


default search action
IEEE Transactions on Information Forensics and Security, Volume 7
Volume 7, Number 1, Part 1, February 2012
- Miodrag Potkonjak, Ramesh Karri

, Ingrid Verbauwhede
, Kouichi Itoh:
Guest Editorial Integrated Circuit and System Security. 1-2 - Naofumi Homma, Kazuya Saito, Takafumi Aoki:

A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits. 3-13 - William E. Cobb, Eric D. Laspe, Rusty O. Baldwin, Michael A. Temple, Yong C. Kim:

Intrinsic Physical-Layer Authentication of Integrated Circuits. 14-24 - Eric Love, Yier Jin

, Yiorgos Makris
:
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition. 25-40 - Chong Hee Kim:

Improved Differential Fault Analysis on AES Key Schedule. 41-50 - Farinaz Koushanfar

:
Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management. 51-63 - Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman

, Ira S. Moskowitz, Myong H. Kang:
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. 64-75 - Hassan Salmani, Mohammad Tehranipoor:

Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection. 76-87 - Yang Li, Kazuo Ohta, Kazuo Sakiyama:

New Fault-Based Side-Channel Attack Using Fault Sensitivity. 88-97 - Roel Maes

, Dries Schellekens, Ingrid Verbauwhede
:
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs. 98-108 - Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:

Information-Theoretic Approach to Optimal Differential Fault Analysis. 109-120
Volume 7, Number 1, Part 2, February 2012
- Pedro C. Pinto, João Barros

, Moe Z. Win
:
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity. 125-138 - Pedro C. Pinto, João Barros

, Moe Z. Win
:
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion. 139-147 - Hung D. Ly, Tie Liu, Yufei W. Blankenship:

Security Embedding Codes. 148-159 - Yen-Wei Huang, Pierre Moulin:

On the Saddle-Point Solution and the Large-Coalition Asymptotics of Fingerprinting Games. 160-175 - Wien Hong, Tung-Shou Chen:

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. 176-184 - Hongjie He, Fan Chen, Heng-Ming Tai

, Ton Kalker, Jiashu Zhang:
Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. 185-196 - Sian-Jheng Lin, Wei-Ho Chung

:
A Probabilistic Model of $(t, n)$ Visual Cryptography Scheme With Dynamic Group. 197-207 - Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu

, Chee-Cheon Chui:
Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise. 208-218 - Kai-Hui Lee, Pei-Ling Chiu:

An Extended Visual Cryptography Algorithm for General Access Structures. 219-229 - Amol D. Rahulkar, Raghunath S. Holambe:

Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n: A Postclassifier. 230-240 - Anindya Roy, Mathew Magimai-Doss, Sébastien Marcel:

A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers. 241-254 - Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:

Multibiometric Cryptosystems Based on Feature-Level Fusion. 255-268 - Enrique Argones-Rúa, Emanuele Maiorana

, José Luis Alba-Castro, Patrizio Campisi:
Biometric Template Protection Using Universal Background Models: An Application to Online Signature. 269-282 - Valentina Conotter, James F. O'Brien

, Hany Farid:
Exposing Digital Forgeries in Ballistic Motion. 283-296 - Liang Xiao

, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. 297-309 - Jingchao Chen, Rongqing Zhang

, Lingyang Song, Zhu Han, Bingli Jiao:
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks. 310-320 - Arun K. Kanuparthi, Mohamed Zahran

, Ramesh Karri
:
Architecture Support for Dynamic Integrity Checking. 321-332 - Abhranil Maiti, Inyoung Kim, Patrick Schaumont

:
A Robust Physical Unclonable Function With Enhanced Challenge-Response Set. 333-345 - Chao Wang, Weiming Zhang, Jiufen Liu, Nenghai Yu:

Fast Matrix Embedding by Matrix Extending. 346-350
Volume 7, Number 2, April 2012
- C.-C. Jay Kuo

:
Editorial. 357-358 - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:

Secure Communication Over Parallel Relay Channel. 359-371 - Mitsugu Iwamoto:

A Weak Security Notion for Visual Secret Sharing Schemes. 372-382 - Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou

, Shui Yu
:
A Dual-Channel Time-Spread Echo Method for Audio Watermarking. 383-392 - Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:

Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise. 393-402 - Minoru Kuribayashi

:
Interference Removal Operation for Spread Spectrum Fingerprinting Scheme. 403-417 - Hafiz Malik

, K. P. Subbalakshmi
, Ramamurti Chandramouli:
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy. 418-431 - Jan Kodovský, Jessica J. Fridrich, Vojtech Holub:

Ensemble Classifiers for Steganalysis of Digital Media. 432-444 - Tomás Pevný

, Jessica J. Fridrich, Andrew D. Ker:
From Blind to Quantitative Steganalysis. 445-454 - Tamer Shanableh

:
Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering. 455-464 - Bing Zeng, Christophe Tartary, Peng Xu

, Jiandu Jing, Xueming Tang:
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries. 465-479 - Lifeng Lai, Yingbin Liang, H. Vincent Poor

:
A Unified Framework for Key Agreement Over Wireless Fading Channels. 480-490 - Fabio Pareschi

, Riccardo Rovatti
, Gianluca Setti
:
On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution. 491-505 - Xiaozheng Zhang, Yongsheng Gao

:
Heterogeneous Specular and Diffuse 3-D Surface Approximation for Face Recognition Across Pose. 506-517 - Aglika Gyaourova, Arun Ross:

Index Codes for Multibiometric Pattern Retrieval. 518-529 - Alexandros Iosifidis

, Anastasios Tefas
, Ioannis Pitas:
Activity-Based Person Identification Using Fuzzy Representation and Discriminant Learning. 530-542 - Darko S. Matovski, Mark S. Nixon

, Sasan Mahmoodi, John N. Carter:
The Effect of Time on Gait Recognition Performance. 543-552 - Roy Wallace, Mitchell McLaren, Christopher McCool

, Sébastien Marcel
:
Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models. 553-562 - Jingu Heo, Marios Savvides:

3-D Generic Elastic Models for Fast and Texture Preserving 2-D Novel Pose Synthesis. 563-576 - Tolga Inan, Ugur Halici

:
3-D Face Recognition With Local Shape Descriptors. 577-587 - Karen Hollingsworth, Shelby Solomon Darnell

, Philip E. Miller, Damon L. Woodard
, Kevin W. Bowyer
, Patrick J. Flynn:
Human and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light. 588-601 - Chi-Ho Chan, Budhaditya Goswami, Josef Kittler, William J. Christmas

:
Local Ordinal Contrast Pattern Histograms for Spatiotemporal, Lip-Based Speaker Authentication. 602-612 - Yi Cheng Feng, Pong Chi Yuen

:
Binary Discriminant Analysis for Generating Binary Face Template. 613-624 - Cemal Hanilçi, Figen Ertas, Tuncay Ertas, Ömer Eskidere:

Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals. 625-634 - Slim Rekhis

, Noureddine Boudriga:
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks. 635-650 - Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin:

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. 651-663 - Qinghua Li, Guohong Cao:

Mitigating Routing Misbehavior in Disruption Tolerant Networks. 664-675 - Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee:

A Large-Scale Empirical Study of Conficker. 676-690 - Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee

, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. 691-703 - Sabrina Gerbracht, Christian Scheunert

, Eduard A. Jorswieck
:
Secrecy Outage in MISO Systems With Partial Channel Information. 704-716 - Ravi Garg, Avinash L. Varna, Min Wu

:
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks. 717-730 - Zhenghao Zhang:

A New Bound on the Performance of the Bandwidth Puzzle. 731-742 - Zhiguo Wan, Jun-e Liu, Robert H. Deng

:
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. 743-754 - Radu Sion

, Yao Chen:
Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances. 755-764 - Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar

, Miodrag Potkonjak:
Gate Characterization Using Singular Value Decomposition: Foundations and Applications. 765-773 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:

Image Phylogeny by Minimal Spanning Trees. 774-788 - Ming-Hour Yang, Ming-Chien Yang:

RIHT: A Novel Hybrid IP Traceback Scheme. 789-797 - Hugo Proença

, Luís A. Alexandre
:
Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests. 798-808 - Rajesh Kumar

, Nikhil R. Pal, Bhabatosh Chanda, J. D. Sharma:
Forensic Detection of Fraudulent Alteration in Ball-Point Pen Strokes. 809-820 - Jian Cao, Jiwu Huang:

Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. 821-826 - Xinpeng Zhang:

Separable Reversible Data Hiding in Encrypted Image. 826-832 - Koen Simoens

, Julien Bringer, Hervé Chabanne, Stefaan Seys:
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems. 833-841 - Tiziano Bianchi

