default search action
2nd WIFS 2010: Seattle, WA, USA
- 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, Seattle, WA, USA, December 12-15, 2010. IEEE 2010, ISBN 978-1-4244-9078-3
- Walter J. Scheirer, William Bishop, Terrance E. Boult:
Beyond PKI: The Biocryptographic Key Infrastructure. 1-6 - Bozhao Tan, Aaron Lewicke, David Yambay, Stephanie Schuckers:
The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. 1-6 - Eric Kee, Hany Farid:
Exposing digital forgeries from 3-D lighting environments. 1-6 - Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits. 1-6 - Abhijit Bendale, Terrance E. Boult:
id-Privacy in large scale biometric systems. 1-6 - Yuhan Zhou:
Joint robust watermarking and image compression. 1-6 - Hong Zhao, Yun Q. Shi:
A phase-space reconstruction approach to detect covert channels in TCP/IP protocols. 1-6 - Stephen B. Pollard, Steven J. Simske, Guy B. Adams:
Model based print signature profile extraction for forensic analysis of individual text glyphs. 1-6 - Kannan Karthik, Dimitrios Hatzinakos:
MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooks. 1-6 - Tomás Filler, Jessica J. Fridrich:
Minimizing additive distortion functions with non-binary embedding operation in steganography. 1-6 - Deniz Karakoyunlu, Berk Sunar:
Differential template attacks on PUF enabled cryptographic devices. 1-6 - Bei-Bei Liu, Heung-Kyu Lee, Yongjian Hu, Chang-Hee Choi:
On classification of source cameras: A graph based approach. 1-5 - Pei-Lun Hsieh, Yu-Ming Liang, Hong-Yuan Mark Liao:
Recognition of blurred license plate images. 1-6 - Thijs Veugen:
Encrypted integer division. 1-6 - Shantanu Rane, Wei Sun:
Privacy preserving string comparisons based on Levenshtein distance. 1-6 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Digital forensics in VoIP networks. 1-6 - Yen-Wei Huang, Pierre Moulin:
Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions. 1-6 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:
First steps toward image phylogeny. 1-6 - Fernanda A. Andaló, Gabriel Taubin, Siome Goldenstein:
Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetry. 1-6 - Roberto Caldelli, Irene Amerini, Francesco Picchioni, Matteo Innocenti:
Fast image clustering of unknown source images. 1-5 - Frans M. J. Willems, Tanya Ignatenko:
Identification and secret-key binding in binary-symmetric template-protected biometric systems. 1-5 - Karthik Nandakumar:
A fingerprint cryptosystem based on minutiae phase spectrum. 1-6 - Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Security and robustness constraints for spread-spectrum Tardos fingerprinting. 1-6 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure computations on non-integer values. 1-6 - Shankar Sadasivam, Pierre Moulin, Sean P. Meyn:
A universal divergence-rate estimator for steganalysis in timing channels. 1-6 - Mauro Barni, Jorge Guajardo, Riccardo Lazzeretti:
Privacy preserving evaluation of signal quality with application to ECG analysis. 1-6 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof, Farzad Farhadzadeh:
Privacy amplification of content identification systems based on fingerprint bit reliability. 1-6 - Telidevara Aditya, Venkatachalam Chandrasekaran, Avinash Srinivasan, Ravi Mukkamala, Sandeep Gampa:
Similarity coefficient generators for network forensics. 1-6 - Matthew Gaubatz, Steven J. Simske:
Towards a feature set for robust printing-imaging cycle device identification using structured printed markings. 1-6 - Antonis Mairgiotis, Nikolaos Galatsanos:
Bayesian watermark detection and new perceptual mask based on a spatially weighted Total Variation image prior. 1-6 - Dinei Florêncio, Cormac Herley:
Phishing and money mules. 1-5 - Ikenna Odinaka, Po-Hsiang Lai, Alan David Kaplan, Joseph A. O'Sullivan, Erik J. Sirevaag, Sean D. Kristjansson, Amanda K. Sheffield, John W. Rohrbaugh:
ECG biometrics: A robust short-time frequency analysis. 1-6 - Ravindra B. Gadde, Donald A. Adjeroh, Arun Ross:
Indexing iris images using the Burrows-Wheeler Transform. 1-6 - Wei-Hong Chuang, Min Wu:
Semi non-intrusive training for cell-phone camera model linkage. 1-6 - Peter A. Johnson, Bozhao Tan, Stephanie Schuckers:
Multimodal fusion vulnerability to non-zero effort (spoof) imposters. 1-5 - Donald A. Adjeroh, Deng Cao, Marco Piccirilli, Arun Ross:
Predictability and correlation in human metrology. 1-6 - Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas:
FPGA PUF using programmable delay lines. 1-6 - Vincent Christlein, Christian Riess, Elli Angelopoulou:
On rotation invariance in copy-move forgery detection. 1-6 - Ileana Buhan, Jorge Guajardo, Emile Kelkboom:
Efficient strategies to play the indistinguishability game for fuzzy sketches. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.