default search action
10th WIFS 2018: Hong Kong, China
- 2018 IEEE International Workshop on Information Forensics and Security, WIFS 2018, Hong Kong, China, December 11-13, 2018. IEEE 2018, ISBN 978-1-5386-6536-7
- Runze Liu, Chau-Wai Wong, Min Wu:
Enhanced Geometric Reflection Models for Paper Surface Based Authentication. 1-7 - Panagiotis Andriotis, Atsuhiro Takasu:
Emotional Bots: Content-based Spammer Detection on Social Media. 1-8 - Darius Afchar, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
MesoNet: a Compact Facial Video Forgery Detection Network. 1-7 - Caroline Werther, Morgan Ferguson, Kevin Park, Troy Kling, Cuixian Chen, Yishi Wang:
Gender Effect on Face Recognition for a Large Longitudinal Database. 1-7 - Pawel Drozdowski, Daniel Fischer, Christian Rathgeb, C. Schiel, Christoph Busch:
Database Binning and Retrieval in Multi-Fingerprint Identification Systems. 1-7 - Fuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen:
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. 1-9 - Nicolò Bonettini, Luca Bondi, Paolo Bestagini, Stefano Tubaro:
JPEG Implementation Forensics Based on Eigen-Algorithms. 1-7 - Xiangyu Yu, Huabin Tan, Hui Liang, Chang-Tsun Li, Guangjun Liao:
A Multi-Task Learning CNN for Image Steganalysis. 1-7 - Ahmed S. Mansour, Rafael F. Schaefer, Holger Boche:
The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel. 1-7 - Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Deep Neural Networks good for blind image watermarking? 1-7 - Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
A Novel Approach For Data Packing: Using Trapdoor Knapsack. 1-6 - Ravi Tej Akella, Raviteja Rekula, Vinod Pankajakshan:
A Randomized Kernel-Based Secret Image Sharing Scheme. 1-7 - Shan Jin, Riccardo Bettati:
Adaptive Channel Estimation in Side Channel Attacks. 1-7 - Martin Kopp, Martin Grill, Jan Kohout:
Community-based anomaly detection. 1-6 - Mohamed E. Hussein, Leonidas Spinoulas, Fei Xiong, Wael Abd-Almageed:
Fingerprint Presentation Attack Detection Using A Novel Multi-Spectral Capture Device and Patch-Based Convolutional Neural Networks. 1-8 - Anselmo Ferreira, Han Chen, Bin Li, Jiwu Huang:
An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification. 1-7 - Rudi Primorac, Roberto Togneri, Mohammed Bennamoun, Ferdous Sohel:
Generalized Joint Sparse Representation for Multimodal Biometric Fusion of Heterogeneous Features. 1-6 - Kuan-Hsien Liu, Hsin-Hua Liu, Pak Ki Chan, Tsung-Jung Liu, Soo-Chang Pei:
Age Estimation via Fusion of Depthwise Separable Convolutional Neural Networks. 1-8 - Alberto Pedrouzo-Ulloa, Miguel Masciopinto, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Camera Attribution Forensic Analyzer in the Encrypted Domain. 1-7 - Mauro Barni, Mariko Nakano-Miyatake, Hector Santoyo-Garcia, Benedetta Tondi:
Countering the Pooled Triangle Test for PRNU-based camera identification. 1-8 - Christy Kin-Cleaves, Andrew D. Ker:
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes. 1-7 - Borzoo Rassouli, Fernando Rosas, Deniz Gündüz:
Latent Feature Disclosure under Perfect Sample Privacy. 1-7 - Ravi Tej Akella, Raviteja Rekula, Vinod Pankajakshan:
A Randomized Kernel-Based Secret Image Sharing Scheme - Supplementary -. 1-2 - Ming Jie Lee, Zhe Jin, Andrew Beng Jin Teoh:
One-factor Cancellable Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV) Hashing. 1-7 - Lihua Wang, Huixin Liang, Xiaodan Lin, Xiangui Kang:
Revealing the processing history of pitch-shifted voice using CNNs. 1-7 - Sidhant Sahu, Manish Okade:
Exposing Image Resizing utilizing Welch Power Spectral Density Analysis for Double Compressed JPEG Images. 1-6 - Yi Puyang, Zhaoxia Yin, Zhenxing Qian:
Reversible Data Hiding in Encrypted Images with Two-MSB Prediction. 1-7 - Guang Hua:
Error Analysis of Forensic ENF Matching. 1-7 - Yuezun Li, Ming-Ching Chang, Siwei Lyu:
In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking. 1-7 - Pauline Puteaux, William Puech:
EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images. 1-7 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Performance Evaluation of Secure Communication Systems on Turing Machines. 1-7 - Sen-Ching S. Cheung, Muhammad Usman Rafique, Wai-tian Tan:
Privacy-Preserving Distributed Deep Learning with Privacy Transformations. 1-7 - Mingliang Chen, Min Wu:
Protect Your Deep Neural Networks from Piracy. 1-7 - Iuliia Tkachenko, Christophe Destruel:
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code. 1-6 - Yingqiang Qiu, Hangxing Wang, Zichi Wang, Zhenxing Qian, Gui Feng, Xinpeng Zhang:
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images. 1-7 - Ehsaneddin Jalilian, Andreas Uhl:
Finger-vein Recognition using Deep Fully Convolutional Neural Semantic Segmentation Networks: The Impact of Training Data. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.