Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs3.bht:"
@article{DBLP:journals/tifs/AysalB08, author = {Tuncer C. Aysal and Kenneth E. Barner}, title = {Sensor Data Cryptography in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {273--289}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.919119}, doi = {10.1109/TIFS.2008.919119}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AysalB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BelcherD08, author = {Craig Belcher and Yingzi Du}, title = {A Selective Feature Information Approach for Iris Image-Quality Measure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {572--577}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924606}, doi = {10.1109/TIFS.2008.924606}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BelcherD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BlochNM08, author = {Matthieu R. Bloch and Rajesh Narasimha and Steven W. McLaughlin}, title = {Network Security for Client-Server Architecture Using Wiretap Codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {404--413}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.927688}, doi = {10.1109/TIFS.2008.927688}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BlochNM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoyerDB08, author = {Jean{-}Philippe Boyer and Pierre Duhamel and Jacques Blanc{-}Talon}, title = {Scalar {DC-QIM} for Semifragile Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {776--782}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2004285}, doi = {10.1109/TIFS.2008.2004285}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BoyerDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BringerCCKZ08, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji and Gilles Z{\'{e}}mor}, title = {Theoretical and Practical Boundaries of Binary Secure Sketches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {673--683}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002937}, doi = {10.1109/TIFS.2008.2002937}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BringerCCKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CadavidA08, author = {Steven Cadavid and Mohamed Abdel{-}Mottaleb}, title = {3-D Ear Modeling and Recognition From Video Sequences Using Shape From Shading}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {709--718}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007239}, doi = {10.1109/TIFS.2008.2007239}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CadavidA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CappelliFM08, author = {Raffaele Cappelli and Matteo Ferrara and Davide Maltoni}, title = {On the Operational Quality of Fingerprint Scanners}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {192--202}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.919336}, doi = {10.1109/TIFS.2008.919336}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CappelliFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CayreB08, author = {Fran{\c{c}}ois Cayre and Patrick Bas}, title = {Kerckhoffs-Based Embedding Security Classes for {WOA} Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {1--15}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916006}, doi = {10.1109/TIFS.2007.916006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CayreB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CelikLKV08, author = {Mehmet Utku Celik and Aweke N. Lemma and Stefan Katzenbeisser and Michiel van der Veen}, title = {Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {475--487}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926988}, doi = {10.1109/TIFS.2008.926988}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CelikLKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CeliktutanSA08, author = {Oya {\c{C}}eliktutan and B{\"{u}}lent Sankur and Ismail Avcibas}, title = {Blind Identification of Source Cell-Phone Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {553--566}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926993}, doi = {10.1109/TIFS.2008.926993}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CeliktutanSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenFGL08, author = {Mo Chen and Jessica J. Fridrich and Miroslav Goljan and Jan Luk{\'{a}}s}, title = {Determining Image Origin and Integrity Using Sensor Noise}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {74--90}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916285}, doi = {10.1109/TIFS.2007.916285}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenFGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Coria-MendozaPNW08, author = {Lino Coria{-}Mendoza and Mark R. Pickering and Panos Nasiopoulos and Rabab K. Ward}, title = {A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {466--474}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.927421}, doi = {10.1109/TIFS.2008.927421}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Coria-MendozaPNW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CoumouS08, author = {David J. Coumou and Gaurav Sharma}, title = {Insertion, Deletion Codes With Feature-Based Embedding: {A} New Paradigm for Watermark Synchronization With Applications to Speech Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {153--165}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920728}, doi = {10.1109/TIFS.2008.920728}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CoumouS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DasNZMC08, author = {Abhishek Das and David Nguyen and Joseph Zambreno and Gokhan Memik and Alok N. Choudhary}, title = {An FPGA-Based Network Intrusion Detection Architecture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {118--132}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916288}, doi = {10.1109/TIFS.2007.916288}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DasNZMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaugmanD08, author = {John Daugman and Cathryn Downing}, title = {Effect of Severe Image Compression on Iris Recognition Performance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {52--61}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916009}, doi = {10.1109/TIFS.2007.916009}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaugmanD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DirikSM08, author = {Ahmet Emir Dirik and Husrev T. Sencar and Nasir D. Memon}, title = {Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {539--552}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926987}, doi = {10.1109/TIFS.2008.926987}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DirikSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EngelPU08, author = {Dominik Engel and