Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wifs/wifs2009.bht:"
@inproceedings{DBLP:conf/wifs/BarniFLPS0K09, author = {Mauro Barni and Pierluigi Failla and Riccardo Lazzeretti and Annika Paus and Ahmad{-}Reza Sadeghi and Thomas Schneider and Vladimir Kolesnikov}, title = {Efficient privacy-preserving classification of {ECG} signals}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {91--95}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386475}, doi = {10.1109/WIFS.2009.5386475}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BarniFLPS0K09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BattistiCN09, author = {Federica Battisti and Marco Carli and Alessandro Neri}, title = {{QIM-DM} watermarking optimization based on inter-frequency contrast masking in the {DCT} domain}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {11--15}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386491}, doi = {10.1109/WIFS.2009.5386491}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BattistiCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BauerMGS09, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Douglas C. Sicker}, title = {BitStalker: Accurately and efficiently monitoring bittorrent traffic}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {181--185}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386457}, doi = {10.1109/WIFS.2009.5386457}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BeekhofVKH09, author = {Fokko Beekhof and Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Taras Holotyak}, title = {Fast identification algorithms for forensic applications}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {76--80}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386480}, doi = {10.1109/WIFS.2009.5386480}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BeekhofVKH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BeritelliS09, author = {Francesco Beritelli and Andrea Spadaccini}, title = {Heart sounds quality analysis for automatic cardiac biometry applications}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {61--65}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386481}, doi = {10.1109/WIFS.2009.5386481}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BeritelliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BianchiVPB09, author = {Tiziano Bianchi and Thijs Veugen and Alessandro Piva and Mauro Barni}, title = {Processing in the encrypted domain using a composite signal representation: Pros and cons}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {176--180}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386460}, doi = {10.1109/WIFS.2009.5386460}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BianchiVPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BringerCCK09, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji}, title = {{RFID} key establishment against active adversaries}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {186--190}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386458}, doi = {10.1109/WIFS.2009.5386458}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BringerCCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ChuangV009, author = {Wei{-}Hong Chuang and Avinash L. Varna and Min Wu}, title = {Modeling and analysis of ordinal ranking in content fingerprinting}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {116--120}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386472}, doi = {10.1109/WIFS.2009.5386472}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ChuangV009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DaraziUM09, author = {Rony Darazi and Pilar Callau Uson and Beno{\^{\i}}t Macq}, title = {Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital Cinema}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386493}, doi = {10.1109/WIFS.2009.5386493}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/DaraziUM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DellutriLOI09, author = {Fabio Dellutri and Luigi Laura and Vittorio Ottaviani and Giuseppe F. Italiano}, title = {Extracting social networks from seized smartphones and web data}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {101--105}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386473}, doi = {10.1109/WIFS.2009.5386473}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/DellutriLOI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ErkinVTL09, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving user clustering in a social network}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {96--100}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386476}, doi = {10.1109/WIFS.2009.5386476}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FatourechiLWW09, author = {Mehrdad Fatourechi and Xudong Lv and Z. Jane Wang and Rabab K. Ward}, title = {Towards automated image hashing based on the Fast Johnson-Lindenstrauss Transform {(FJLT)}}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {121--125}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386469}, doi = {10.1109/WIFS.2009.5386469}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FatourechiLWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FeiKK09, author = {Chuhong Fei and Raymond H. Kwong and Deepa Kundur}, title = {Secure semi-fragilewatermarking for image authentication}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {141--145}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386465}, doi = {10.1109/WIFS.2009.5386465}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FeiKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FillerF09, author = {Tom{\'{a}}s Filler and Jessica J. Fridrich}, title = {Wet {ZZW} construction for steganography}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {131--135}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386467}, doi = {10.1109/WIFS.2009.5386467}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FillerF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FuronP09, author = {Teddy Furon and Luis P{\'{e}}rez{-}Freire}, title = {Worst case attacks against binary probabilistic traitor tracing codes}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {56--60}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386484}, doi = {10.1109/WIFS.2009.5386484}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FuronP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/GarciaH09, author = {Johan Garcia and Thijs Holleboom}, title = {Retention of micro-fragments in cluster slack - {A} first model}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {31--35}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386487}, doi = {10.1109/WIFS.2009.5386487}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/GarciaH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/GaubatzS09, author = {Matthew Gaubatz and Steven J. Simske}, title = {Printer-scanner identification via analysis of structured security deterrents}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {151--155}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386463}, doi = {10.1109/WIFS.2009.5386463}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/GaubatzS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/GulA09, author = {G{\"{o}}khan G{\"{u}}l and Ismail Avcibas}, title = {Source cell phone camera identification based on singular value decomposition}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {171--175}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386459}, doi = {10.1109/WIFS.2009.5386459}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/GulA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/HuangM09, author = {Yen{-}Wei Huang and Pierre Moulin}, title = {Capacity-achieving fingerprint decoding}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {51--55}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386483}, doi = {10.1109/WIFS.2009.5386483}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/HuangM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KhannaD09, author = {Nitin Khanna and Edward J. Delp}, title = {Source scanner identification for scanned documents}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {166--170}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386462}, doi = {10.1109/WIFS.2009.5386462}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/KhannaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KirchnerG09, author = {Matthias Kirchner and Thomas Gloe}, title = {On resampling detection in re-compressed images}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {21--25}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386489}, doi = {10.1109/WIFS.2009.5386489}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KirchnerG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MairgiotisG09, author = {Antonis Mairgiotis and Nikolaos Galatsanos}, title = {A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detection}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {6--10}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386494}, doi = {10.1109/WIFS.2009.5386494}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MairgiotisG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MikkilineniKGD09, author = {Aravind K. Mikkilineni and Deen King{-}Smith and Saul B. Gelfand and Edward J. Delp}, title = {Forensic characterization of {RF} devices}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {26--30}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386490}, doi = {10.1109/WIFS.2009.5386490}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MikkilineniKGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MoreiraFS09, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Miguel Soriano}, title = {A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {36--40}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386488}, doi = {10.1109/WIFS.2009.5386488}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MoreiraFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} attacks on {MDPL}}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {191--195}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386455}, doi = {10.1109/WIFS.2009.5386455}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MurakamiT09, author = {Takao Murakami and Kenta Takahashi}, title = {Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {66--70}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386482}, doi = {10.1109/WIFS.2009.5386482}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MurakamiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/NagarJ09, author = {Abhishek Nagar and Anil K. Jain}, title = {On the security of non-invertible fingerprint template transforms}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {81--85}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386477}, doi = {10.1109/WIFS.2009.5386477}, timestamp = {Fri, 27 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/NagarJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Ng09, author = {Tian{-}Tsong Ng}, title = {Camera response function signature for digital forensics - Part {II:} Signature extraction}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {161--165}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386461}, doi = {10.1109/WIFS.2009.5386461}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Ng09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/NgT09, author = {Tian{-}Tsong Ng and Mao{-}Pei Tsui}, title = {Camera response function signature for digital forensics - Part {I:} Theory and data selection}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {156--160}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386464}, doi = {10.1109/WIFS.2009.5386464}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/NgT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Perez-FreireF09, author = {Luis P{\'{e}}rez{-}Freire and Teddy Furon}, title = {Blind decoder for binary probabilistic traitor tracing codes}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {46--50}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386486}, doi = {10.1109/WIFS.2009.5386486}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Perez-FreireF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ScagliolaPG09, author = {Michele Scagliola and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pietro Guccione}, title = {An extended analysis of discrete fourier tranform - rational dither modulation for non-white hosts}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {146--150}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386466}, doi = {10.1109/WIFS.2009.5386466}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ScagliolaPG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SegoviaCA09, author = {Maria V. {Ortiz Segovia} and George T.{-}C. Chiu and Jan P. Allebach}, title = {Using forms for information hiding and coding in electrophotographic documents}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {136--140}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386468}, doi = {10.1109/WIFS.2009.5386468}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/SegoviaCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SimskeSEG09, author = {Steven J. Simske and Margaret Sturgill and Paul Everest and George Guillory}, title = {A system for forensic analysis of large image sets}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {16--20}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386492}, doi = {10.1109/WIFS.2009.5386492}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SimskeSEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Skoric0SC09, author = {Boris Skoric and Stefan Katzenbeisser and Hans Georg Schaathun and Mehmet Utku Celik}, title = {Tardos fingerprinting codes in the combined digit model}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {41--45}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386485}, doi = {10.1109/WIFS.2009.5386485}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Skoric0SC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SterckxGPV09, author = {Micha{\"{e}}l Sterckx and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Efficient implementation of anonymous credentials on Java Card smart cards}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {106--110}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386474}, doi = {10.1109/WIFS.2009.5386474}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ThiemertNSZ09, author = {Stefan Thiemert and Stefan N{\"{u}}rnberger and Martin Steinebach and Sascha Zmudzinski}, title = {Security of robust audio hashes}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {126--130}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386470}, doi = {10.1109/WIFS.2009.5386470}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ThiemertNSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Varna009, author = {Avinash L. Varna and Min Wu}, title = {Modeling content fingerprints using markov random fields}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {111--115}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386471}, doi = {10.1109/WIFS.2009.5386471}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Varna009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK09, author = {Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Taras Holotyak and Fokko Beekhof}, title = {Privacy enhancement of common randomness based authentication: Key rate maximized case}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {86--90}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386478}, doi = {10.1109/WIFS.2009.5386478}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/WangRV09, author = {Yige Wang and Shantanu Rane and Anthony Vetro}, title = {Leveraging reliable bits: {ECC} design considerations for practical secure biometric systems}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {71--75}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386479}, doi = {10.1109/WIFS.2009.5386479}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/WangRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wifs/2009, title = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5377995/proceeding}, isbn = {978-1-4244-5279-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.