default search action
IEEE Transactions on Information Forensics and Security, Volume 6
Volume 6, Number 1, March 2011
- Ronald William Smith, George Scott Knight:
Predictable Three-Parameter Design of Network Covert Communication Systems. 1-13 - Hussein A. Aly:
Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error. 14-18 - Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi:
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. 19-27 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing Based on a Visual Channel: Design and Usability Study. 28-38 - Shouhuai Xu, Xiaohu Li, Timothy Paul Parker, Xueping Wang:
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data. 39-52 - Xinpeng Zhang:
Lossy Compression and Iterative Reconstruction for Encrypted Image. 53-58 - Ka-Chung Leung, Cheung Hoi Leung:
Improvement of Fingerprint Retrieval by a Statistical Classifier. 59-69 - Arun Ross, Asem A. Othman:
Visual Cryptography for Biometric Privacy. 70-81 - Hugo Proença:
Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength. 82-95 - Unsang Park, Raghavender R. Jillela, Arun Ross, Anil K. Jain:
Periocular Biometrics in the Visible Spectrum. 96-106 - Emile J. C. Kelkboom, Jeroen Breebaart, Tom A. M. Kevenaar, Ileana Buhan, Raymond N. J. Veldhuis:
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. 107-121 - Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case. 122-139 - Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case. 140-151 - Chi-Yuan Chen, Kai-Di Chang, Han-Chieh Chao:
Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem. 152-161 - Farinaz Koushanfar, Azalia Mirhoseini:
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection. 162-174 - Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Towards Situational Awareness of Large-Scale Botnet Probing Events. 175-188 - Xuhua Ding, Yanjiang Yang, Robert H. Deng:
Database Access Pattern Protection Without Full-Shuffles. 189-201 - Alfredo Rial, Josep Balasch, Bart Preneel:
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer. 202-212 - Mani Malek Esmaeili, Mehrdad Fatourechi, Rabab Kreidieh Ward:
A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting. 213-226 - Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification. 227-236
Volume 6, Number 2, June 2011
- Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. 241-255 - João P. Vilela, Matthieu R. Bloch, João Barros, Steven W. McLaughlin:
Wireless Secrecy Regions With Friendly Jamming. 256-266 - Amir Valizadeh, Z. Jane Wang:
Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding. 267-282 - Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, Riccardo Leonardi:
High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators. 283-295 - Yongfeng Huang, Shanyu Tang, Jian Yuan:
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec. 296-306 - Feng Liu, Chuankun Wu:
Embedded Extended Visual Cryptography Schemes. 307-322 - D. Wang, L. Dong, X. Li:
Towards Shift Tolerant Visual Secret Sharing Schemes. 323-337 - H. Choi, K. Choi, J. Kim:
Fingerprint Matching Incorporating Ridge Features With Minutiae. 338-345 - Fanglin Chen, Jianjiang Feng, Anil K. Jain, Jie Zhou, Jin Zhang:
Separating Overlapped Fingerprints. 346-359 - Zhan-Li Sun, Kin-Man Lam:
Depth Estimation of Face Images Based on the Constrained ICA Model. 360-370 - Thirimachos Bourlai, Arun Ross, Anil K. Jain:
Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed, and Scanned Photos. 371-384 - Shreyas Venugopalan, Marios Savvides:
How to Generate Spoofed Irises From an Iris Code Template. 385-395 - Y.-L. Chen, C.-T. Hsu:
Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection. 396-406 - Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function-Based Message Authentication for Sensor Networks. 407-425 - Yang Xiang, Ke Li, Wanlei Zhou:
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. 426-437 - Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:
Speculative Parallel Pattern Matching. 438-451 - Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider:
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks. 452-468 - Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Secure Adaptive Filtering. 469-485 - Y. Zhu, Ying Tan:
A Local-Concentration-Based Feature Extraction Approach for Spam Filtering. 486-497 - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. 498-512 - Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236]. 513
Volume 6, Number 3-1, September 2011
- Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, João Barros:
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems. 521-522 - Motohiko Isaka, Seiya Kawata:
Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels. 523-531 - Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin, João Barros, Byung-Jae Kwak:
LDPC Codes for the Gaussian Wiretap Channel. 532-540 - Shun Watanabe, Yasutada Oohama:
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication. 541-550 - Chan Wong Wong, Tan F. Wong, John M. Shea:
Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel. 551-564 - Anurag Agrawal, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini:
Noncoherent Capacity of Secret-Key Agreement With Public Discussion. 565-574 - Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros:
Coding for Cryptographic Security Enhancement Using Stopping Sets. 575-584 - Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. 585-594 - Alexandre J. Pierrot, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. 595-605 - Paul L. Yu, Brian M. Sadler:
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer. 606-615 - João P. Vilela, Pedro C. Pinto, João Barros:
Position-Based Jamming for Enhanced Wireless Secrecy. 616-627 - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints. 628-639 - S. Ali A. Fakoorian, A. Lee Swindlehurst:
MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design. 640-649 - Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka:
Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems. 650-660 - Lei Jiang, Zhu Han, Maria Angeles Vázquez-Castro, Are Hjørungnes:
Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints. 661-671 - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Agreement With Channel State Information at the Transmitter. 672-681 - Yingbin Liang, H. Vincent Poor, Lei Ying:
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization. 682-692 - Xiaowei Wang, Meixia Tao, Jianhua Mo, Youyun Xu:
Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks. 693-702 - Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai:
On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels. 703-711 - Satashu Goel, Vaneet Aggarwal, Aylin Yener, A. Robert Calderbank:
The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach. 712-724 - Mable P. Fok, Zhenxing Wang, Zhexing Deng, Paul R. Prucnal:
Optical Layer Security in Fiber-Optic Networks. 725-736 - Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef, Ahmed K. Sultan, Hesham El Gamal:
Keys Through ARQ: Theory and Practice. 737-751 - Suhas Mathur, Wade Trappe:
BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams. 752-762 - Hyoungsuk Jeon, Daesung Hwang, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Secure Type-Based Multiple Access. 763-774 - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic:
Key Agreement Over Multiple Access Channel. 775-790 - Neal Patwari, Joey Wilson:
Spatial Models for Human Motion-Induced Signal Strength Variance on Static Links. 791-802 - Ehsan Vahedi, Vahid Shah-Mansouri, Vincent W. S. Wong, Ian F. Blake, Rabab K. Ward:
Probabilistic Analysis of Blocking Attack in RFID Systems. 803-817 - Melda Yuksel, Xi Liu, Elza Erkip:
A Secure Communication Game With a Relay Helping the Eavesdropper. 818-830 - Yongle Wu, K. J. Ray Liu:
An Information Secrecy Game in Cognitive Radio Networks. 831-842 - Saurabh U. Pawar, John F. Doherty:
Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy. 843-852 - Vinay Uday Prabhu, Miguel R. D. Rodrigues:
On Wireless Channels With varepsilon-Outage Secrecy Capacity. 853-860 - Jiangyuan Li, Athina P. Petropulu:
Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading. 861-867
Volume 6, Number 3-2, September 2011
- Dinu Coltuc:
Improved Embedding for Prediction-Based Reversible Watermarking. 873-882 - Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Craig T. Jin:
Blind Image Watermarking Using a Sample Projection Approach. 883-893 - Shankar Sadasivam, Pierre Moulin, Todd P. Coleman:
A Message-Passing Approach to Combating Desynchronization Attacks. 894-905 - Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. 906-919 - Tomás Filler, Jan Judas, Jessica J. Fridrich:
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. 920-935 - I-Jen Lai, Wen-Hsiang Tsai:
Secret-Fragment-Visible Mosaic Image-A New Computer Art and Its Application to Information Hiding. 936-945 - Pei-Ju Chiang, Jan P. Allebach, George T.-C. Chiu:
Extrinsic Signature Embedding and Detection in Electrophotographic Halftoned Images Through Exposure Modulation. 946-959 - Shyong Jian Shyu, Ming Chiang Chen:
Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes. 960-969 - Robert Biddle, Mohammad Mannan, Paul C. van Oorschot, Tara Whalen:
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects. 970-979 - Jing Liu, Bo Yang:
