1109/TIFS.2009.2034210}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Stark09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Stark09a, author = {Philip B. Stark}, title = {Risk-limiting postelection audits: conservative P-values from common probability inequalities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {1005--1014}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034190}, doi = {10.1109/TIFS.2009.2034190}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Stark09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunWT09, author = {Hung{-}Min Sun and King{-}Hang Wang and Wei{-}Chih Ting}, title = {On the security of the secure arithmetic code}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {781--789}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031944}, doi = {10.1109/TIFS.2009.2031944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanCZL09, author = {Xiaoyang Tan and Songcan Chen and Zhi{-}Hua Zhou and Jun Liu}, title = {Face recognition under occlusions and variant expressions with partial similarity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {217--230}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2020772}, doi = {10.1109/TIFS.2009.2020772}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanCZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ThomasB09, author = {Ciza Thomas and N. Balakrishnan}, title = {Improvement in intrusion detection with advances in sensor fusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {542--551}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026954}, doi = {10.1109/TIFS.2009.2026954}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ThomasB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ThomasESK09, author = {Tony Thomas and Sabu Emmanuel and A. Venkata Subramanyam and Mohan S. Kankanhalli}, title = {Joint watermarking scheme for multiparty multilevel {DRM} architecture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {758--767}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033229}, doi = {10.1109/TIFS.2009.2033229}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ThomasESK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TsaiHW09, author = {Hsin{-}Yi Tsai and Yu{-}Lun Huang and David A. Wagner}, title = {A graph approach to quantitative analysis of control-flow obfuscating transformations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {2}, pages = {257--267}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2011077}, doi = {10.1109/TIFS.2008.2011077}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TsaiHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VarnaHSW09, author = {Avinash L. Varna and Shan He and Ashwin Swaminathan and Min Wu}, title = {Fingerprinting compressed multimedia signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {330--345}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025860}, doi = {10.1109/TIFS.2009.2025860}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VarnaHSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Velisavljevic09, author = {Vladan Velisavljevic}, title = {Low-complexity iris coding and recognition based on directionlets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {410--417}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024025}, doi = {10.1109/TIFS.2009.2024025}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Velisavljevic09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VillafioritaWT09, author = {Adolfo Villafiorita and Komminist Weldemariam and Roberto Tiella}, title = {Development, formal verification, and evaluation of an E-voting system with {VVPAT}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {651--661}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034903}, doi = {10.1109/TIFS.2009.2034903}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VillafioritaWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangAC09, author = {Zhongmin Wang and Gonzalo R. Arce and Giovanni Di Crescenzo}, title = {Halftone visual cryptography via error diffusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {383--396}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024721}, doi = {10.1109/TIFS.2009.2024721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangAC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaoGMT09, author = {Liang Xiao and Larry J. Greenstein and Narayan B. Mandayam and Wade Trappe}, title = {Channel-based detection of Sybil attacks in wireless networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {492--503}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2026454}, doi = {10.1109/TIFS.2009.2026454}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaoGMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuVBKAG09, author = {Haiyun Xu and Raymond N. J. Veldhuis and Asker M. Bazen and Tom A. M. Kevenaar and Anton H. M. Akkermans and Berk G{\"{o}}kberk}, title = {Fingerprint verification using spectral minutiae representations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {397--409}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2021692}, doi = {10.1109/TIFS.2009.2021692}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuVBKAG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSKY09, author = {Yafei Yang and Yan Sun and Steven Kay and Qing Yang}, title = {Securing rating aggregation systems using statistical detectors and trust}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {883--898}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033741}, doi = {10.1109/TIFS.2009.2033741}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZaidiV09, author = {Abdellatif Zaidi and Luc Vandendorpe}, title = {Coding schemes for relay-assisted information embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {1}, pages = {70--85}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2008.2009588}, doi = {10.1109/TIFS.2008.2009588}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZaidiV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangW09, author = {Weiming Zhang and Xin Wang}, title = {Generalization of the {ZZW} embedding construction for steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {564--569}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2024720}, doi = {10.1109/TIFS.2009.2024720}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengT09, author = {Wenming Zheng and Xiaoou Tang}, title = {Fast algorithm for updating the discriminant vectors of dual-space {LDA}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {418--427}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025844}, doi = {10.1109/TIFS.2009.2025844}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuHKY09, author = {Guopu Zhu and Jiwu Huang and Sam Kwong and Jianquan Yang}, title = {A study on the randomness measure of image hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {928--932}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033737}, doi = {10.1109/TIFS.2009.2033737}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuHKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.