Search dblp for Publications

export results for "toc:db/conf/wifs/wifs2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wifs/BarniFLPS0K09,
  author       = {Mauro Barni and
                  Pierluigi Failla and
                  Riccardo Lazzeretti and
                  Annika Paus and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Vladimir Kolesnikov},
  title        = {Efficient privacy-preserving classification of {ECG} signals},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386475},
  doi          = {10.1109/WIFS.2009.5386475},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniFLPS0K09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BattistiCN09,
  author       = {Federica Battisti and
                  Marco Carli and
                  Alessandro Neri},
  title        = {{QIM-DM} watermarking optimization based on inter-frequency contrast
                  masking in the {DCT} domain},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {11--15},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386491},
  doi          = {10.1109/WIFS.2009.5386491},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BattistiCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauerMGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {BitStalker: Accurately and efficiently monitoring bittorrent traffic},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386457},
  doi          = {10.1109/WIFS.2009.5386457},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeekhofVKH09,
  author       = {Fokko Beekhof and
                  Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak},
  title        = {Fast identification algorithms for forensic applications},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {76--80},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386480},
  doi          = {10.1109/WIFS.2009.5386480},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BeekhofVKH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeritelliS09,
  author       = {Francesco Beritelli and
                  Andrea Spadaccini},
  title        = {Heart sounds quality analysis for automatic cardiac biometry applications},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {61--65},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386481},
  doi          = {10.1109/WIFS.2009.5386481},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BeritelliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiVPB09,
  author       = {Tiziano Bianchi and
                  Thijs Veugen and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Processing in the encrypted domain using a composite signal representation:
                  Pros and cons},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {176--180},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386460},
  doi          = {10.1109/WIFS.2009.5386460},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiVPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCCK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  title        = {{RFID} key establishment against active adversaries},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {186--190},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386458},
  doi          = {10.1109/WIFS.2009.5386458},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BringerCCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChuangV009,
  author       = {Wei{-}Hong Chuang and
                  Avinash L. Varna and
                  Min Wu},
  title        = {Modeling and analysis of ordinal ranking in content fingerprinting},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {116--120},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386472},
  doi          = {10.1109/WIFS.2009.5386472},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChuangV009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DaraziUM09,
  author       = {Rony Darazi and
                  Pilar Callau Uson and
                  Beno{\^{\i}}t Macq},
  title        = {Secure and HVS-adaptive exhibition Spread Transform Dither Modulation
                  watermarking for Digital Cinema},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386493},
  doi          = {10.1109/WIFS.2009.5386493},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DaraziUM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DellutriLOI09,
  author       = {Fabio Dellutri and
                  Luigi Laura and
                  Vittorio Ottaviani and
                  Giuseppe F. Italiano},
  title        = {Extracting social networks from seized smartphones and web data},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {101--105},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386473},
  doi          = {10.1109/WIFS.2009.5386473},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DellutriLOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVTL09,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving user clustering in a social network},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386476},
  doi          = {10.1109/WIFS.2009.5386476},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FatourechiLWW09,
  author       = {Mehrdad Fatourechi and
                  Xudong Lv and
                  Z. Jane Wang and
                  Rabab K. Ward},
  title        = {Towards automated image hashing based on the Fast Johnson-Lindenstrauss
                  Transform {(FJLT)}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {121--125},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386469},
  doi          = {10.1109/WIFS.2009.5386469},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FatourechiLWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiKK09,
  author       = {Chuhong Fei and
                  Raymond H. Kwong and
                  Deepa Kundur},
  title        = {Secure semi-fragilewatermarking for image authentication},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {141--145},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386465},
  doi          = {10.1109/WIFS.2009.5386465},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FillerF09,
  author       = {Tom{\'{a}}s Filler and
                  Jessica J. Fridrich},
  title        = {Wet {ZZW} construction for steganography},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {131--135},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386467},
  doi          = {10.1109/WIFS.2009.5386467},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FillerF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronP09,
  author       = {Teddy Furon and
                  Luis P{\'{e}}rez{-}Freire},
  title        = {Worst case attacks against binary probabilistic traitor tracing codes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {56--60},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386484},
  doi          = {10.1109/WIFS.2009.5386484},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarciaH09,
  author       = {Johan Garcia and
                  Thijs Holleboom},
  title        = {Retention of micro-fragments in cluster slack - {A} first model},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {31--35},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386487},
  doi          = {10.1109/WIFS.2009.5386487},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GarciaH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaubatzS09,
  author       = {Matthew Gaubatz and
                  Steven J. Simske},
  title        = {Printer-scanner identification via analysis of structured security
                  deterrents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {151--155},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386463},
  doi          = {10.1109/WIFS.2009.5386463},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaubatzS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GulA09,
  author       = {G{\"{o}}khan G{\"{u}}l and
                  Ismail Avcibas},
  title        = {Source cell phone camera identification based on singular value decomposition},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386459},
  doi          = {10.1109/WIFS.2009.5386459},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GulA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangM09,
  author       = {Yen{-}Wei Huang and
                  Pierre Moulin},
  title        = {Capacity-achieving fingerprint decoding},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {51--55},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386483},
  doi          = {10.1109/WIFS.2009.5386483},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KhannaD09,
  author       = {Nitin Khanna and
                  Edward J. Delp},
  title        = {Source scanner identification for scanned documents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {166--170},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386462},
