


default search action
IEEE Transactions on Information Forensics and Security, Volume 5
Volume 5, Number 1, March 2010
- Xiangui Kang, Jiwu Huang, Wenjun Zeng

:
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. 1-12 - Alessandro Piva

, Tiziano Bianchi
, Alessia De Rosa:
Secure client-side ST-DM watermark embedding. 13-26 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:

Step construction of visual cryptography schemes. 27-38 - Mahalingam Ramkumar:

The subset keys and identity tickets (SKIT) key distribution scheme. 39-51 - Heeseung Choi, Kyoungtaek Choi, Jaihie Kim:

Mosaicing touchless and mirror-reflected fingerprint images. 52-61 - Sarat C. Dass

:
Assessing fingerprint individuality in presence of noisy minutiae. 62-70 - Jiwen Lu

, Yap-Peng Tan:
A doubly weighted approach for appearance-based subspace learning methods. 71-81 - Haibin Ling, Stefano Soatto, Narayanan Ramanathan, David W. Jacobs:

Face verification across age progression using discriminative methods. 82-91 - Ajay Kumar

, Vivek Kanhangad, David Zhang
:
A new framework for adaptive multimodal biometrics management. 92-102 - Yi Cheng Feng, Pong Chi Yuen

, Anil K. Jain:
A hybrid approach for generating secure and discriminating face template. 103-117 - Francis Minhthang Bui

, Karl Martin, Haiping Lu
, Konstantinos N. Plataniotis
, Dimitrios Hatzinakos:
Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications. 118-132 - Guopu Zhu

, Jiwu Huang, Sam Kwong
, Jianquan Yang:
Fragility analysis of adaptive quantization-based image hashing. 133-147 - Santhanakrishnan Anand, Rajarathnam Chandramouli

:
On the location of an eavesdropper in multiterminal networks. 148-157 - Guilin Wang:

An abuse-free fair contract-signing protocol based on the RSA signature. 158-168 - Shari Lawrence Pfleeger, Joel B. Predd, Jeffrey Hunker, Carla Bulford:

Insiders behaving badly: addressing bad actors and their actions. 169-179 - Tiziano Bianchi

, Alessandro Piva
, Mauro Barni:
Composite signal representation for fast and storage-efficient processing of encrypted signals. 180-187 - Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, Zhang Xiong:

Reversible image watermarking using interpolation technique. 187-193 - David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex

, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan
, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. 194 - Russell A. Fink, Alan T. Sherman, Richard Carback:

Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. 194
Volume 5, Number 2, June 2010
- Weiqi Luo

, Fangjun Huang, Jiwu Huang:
Edge adaptive image steganography based on LSB matching revisited. 201-214 - Tomás Pevný

, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. 215-224 - Anindya Sarkar, Upamanyu Madhow, B. S. Manjunath:

Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. 225-239 - Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:

Information-theoretically secret key generation for fading wireless channels. 240-254 - Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar

:
Blind authentication: a secure crypto-biometric verification protocol. 255-268 - Evgeny A. Verbitskiy

, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general nondiscrete signals. 269-279 - Chang-Tsun Li

:
Source camera identification using enhanced sensor pattern noise. 280-287 - Mehmet Celenk

, Thomas Conley, John Willis, James Graham:
Predictive network anomaly detection and visualization. 288-299 - Hidehisa Nakayama, Abbas Jamalipour

, Nei Kato:
Network-based traitor-tracing technique using traffic pattern. 300-313 - Hong Cao, Alex C. Kot:

Lossless data embedding in electronic inks. 314-323 - Bo Zhu, Sanjeev Setia, Sushil Jajodia

, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. 324-336 - Tanya Ignatenko, Frans M. J. Willems:

Information leakage in fuzzy commitment schemes. 337-348 - Gokhan Gul, Fatih Kurugollu

:
SVD-based universal spatial domain image steganalysis. 349-353 - Graeme Bell, Yeuan-Kuen Lee:

A method for automatic identification of signatures of steganography software. 354-358
Volume 5, Number 3, September 2010
- Xiaoli Li, Sridhar Krishnan

, Ngok-Wah Ma:
A wavelet-PCA-based fingerprinting scheme for peer-to-peer video file sharing. 365-373 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:

An experimental study on the security performance of YASS. 374-380 - Jon W. Wallace, Rajesh K. Sharma:

Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. 381-392 - Paul C. van Oorschot

, Amirali Salehi-Abari, Julie Thorpe
:
Purely automated attacks on passpoints-style graphical passwords. 393-405 - Unsang Park, Anil K. Jain:

Face matching and retrieval using soft biometrics. 406-415 - Richard M. Jiang

, Danny Crookes, Nie Luo:
Face recognition in global harmonic subspace. 416-424 - Nese Alyüz, Berk Gökberk

, Lale Akarun
:
Regional registration for expression resistant 3-D face recognition. 425-440 - Richa Singh

, Mayank Vatsa
, Himanshu S. Bhatt, Samarth Bharadwaj, Afzel Noore, Shahin S. Nooreyezdan:
Plastic surgery: a new dimension to face recognition. 441-448 - Mei Chen, Joseph A. O'Sullivan

, Naveen Singla, Erik J. Sirevaag, Sean D. Kristjansson, Po-Hsiang Lai, Alan David Kaplan, John W. Rohrbaugh:
Laser Doppler vibrometry measures of physiological function: evaluation of biometric capabilities. 449-460 - Norman Poh, David Windridge

, Vadim Mottl, Alexander Tatarchuk, Andrey Eliseyev
:
Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution. 461-469 - Mayank Vatsa

, Richa Singh
, Afzel Noore, Arun Ross:
On the dynamic selection of biometric fusion algorithms. 470-479 - Weiqi Luo

, Jiwu Huang, Guoping Qiu
:
JPEG error analysis and its applications to digital image forensics. 480-491 - Matthew C. Stamm

, K. J. Ray Liu:
Forensic detection of image manipulation using statistical intrinsic fingerprints. 492-506 - Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:

Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. 507-517 - Sutharshan Rajasegarar

, Christopher Leckie
, James C. Bezdek, Marimuthu Palaniswami:
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. 518-533 - Daniel Patricio Nicolalde Rodríguez

, José Antonio Apolinário
, Luiz Wagner Pereira Biscainho
:
Audio authenticity: detecting ENF discontinuity with high precision phase analysis. 534-543 - Wei Zhang, Xiaochun Cao, Yanling Qu, Yuexian Hou, Handong Zhao, Chenyang Zhang:

Detecting and extracting the photo composites using planar homography and graph cut. 544-555 - Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo

:
Noninteractive pairwise key establishment for sensor networks. 556-569 - Sara Motahari, Sotirios G. Ziavras

, Quentin Jones:
Online anonymity protection in computer-mediated communication. 570-580 - Lourdes Araujo

, Juan Martínez-Romo
:
Web spam detection: new classification features based on qualified link analysis and language models. 581-590 - Zulfiqar Hassan Khan, Irene Yu-Hua Gu

:
Joint feature correspondences and appearance similarity for robust visual object tracking. 591-606
Volume 5, Number 4, December 2010
- Peter K. K. Loh, Deepak Subramanian:

Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting. 613-624 - Hui-Yu Huang, Cheng-Han Yang, Wen-Hsing Hsu:

A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation. 625-637 - Jiann-Der Lee, Yaw-Hwang Chiou, Jing-Ming Guo:

Reversible Data Hiding Based on Histogram Modification of SMVQ Indices. 638-648 - Azadeh Mansouri

, Ahmad Mahmoudi Aznaveh, Farah Torkamani-Azar, Fatih Kurugollu
:
A Low Complexity Video Watermarking in H.264 Compressed Domain. 649-657 - Ozgur Dalkilic, Ersen Ekrem, S. Eray Varlik, Mehmet Kivanç Mihçak:

A Detection Theoretic Approach to Digital Fingerprinting With Focused Receivers Under Uniform Linear Averaging Gaussian Attacks. 658-669 - Minoru Kuribayashi

, Hiroshi Kato:
Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme. 670-680 - Jan Kodovský, Jessica J. Fridrich:

Quantitative Structural Steganalysis of Jsteg. 681-693 - Weiming Zhang, Jiufen Liu, Xin Wang, Nenghai Yu:

Generalization and Analysis of the Paper Folding Method for Steganography. 694-704 - Tomás Filler, Jessica J. Fridrich:

Gibbs Construction in Steganography. 705-720 - Kwangtaek Kim, Mauro Barni, Hong Z. Tan

:
Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness. 721-733 - Ran Tao, Xiangyi Meng, Yue Wang:

Image Encryption With Multiorders of Fractional Fourier Transforms. 734-738 - Stanislaw Jarecki, Nitesh Saxena:

On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. 739-749 - Yongchang Wang, Laurence G. Hassebrook, Daniel L. Lau

:
Data Acquisition and Processing of 3-D Fingerprints. 750-760 - Jiwen Lu

, Yap-Peng Tan:
Gait-Based Human Age Estimation. 761-770 - Koichiro Niinuma, Unsang Park, Anil K. Jain:

Soft Biometric Traits for Continuous User Authentication. 771-780 - Norman Poh, Chi-Ho Chan, Josef Kittler, Sébastien Marcel, Chris McCool

, Enrique Argones-Rúa, José Luis Alba-Castro, Mauricio Villegas
, Roberto Paredes, Vitomir Struc
, Nikola Pavesic, Albert Ali Salah
, Hui Fang
, Nicholas Costen
:
An Evaluation of Video-to-Video Face Verification. 781-801 - Mitchell McLaren, Robert Vogt, Brendan Baker, Sridha Sridharan:

A Comparison of Session Variability Compensation Approaches for Speaker Verification. 802-809 - Weiqi Luo

, Yuan-Gen Wang, Jiwu Huang:
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. 810-815 - Yu-Feng Hsu, Shih-Fu Chang:

Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection. 816-825 - Yan Gao, Alok N. Choudhary, Gang Hua:

A Comprehensive Approach to Image Spam Detection: From Server to Client Solution. 826-836 - Marie-Francine Moens, Jan De Beer, Erik Boiy, Juan-Carlos Gomez

:
Identifying and Resolving Hidden Text Salting. 837-847 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:

Detecting Double JPEG Compression With the Same Quantization Matrix. 848-856 - Xunyu Pan, Siwei Lyu:

Region Duplication Detection Using Image Feature Matching. 857-867 - Simson L. Garfinkel

, Aleatha Parker-Wood, Daniel Huynh, James J. Migletz:
An Automated Solution to the Multiuser Carved Data Ascription Problem. 868-882 - Michihiro Kobayashi, Takahiro Okabe, Yoichi Sato:

Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions. 883-892 - Jim Aarestad, Dhruva Acharyya, Reza M. Rad, Jim Plusquellic:

Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQ s. 893-904 - Xiaohong Guan, Tao Qin, Wei Li, Pinghui Wang:

Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring. 905-919 - Alfredo Rial, Mina Deng, Tiziano Bianchi

, Alessandro Piva
, Bart Preneel
:
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol. 920-931 - Dalwon Jang, Chang Dong Yoo, Ton Kalker:

Distance Metric Learning for Content Identification. 932-944 - Tsung-Yuan Liu, Wen-Hsiang Tsai:

Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques. 945-954 - Manas Baveja, Hongsong Yuan, Lawrence M. Wein:

Asymptotic Biometric Analysis for Large Gallery Sizes. 955-964

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