, Alessandro Piva
:
Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps. 842-848
Volume 7, Number 3, June 2012
- Chuntao Wang, Jiangqun Ni, Jiwu Huang:

An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. 853-867 - Jessica J. Fridrich, Jan Kodovský:

Rich Models for Steganalysis of Digital Images. 868-882 - Marco Baldi

, Marco Bianchi, Franco Chiaraluce
:
Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis. 883-894 - Rajendra S. Katti, Aida Vosoughi:

On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability. 895-903 - Qijun Zhao, Anil K. Jain:

Model Based Separation of Overlapping Latent Fingerprints. 904-918 - Ryan Connaughton, Amanda Sgroi, Kevin W. Bowyer

, Patrick J. Flynn:
A Multialgorithm Analysis of Three Iris Biometric Sensors. 919-931 - Sri-Kaushik Pavani, Federico Sukno

, David Delgado-Gómez
, Constantine Butakoff
, Xavier Planes, Alejandro F. Frangi
:
An Experimental Evaluation of Three Classifiers for Use in Self-Updating Face Recognition Systems. 932-943 - Jiwen Lu

, Xiuzhuang Zhou, Yap-Peng Tan, Yuanyuan Shang, Jie Zhou:
Cost-Sensitive Semi-Supervised Discriminant Analysis for Face Recognition. 944-953 - Vishal M. Patel, Tao Wu, Soma Biswas, P. Jonathon Phillips, Rama Chellappa:

Dictionary-Based Face Recognition Under Variable Lighting and Pose. 954-965 - Miguel A. Ferrer

, Jesús Francisco Vargas-Bonilla, Aythami Morales
, Aarón Ordonez:
Robustness of Offline Signature Verification Based on Gray Level Features. 966-977 - Jindan Zhou, Steven Cadavid, Mohamed Abdel-Mottaleb

:
An Efficient 3-D Ear Recognition System Employing Local and Holistic Features. 978-991 - Hong Cao, Alex C. Kot:

Manipulation Detection on Image Patches Using FusionBoost. 992-1002 - Tiziano Bianchi

, Alessandro Piva
:
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts. 1003-1017 - Pravin Kakar, N. Sudha:

Exposing Postprocessed Copy-Paste Forgeries Through Transform-Invariant Features. 1018-1028 - Pravin Kakar, N. Sudha:

Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation. 1029-1039 - Sankardas Roy, Mauro Conti

, Sanjeev Setia, Sushil Jajodia
:
Secure Data Aggregation in Wireless Sensor Networks. 1040-1052 - Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:

Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. 1053-1066 - Wei Hu

, Jason Oberg, Ali Irturk, Mohit Tiwari
, Timothy Sherwood
, Dejun Mu, Ryan Kastner
:
On the Complexity of Generating Gate Level Information Flow Tracking Logic. 1067-1080 - Xudong Lv, Z. Jane Wang:

Perceptual Image Hashing Based on Shape Contexts and Local Feature Points. 1081-1093 - Zhenhua Guo, David Zhang

, Lei Zhang
, Wenhuang Liu:
Feature Band Selection for Online Multispectral Palmprint Recognition. 1094-1099
Volume 7, Number 4, August 2012
- Sebastiano Battiato

, Giovanni Maria Farinella
, Enrico Messina, Giovanni Puglisi:
Robust Image Alignment for Tampering Detection. 1105-1117 - Reza Soosahabi, Mort Naraghi-Pour:

Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks. 1118-1126 - Amir Valizadeh, Z. Jane Wang:

An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding. 1127-1143 - Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne P. Burleson:

Detecting Software Theft in Embedded Systems: A Side-Channel Approach. 1144-1154 - Sian-Jheng Lin, Wei-Ho Chung

:
The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions. 1155-1167 - Peter Meerwald

, Teddy Furon:
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes. 1168-1180 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:

New Channel Selection Rule for JPEG Steganography. 1181-1191 - Somnath Dey, Debasis Samanta

:
Iris Data Indexing Method Using Gabor Energy Features. 1192-1203 - Matteo Ferrara

, Annalisa Franco
, Dario Maio, Davide Maltoni:
Face Image Conformance to ISO/ICAO Standards in Machine Readable Travel Documents. 1204-1213 - Walter J. Scheirer, Anderson de Rezende Rocha, Jonathan Parris, Terrance E. Boult:

Learning for Meta-Recognition. 1214-1224 - Emile J. C. Kelkboom, Jeroen Breebaart, Ileana Buhan, Raymond N. J. Veldhuis:

Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. 1225-1241 - Meng-Hui Lim, Andrew Beng Jin Teoh

:
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding. 1242-1254 - Keshav Seshadri, Marios Savvides:

An Analysis of the Sensitivity of Active Shape Models to Initialization When Applied to Automatic Facial Landmarking. 1255-1269 - Amin Merati, Norman Poh, Josef Kittler:

User-Specific Cohort Selection and Score Normalization for Biometric Systems. 1270-1277 - Masoud Ghoreishi Madiseh, Stephen W. Neville, Michael L. McGuire:

Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation. 1278-1287 - Zhe Yao, Philip Mark, Michael G. Rabbat:

Anomaly Detection Using Proximity Graph and PageRank Algorithm. 1288-1300 - Huazhu Fu

, Xiaochun Cao:
Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map. 1301-1314 - Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:

Temporal Forensics and Anti-Forensics for Motion Compensated Video. 1315-1329 - Ode Ojowu, Johan Karlsson, Jian Li, Yilu Liu:

ENF Extraction From Digital Recordings Using Adaptive Techniques and Frequency Tracking. 1330-1338 - Ryan M. Gerdes, Mani Mina, Steve Russell, Thomas E. Daniels:

Physical-Layer Identification of Wired Ethernet Devices. 1339-1353 - Francesco Renna

, Nicola Laurenti
, H. Vincent Poor
:
Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels. 1354-1367 - Liang Xiao

, Yan Chen
, W. Sabrina Lin, K. J. Ray Liu:
Indirect Reciprocity Security Game for Large-Scale Wireless Networks. 1368-1380 - Shui Yu

, Guofeng Zhao, Wanchun Dou, Simon James
:
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks. 1381-1393 - Lang Lin, Sudheendra Srivathsa, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne P. Burleson:

Design and Validation of Arbiter-Based PUFs for Sub-45-nm Low-Power Security Applications. 1394-1403 - Sevinç Bayram, Hüsrev T. Sencar, Nasir D. Memon

:
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization. 1404-1413 - Won Taek Song, Jinho Choi

, Jeongseok Ha:
Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II. 1414-1418
Volume 7, Number 5, October 2012
- Mari Ostendorf:

A Message from the Vice President of Publications on New Developments in Signal Processing Society Publications. 1425 - Mauro Conti

, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android. 1426-1438 - Fu-Hau Hsu, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, Chieh-Wen Chen:

Antivirus Software Shield Against Antivirus Terminators. 1439-1447 - Shan-Chun Liu, Wen-Hsiang Tsai:

Line-Based Cubism-Like Image - A New Type of Art Image and its Application to Lossless Data Hiding. 1448-1458 - Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo:

Spectral Watermarking for Parameterized Surfaces. 1459-1471 - Onur Ozan Koyluoglu, Hesham El Gamal:

Polar Coding for Secure Transmission and Key Agreement. 1472-1483 - Yanpei Liu, Stark C. Draper

, Akbar M. Sayeed:
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness. 1484-1497 - Jianjiang Feng, Yuan Shi, Jie Zhou:

Robust and Efficient Algorithms for Separating Latent Overlapped Fingerprints. 1498-1510 - Haruyuki Iwama, Mayu Okumura, Yasushi Makihara, Yasushi Yagi:

The OU-ISIR Gait Database Comprising the Large Population Dataset and Performance Evaluation of Gait Recognition. 1511-1521 - Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh

, Mayank Vatsa
:
Memetically Optimized MCWLD for Matching Sketches With Digital Face Images. 1522-1535 - Nisha Srinivas, Gaurav Aggarwal, Patrick J. Flynn, Richard W. Vorder Bruegge:

Analysis of Facial Marks to Distinguish Between Identical Twins. 1536-1550 - Di Huang, Mohsen Ardabilian, Yunhong Wang, Liming Chen:

3-D Face Recognition Using eLBP-Based Facial Description and Local Feature Hybrid Matching. 1551-1565 - Pasquale Ferrara

, Tiziano Bianchi
, Alessia De Rosa, Alessandro Piva
:
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts. 1566-1577 - Ligang Zheng, Yanqiang Lei, Guoping Qiu