  doi          = {10.1109/WIFS.2009.5386462},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KhannaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchnerG09,
  author       = {Matthias Kirchner and
                  Thomas Gloe},
  title        = {On resampling detection in re-compressed images},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {21--25},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386489},
  doi          = {10.1109/WIFS.2009.5386489},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchnerG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MairgiotisG09,
  author       = {Antonis Mairgiotis and
                  Nikolaos Galatsanos},
  title        = {A hierarchical spatially adaptive image model for perceptual mask
                  design and multiplicative watermark detection},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {6--10},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386494},
  doi          = {10.1109/WIFS.2009.5386494},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MairgiotisG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MikkilineniKGD09,
  author       = {Aravind K. Mikkilineni and
                  Deen King{-}Smith and
                  Saul B. Gelfand and
                  Edward J. Delp},
  title        = {Forensic characterization of {RF} devices},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {26--30},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386490},
  doi          = {10.1109/WIFS.2009.5386490},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MikkilineniKGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoreiraFS09,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {A note on the equivalence of the traceability properties of Reed-Solomon
                  codes for certain coalition sizes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386488},
  doi          = {10.1109/WIFS.2009.5386488},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MoreiraFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} attacks on {MDPL}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386455},
  doi          = {10.1109/WIFS.2009.5386455},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MurakamiT09,
  author       = {Takao Murakami and
                  Kenta Takahashi},
  title        = {Accuracy improvement with high convenience in biometric identification
                  using multihypothesis sequential probability ratio test},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {66--70},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386482},
  doi          = {10.1109/WIFS.2009.5386482},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MurakamiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NagarJ09,
  author       = {Abhishek Nagar and
                  Anil K. Jain},
  title        = {On the security of non-invertible fingerprint template transforms},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {81--85},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386477},
  doi          = {10.1109/WIFS.2009.5386477},
  timestamp    = {Fri, 27 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NagarJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Ng09,
  author       = {Tian{-}Tsong Ng},
  title        = {Camera response function signature for digital forensics - Part {II:}
                  Signature extraction},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {161--165},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386461},
  doi          = {10.1109/WIFS.2009.5386461},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Ng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NgT09,
  author       = {Tian{-}Tsong Ng and
                  Mao{-}Pei Tsui},
  title        = {Camera response function signature for digital forensics - Part {I:}
                  Theory and data selection},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386464},
  doi          = {10.1109/WIFS.2009.5386464},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NgT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Perez-FreireF09,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Teddy Furon},
  title        = {Blind decoder for binary probabilistic traitor tracing codes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {46--50},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386486},
  doi          = {10.1109/WIFS.2009.5386486},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Perez-FreireF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ScagliolaPG09,
  author       = {Michele Scagliola and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pietro Guccione},
  title        = {An extended analysis of discrete fourier tranform - rational dither
                  modulation for non-white hosts},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {146--150},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386466},
  doi          = {10.1109/WIFS.2009.5386466},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ScagliolaPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SegoviaCA09,
  author       = {Maria V. {Ortiz Segovia} and
                  George T.{-}C. Chiu and
                  Jan P. Allebach},
  title        = {Using forms for information hiding and coding in electrophotographic
                  documents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {136--140},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386468},
  doi          = {10.1109/WIFS.2009.5386468},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SegoviaCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SimskeSEG09,
  author       = {Steven J. Simske and
                  Margaret Sturgill and
                  Paul Everest and
                  George Guillory},
  title        = {A system for forensic analysis of large image sets},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {16--20},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386492},
  doi          = {10.1109/WIFS.2009.5386492},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SimskeSEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Skoric0SC09,
  author       = {Boris Skoric and
                  Stefan Katzenbeisser and
                  Hans Georg Schaathun and
                  Mehmet Utku Celik},
  title        = {Tardos fingerprinting codes in the combined digit model},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {41--45},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386485},
  doi          = {10.1109/WIFS.2009.5386485},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Skoric0SC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SterckxGPV09,
  author       = {Micha{\"{e}}l Sterckx and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Efficient implementation of anonymous credentials on Java Card smart
                  cards},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386474},
  doi          = {10.1109/WIFS.2009.5386474},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ThiemertNSZ09,
  author       = {Stefan Thiemert and
                  Stefan N{\"{u}}rnberger and
                  Martin Steinebach and
                  Sascha Zmudzinski},
  title        = {Security of robust audio hashes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {126--130},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386470},
  doi          = {10.1109/WIFS.2009.5386470},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ThiemertNSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Varna009,
  author       = {Avinash L. Varna and
                  Min Wu},
  title        = {Modeling content fingerprints using markov random fields},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {111--115},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386471},
  doi          = {10.1109/WIFS.2009.5386471},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Varna009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK09,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak and
                  Fokko Beekhof},
  title        = {Privacy enhancement of common randomness based authentication: Key
                  rate maximized case},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {86--90},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386478},
  doi          = {10.1109/WIFS.2009.5386478},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangRV09,
  author       = {Yige Wang and
                  Shantanu Rane and
                  Anthony Vetro},
  title        = {Leveraging reliable bits: {ECC} design considerations for practical
                  secure biometric systems},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {71--75},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386479},
  doi          = {10.1109/WIFS.2009.5386479},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2009,
  title        = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5377995/proceeding},
  isbn         = {978-1-4244-5279-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics