default search action
IEEE Transactions on Information Forensics and Security, Volume 3
Volume 3, Number 1, March 2008
- François Cayre, Patrick Bas:
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. 1-15 - Tsz Kin Tsui, Xiao-Ping (Steven) Zhang, Dimitrios Androutsos:
Color Image Watermarking Using Multidimensional Fourier Transforms. 16-28 - Antonis Mairgiotis, Nikolas P. Galatsanos, Yongyi Yang:
New Additive Watermark Detectors Based On A Hierarchical Spatially Adaptive Image Model. 29-37 - Paul L. Yu, John S. Baras, Brian M. Sadler:
Physical-Layer Authentication. 38-51 - John Daugman, Cathryn Downing:
Effect of Severe Image Compression on Iris Recognition Performance. 52-61 - Timothy C. Faltemier, Kevin W. Bowyer, Patrick J. Flynn:
A Region Ensemble for 3-D Face Recognition. 62-73 - Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan Lukás:
Determining Image Origin and Integrity Using Sensor Noise. 74-90 - Yun Fu, Shuicheng Yan, Thomas S. Huang:
Classification and Feature Extraction by Simplexization. 91-100 - Ashwin Swaminathan, Min Wu, K. J. Ray Liu:
Digital Image Forensics via Intrinsic Fingerprints. 101-117 - Abhishek Das, David Nguyen, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary:
An FPGA-Based Network Intrusion Detection Architecture. 118-132
Volume 3, Number 2, June 2008
- Fernando Pérez-González, Carlos Mosquera:
Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering. 137-152 - David J. Coumou, Gaurav Sharma:
Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking. 153-165 - Juan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda:
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. 166-172 - Dominik Engel, Elias Pschernig, Andreas Uhl:
An Analysis of Lightweight Encryption Schemes for Fingerprint Images. 173-182 - Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi:
Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering. 183-191 - Raffaele Cappelli, Matteo Ferrara, Davide Maltoni:
On the Operational Quality of Fingerprint Scanners. 192-202 - Feng Hao, John Daugman, Piotr Zielinski:
A Fast Search Algorithm for a Large Fuzzy Database. 203-212 - Chengjun Liu:
Learning the Uncorrelated, Independent, and Discriminating Color Spaces for Face Recognition. 213-222 - Omaima Nomir, Mohamed Abdel-Mottaleb:
Fusion of Matching Algorithms for Human Identification Using Dental X-Ray Radiographs. 223-233 - Diaa Eldin M. Nassar, Ayman Abaza, Xin Li, Hany H. Ammar:
Automatic Construction of Dental Charts for Postmortem Identification. 234-246 - Tomás Pevný, Jessica J. Fridrich:
Detection of Double-Compression in JPEG Images for Applications in Steganography. 247-258 - Yu Zhang, Zang Li, Wade Trappe:
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. 259-272 - Tuncer C. Aysal, Kenneth E. Barner:
Sensor Data Cryptography in Wireless Sensor Networks. 273-289 - Tairan Wang, Georgios B. Giannakis:
Mutual Information Jammer-Relay Games. 290-303 - E-yong Kim, Li Xiao, Klara Nahrstedt, Kunsoo Park:
Secure Interdomain Routing Registry. 304-316 - Wei Yu, K. J. Ray Liu:
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach. 317-330 - Hartwig Fronthaler, Klaus Kollreider, Josef Bigün, Julian Fiérrez-Aguilar, Fernando Alonso-Fernandez, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez:
Fingerprint Image-Quality Estimation and its Application to Multialgorithm Verification. 331-338
Volume 3, Number 3, September 2008
- William Luh, Deepa Kundur:
Distributed Secret Sharing for Discrete Memoryless Networks. 1-7 - Alberto López Toledo, Xiaodong Wang:
Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. 347-358 - Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang:
Projecting Cyberattacks Through Variable-Length Markov Models. 359-369 - Tung Le, Christoforos N. Hadjicostis:
Graphical Inference for Multiple Intrusion Detection. 370-380 - Devi Parikh, Tsuhan Chen:
Data Fusion and Cost Minimization for Intrusion Detection. 381-389 - Ting He, Lang Tong:
Distributed Detection of Information Flows. 390-403 - Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin:
Network Security for Client-Server Architecture Using Wiretap Codes. 404-413 - Paulo F. Oliveira, João Barros:
A Network Coding Approach to Secret Key Distribution. 414-423 - Mohammad H. Mahoor, Mohamed Abdel-Mottaleb:
A Multimodal Approach for Face Modeling and Recognition. 431-440 - Maneli Noorkami, Russell M. Mersereau:
Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase. 441-455 - Hyoung-Joong Kim, Vasiliy Sachnev, Yun-Qing Shi, Jeho Nam, Hyon-Gon Choo:
A Novel Difference Expansion Transform for Reversible Data Embedding. 456-465 - Lino Coria-Mendoza, Mark R. Pickering, Panos Nasiopoulos, Rabab K. Ward:
A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. 466-474 - Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. 475-487 - Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. 488-497 - Iordanis Mpiperis, Sotiris Malassiotis, Michael G. Strintzis:
Bilinear Models for 3-D Face and Facial Expression Recognition. 498-511 - Natalia A. Schmid, Francesco Nicolo:
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding. 512-528 - Babak Mahdian, Stanislav Saic:
Blind Authentication Using Periodic Properties of Interpolation. 529-538 - Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. 539-552 - Oya Çeliktutan, Bülent Sankur, Ismail Avcibas:
Blind Identification of Source Cell-Phone Model. 553-566 - Anthony Tung Shuen Ho, Xunzhan Zhu, Jun Shen, Pina Marziliano:
Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform. 567-569 - Hans Georg Schaathun:
On the Assumption of Equal Contributions in Fingerprinting. 569-572 - Craig Belcher, Yingzi Du:
A Selective Feature Information Approach for Iris Image-Quality Measure. 572-577
Volume 3, Number 4, December 2008
- Matthias Kirchner, Rainer Böhme:
Hiding Traces of Resampling in Digital Images. 582-592 - Luis Pérez-Freire, Fernando Pérez-González:
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack. 593-610 - Chune Zhang, L. L. Cheng, Zhengding Qiu, Lee-Ming Cheng:
Multipurpose Watermarking Based on Multiscale Curvelet Transform. 611-619 - Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt:
Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform. 620-634 - Tomás Pevný, Jessica J. Fridrich:
Multiclass Detector of Current Steganographic Methods for JPEG Format. 635-650 - Osman Hilmi Koçal, Emrah Yürüklü, Ismail Avcibas:
Chaotic-Type Features for Speech Steganalysis. 651-661 - Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu:
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. 662-672 - Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji, Gilles Zémor:
Theoretical and Practical Boundaries of Binary Secure Sketches. 673-683 - Xiaozheng Zhang, Yongsheng Gao, Maylor K. H. Leung:
Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases. 684-697 - Shuicheng Yan, Huan Wang, Xiaoou Tang, Jianzhuang Liu, Thomas S. Huang:
Regression From Uncertain Labels and Its Applications to Soft Biometrics. 698-708 - Steven Cadavid, Mohamed Abdel-Mottaleb:
3-D Ear Modeling and Recognition From Video Sequences Using Shape From Shading. 709-718 - Sergey Tulyakov, Venu Govindaraju:
Use of Identification Trial Statistics for the Combination of Biometric Matchers. 719-733 - Pranab K. Mohanty, Sudeep Sarkar, Rangachar Kasturi, P. Jonathon Phillips:
Subspace Approximation of Face Recognition Algorithms: An Empirical Study. 734-748 - Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran:
Toward Compression of Encrypted Images and Video Sequences. 749-762 - Asma Rabaoui, Manuel Davy, Stéphane Rossignol, Zied Ellouze:
Using One-Class SVMs and Wavelets for Audio Surveillance. 763-775 - Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon:
Scalar DC-QIM for Semifragile Authentication. 776-782 - Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik, Michiel van der Veen, Martijn Maas:
A Buyer-Seller Watermarking Protocol Based on Secure Embedding. 783-786 - Phillip A. Regalia:
Cryptographic Secrecy of Steganographic Matrix Embedding. 786-791 - Sanghoon Lee, Heeseung Choi, Kyoungtaek Choi, Jaihie Kim:
Fingerprint-Quality Index Using Gradient Components. 792-800
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.