


default search action
2nd WIFS 2010: Seattle, WA, USA
- 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, Seattle, WA, USA, December 12-15, 2010. IEEE 2010, ISBN 978-1-4244-9078-3

- Walter J. Scheirer, William Bishop, Terrance E. Boult:

Beyond PKI: The Biocryptographic Key Infrastructure. 1-6 - Bozhao Tan, Aaron Lewicke, David Yambay, Stephanie Schuckers

:
The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. 1-6 - Eric Kee, Hany Farid:

Exposing digital forgeries from 3-D lighting environments. 1-6 - Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:

A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits. 1-6 - Abhijit Bendale, Terrance E. Boult:

id-Privacy in large scale biometric systems. 1-6 - Yuhan Zhou:

Joint robust watermarking and image compression. 1-6 - Hong Zhao, Yun Q. Shi:

A phase-space reconstruction approach to detect covert channels in TCP/IP protocols. 1-6 - Stephen B. Pollard, Steven J. Simske, Guy B. Adams:

Model based print signature profile extraction for forensic analysis of individual text glyphs. 1-6 - Kannan Karthik, Dimitrios Hatzinakos:

MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooks. 1-6 - Tomás Filler, Jessica J. Fridrich:

Minimizing additive distortion functions with non-binary embedding operation in steganography. 1-6 - Deniz Karakoyunlu, Berk Sunar:

Differential template attacks on PUF enabled cryptographic devices. 1-6 - Bei-Bei Liu, Heung-Kyu Lee, Yongjian Hu, Changhee Choi

:
On classification of source cameras: A graph based approach. 1-5 - Pei-Lun Hsieh, Yu-Ming Liang, Hong-Yuan Mark Liao:

Recognition of blurred license plate images. 1-6 - Thijs Veugen:

Encrypted integer division. 1-6 - Shantanu Rane, Wei Sun:

Privacy preserving string comparisons based on Levenshtein distance. 1-6 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:

Digital forensics in VoIP networks. 1-6 - Yen-Wei Huang, Pierre Moulin:

Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions. 1-6 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:

First steps toward image phylogeny. 1-6 - Fernanda A. Andaló

, Gabriel Taubin
, Siome Goldenstein:
Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetry. 1-6 - Roberto Caldelli

, Irene Amerini
, Francesco Picchioni, Matteo Innocenti
:
Fast image clustering of unknown source images. 1-5 - Frans M. J. Willems, Tanya Ignatenko:

Identification and secret-key binding in binary-symmetric template-protected biometric systems. 1-5 - Karthik Nandakumar:

A fingerprint cryptosystem based on minutiae phase spectrum. 1-6 - Benjamin Mathon

, Patrick Bas, François Cayre, Benoît Macq:
Security and robustness constraints for spread-spectrum Tardos fingerprinting. 1-6 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:

Secure computations on non-integer values. 1-6 - Shankar Sadasivam, Pierre Moulin, Sean P. Meyn:

A universal divergence-rate estimator for steganalysis in timing channels. 1-6 - Mauro Barni, Jorge Guajardo, Riccardo Lazzeretti

:
Privacy preserving evaluation of signal quality with application to ECG analysis. 1-6 - Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Taras Holotyak
, Fokko Beekhof, Farzad Farhadzadeh:
Privacy amplification of content identification systems based on fingerprint bit reliability. 1-6 - Telidevara Aditya, Venkatachalam Chandrasekaran, Avinash Srinivasan, Ravi Mukkamala, Sandeep Gampa:

Similarity coefficient generators for network forensics. 1-6 - Matthew Gaubatz, Steven J. Simske:

Towards a feature set for robust printing-imaging cycle device identification using structured printed markings. 1-6 - Antonis Mairgiotis, Nikolaos Galatsanos:

Bayesian watermark detection and new perceptual mask based on a spatially weighted Total Variation image prior. 1-6 - Dinei Florêncio, Cormac Herley:

Phishing and money mules. 1-5 - Ikenna Odinaka, Po-Hsiang Lai, Alan David Kaplan, Joseph A. O'Sullivan

, Erik J. Sirevaag, Sean D. Kristjansson, Amanda K. Sheffield, John W. Rohrbaugh:
ECG biometrics: A robust short-time frequency analysis. 1-6 - Ravindra B. Gadde, Donald A. Adjeroh, Arun Ross:

Indexing iris images using the Burrows-Wheeler Transform. 1-6 - Wei-Hong Chuang, Min Wu:

Semi non-intrusive training for cell-phone camera model linkage. 1-6 - Peter A. Johnson, Bozhao Tan, Stephanie Schuckers

:
Multimodal fusion vulnerability to non-zero effort (spoof) imposters. 1-5 - Donald A. Adjeroh, Deng Cao, Marco Piccirilli

, Arun Ross:
Predictability and correlation in human metrology. 1-6 - Mehrdad Majzoobi, Farinaz Koushanfar

, Srinivas Devadas:
FPGA PUF using programmable delay lines. 1-6 - Vincent Christlein, Christian Riess

, Elli Angelopoulou:
On rotation invariance in copy-move forgery detection. 1-6 - Ileana Buhan, Jorge Guajardo, Emile Kelkboom:

Efficient strategies to play the indistinguishability game for fuzzy sketches. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