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees. 980-991 - Pei-Ling Chiu, Kai-Hui Lee:
A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes. 992-1001 - Francesco Turroni, Davide Maltoni, Raffaele Cappelli, Dario Maio:
Improving Fingerprint Orientation Extraction. 1002-1013 - Vivek Kanhangad, Ajay Kumar, David Zhang:
A Unified Framework for Contactless Hand Verification. 1014-1027 - Zhifeng Li, Unsang Park, Anil K. Jain:
A Discriminative Model for Age Invariant Face Recognition. 1028-1037 - Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:
Using a Knowledge-Based Approach to Remove Blocking Artifacts in Skin Images for Forensic Analysis. 1038-1049 - Matthew C. Stamm, K. J. Ray Liu:
Anti-Forensics of Digital Image Compression. 1050-1065 - Eric Kee, Micah K. Johnson, Hany Farid:
Digital Image Authentication From JPEG Headers. 1066-1075 - Ming-Wei Liu, John F. Doherty:
Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels. 1076-1085 - Pinghui Wang, Xiaohong Guan, Tao Qin, Qiuzhen Huang:
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links. 1086-1098 - Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Giuseppe Serra:
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery. 1099-1110 - Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo:
Identifying Image Composites Through Shadow Matte Consistency. 1111-1122 - Mehrdad Majzoobi, Farinaz Koushanfar:
Time-Bounded Authentication of FPGAs. 1123-1135 - Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:
Malicious Circuitry Detection Using Thermal Conditioning. 1136-1145 - Avinash L. Varna, Min Wu:
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. 1146-1159 - Raffaele Cappelli, Matteo Ferrara, Dario Maio:
Candidate List Reduction Based on the Analysis of Fingerprint Indexing Scores. 1160-1164 - Carsten Gottschlich, Thomas Hotz, Robert Lorenz, Stefanie Bernhardt, Michael Hantschel, Axel Munk:
Modeling the Growth of Fingerprints Improves Matching for Adolescents. 1165-1169 - Charles Lamech, Reza M. Rad, Mohammad Tehranipoor, Jim Plusquellic:
An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities. 1170-1179 - Koichiro Niinuma, Unsang Park, Anil K. Jain:
Erratum to "Soft Biometric Traits for Continuous User Authentication". 1180
Volume 6, Number 4, 2011
- Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn:
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. 1185-1199 - Ehsan Nezhadarya, Z. Jane Wang, Rabab Kreidieh Ward:
Robust Image Watermarking Based on Multiscale Gradient Direction Quantization. 1200-1213 - Tu-Thach Quach:
Optimal Cover Estimation Methods and Steganographic Payload Location. 1214-1222 - Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. 1223-1232 - Qiong Huang, Duncan S. Wong, Willy Susilo:
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. 1233-1247 - Kien Nguyen Thanh, Clinton Fookes, Sridha Sridharan, Simon Denman:
Quality-Driven Super-Resolution for Less Constrained Iris Recognition at a Distance and on the Move. 1248-1258 - Yingbo Zhou, Ajay Kumar:
Human Identification Using Palm-Vein Images. 1259-1274 - Hae Jong Seo, Peyman Milanfar:
Face Verification Using the LARK Representation. 1275-1286 - Sina Jahanbin, Hyohoon Choi, Alan C. Bovik:
Passive Multimodal 2-D+3-D Face Recognition Using Gabor Features and Landmark Distances. 1287-1304 - Miguel A. Ferrer, Aythami Morales:
Hand-Shape Biometrics Combining the Visible and Short-Wave Infrared Bands. 1305-1314 - Sairul Izwan Safie, John J. Soraghan, Lykourgos Petropoulakis:
Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR). 1315-1322 - Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. 1323-1334 - Hai-Dong Yuan:
Blind Forensics of Median Filtering in Digital Images. 1335-1345 - Yan Shi, Michael A. Jensen:
Improved Radiometric Identification of Wireless Devices Using MIMO Transmission. 1346-1354 - Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:
Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding. 1355-1369 - Wenjun Gu, Sriram Chellappan, Xiaole Bai, Honggang Wang:
Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks. 1370-1381 - Qian Wang, Zesheng Chen, Chao Chen:
Darknet-Based Inference of Internet Worm Temporal Characteristics. 1382-1393 - Bogdan Carbunar, Radu Sion:
Write-Once Read-Many Oblivious RAM. 1394-1403 - Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. 1404-1417 - Levent Özparlak, Ismail Avcibas:
Differentiating Between Images Using Wavelet-Based Transforms: A Comparative Study. 1418-1431 - Daw-Tung Lin, Kai-Yung Huang:
Collaborative Pedestrian Tracking and Data Fusion With Multiple Cameras. 1432-1444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.