, Jiwu Huang:
Near-Duplicate Image Detection in a Visually Salient Riemannian Space. 1578-1593 - Chih-Yi Chiu

, Sheng-Yang Li, Cheng-Yu Hsieh:
Video Query Reformulation for Near-Duplicate Detection. 1594-1603 - Yahya S. Khiabani, Shuangqing Wei, Jian Yuan, Jian Wang:

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise. 1604-1613 - Qian Wang, Zesheng Chen, Chao Chen

:
On the Characteristics of the Worm Infection Family Tree. 1614-1627 - Bogdan Carbunar, Yao Chen, Radu Sion

:
Tipping Pennies? Privately Practical Anonymous Micropayments. 1628-1637 - Chao Yang, Yimin Song, Guofei Gu:

Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. 1638-1651 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval:
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding. 1652-1667
Volume 7, Number 6, December 2012
- Carlos Gañán

, Jorge Mata-Díaz, Jose L. Muñoz
, Juan Hernández-Serrano
, Oscar Esparza
, Juanjo Alins:
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces. 1673-1686 - Xiaofeng Chen, Jin Li, Willy Susilo

:
Efficient Fair Conditional Payments for Outsourcing Computations. 1687-1694 - Michel Abdalla

, Angelo De Caro, Duong Hieu Phan
:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. 1695-1706 - Zhen Lei, Shengcai Liao

, Anil K. Jain, Stan Z. Li:
Coupled Discriminant Analysis for Heterogeneous Face Recognition. 1707-1716 - Francesco Nicolo, Natalia A. Schmid

:
Long Range Cross-Spectral Face Recognition: Matching SWIR Against Visible Light Images. 1717-1726 - Matteo Ferrara

, Davide Maltoni, Raffaele Cappelli
:
Noninvertible Minutia Cylinder-Code Representation. 1727-1737 - Meng Yang

, Lei Zhang
, Simon Chi-Keung Shiu
, David Zhang
:
Monogenic Binary Coding: An Efficient Local Feature Extraction Approach to Face Recognition. 1738-1751 - Abhishek Nagar, Heeseung Choi, Anil K. Jain:

Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach. 1752-1765 - Lahoucine Ballihi

, Boulbaba Ben Amor
, Mohamed Daoudi
, Anuj Srivastava
, Driss Aboutajdine:
Boosting 3-D-Geometric Features for Efficient Face Recognition and Gender Classification. 1766-1779 - Tao Wu, Pavan K. Turaga

, Rama Chellappa:
Age Estimation and Face Verification Across Aging Using Landmarks. 1780-1788 - Brendan Klare, Mark James Burge, Joshua C. Klontz, Richard W. Vorder Bruegge, Anil K. Jain:

Face Recognition Performance: Role of Demographic Information. 1789-1801 - Sung-Uk Jung, Mark S. Nixon

:
On Using Gait to Enhance Frontal Face Extraction. 1802-1811 - Ikenna Odinaka, Po-Hsiang Lai, Alan David Kaplan, Joseph A. O'Sullivan

, Erik J. Sirevaag, John W. Rohrbaugh:
ECG Biometric Recognition: A Comparative Analysis. 1812-1824 - Ye Wang, Shantanu Rane, Stark C. Draper

, Prakash Ishwar
:
A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems. 1825-1840 - Vincent Christlein, Christian Riess

, Johannes Jordan
, Corinna Riess, Elli Angelopoulou:
An Evaluation of Popular Copy-Move Forgery Detection Approaches. 1841-1854 - Raef Bassily, Sennur Ulukus:

Deaf Cooperation for Secrecy With Multiple Antennas at the Helper. 1855-1864 - Yongfeng Huang, Chenghao Liu, Shanyu Tang, Sen Bai:

Steganography Integration Into a Low-Bit Rate Speech Codec. 1865-1875 - Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose:

Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches. 1876-1889 - Paulo F. Oliveira, Luísa Lima, Tiago T. V. Vinhoza

, João Barros
, Muriel Médard:
Coding for Trusted Storage in Untrusted Networks. 1890-1899 - Chester Rebeiro

, Debdeep Mukhopadhyay:
Boosting Profiled Cache Timing Attacks With A Priori Analysis. 1900-1905 - Sheng Li

, Alex C. Kot:
An Improved Scheme for Full Fingerprint Reconstruction. 1906-1912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