Elias Pschernig and Andreas Uhl}, title = {An Analysis of Lightweight Encryption Schemes for Fingerprint Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {173--182}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922058}, doi = {10.1109/TIFS.2008.922058}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EngelPU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Estevez-TapiadorCAR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Arturo Ribagorda}, title = {On the Distinguishability of Distance-Bounded Permutations in Ordered Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {166--172}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920724}, doi = {10.1109/TIFS.2008.920724}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Estevez-TapiadorCAR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FaltemierBF08, author = {Timothy C. Faltemier and Kevin W. Bowyer and Patrick J. Flynn}, title = {A Region Ensemble for 3-D Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {62--73}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916287}, doi = {10.1109/TIFS.2007.916287}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FaltemierBF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FavaBY08, author = {Daniel S. Fava and Stephen R. Byers and Shanchieh Jay Yang}, title = {Projecting Cyberattacks Through Variable-Length Markov Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {359--369}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924605}, doi = {10.1109/TIFS.2008.924605}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FavaBY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FronthalerKBFAOG08, author = {Hartwig Fronthaler and Klaus Kollreider and Josef Big{\"{u}}n and Julian Fi{\'{e}}rrez{-}Aguilar and Fernando Alonso{-}Fernandez and Javier Ortega{-}Garcia and Joaquin Gonzalez{-}Rodriguez}, title = {Fingerprint Image-Quality Estimation and its Application to Multialgorithm Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {331--338}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920725}, doi = {10.1109/TIFS.2008.920725}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FronthalerKBFAOG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuYH08, author = {Yun Fu and Shuicheng Yan and Thomas S. Huang}, title = {Classification and Feature Extraction by Simplexization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {91--100}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916280}, doi = {10.1109/TIFS.2007.916280}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaoDZ08, author = {Feng Hao and John Daugman and Piotr Zielinski}, title = {A Fast Search Algorithm for a Large Fuzzy Database}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {203--212}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920726}, doi = {10.1109/TIFS.2008.920726}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaoDZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeT08, author = {Ting He and Lang Tong}, title = {Distributed Detection of Information Flows}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {390--403}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.928537}, doi = {10.1109/TIFS.2008.928537}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HoZSM08, author = {Anthony Tung Shuen Ho and Xunzhan Zhu and Jun Shen and Pina Marziliano}, title = {Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {567--569}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926994}, doi = {10.1109/TIFS.2008.926994}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HoZSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KatzenbeisserLCVM08, author = {Stefan Katzenbeisser and Aweke N. Lemma and Mehmet Utku Celik and Michiel van der Veen and Martijn Maas}, title = {A Buyer-Seller Watermarking Protocol Based on Secure Embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {783--786}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002939}, doi = {10.1109/TIFS.2008.2002939}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KatzenbeisserLCVM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimSSNC08, author = {Hyoung{-}Joong Kim and Vasiliy Sachnev and Yun{-}Qing Shi and Jeho Nam and Hyon{-}Gon Choo}, title = {A Novel Difference Expansion Transform for Reversible Data Embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {456--465}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924600}, doi = {10.1109/TIFS.2008.924600}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimSSNC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimXNP08, author = {E{-}yong Kim and Li Xiao and Klara Nahrstedt and Kunsoo Park}, title = {Secure Interdomain Routing Registry}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {304--316}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922050}, doi = {10.1109/TIFS.2008.922050}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimXNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KirchnerB08, author = {Matthias Kirchner and Rainer B{\"{o}}hme}, title = {Hiding Traces of Resampling in Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {582--592}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2008214}, doi = {10.1109/TIFS.2008.2008214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KirchnerB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KocalYA08, author = {Osman Hilmi Ko{\c{c}}al and Emrah Y{\"{u}}r{\"{u}}kl{\"{u}} and Ismail Avcibas}, title = {Chaotic-Type Features for Speech Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {651--661}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2004289}, doi = {10.1109/TIFS.2008.2004289}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KocalYA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeH08, author = {Tung Le and Christoforos N. Hadjicostis}, title = {Graphical Inference for Multiple Intrusion Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {370--380}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.928536}, doi = {10.1109/TIFS.2008.928536}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeCCK08, author = {Sanghoon Lee and Heeseung Choi and Kyoungtaek Choi and Jaihie Kim}, title = {Fingerprint-Quality Index Using Gradient Components}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {792--800}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007245}, doi = {10.1109/TIFS.2008.2007245}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeCCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Liu08, author = {Chengjun Liu}, title = {Learning the Uncorrelated, Independent, and Discriminating Color Spaces for Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {213--222}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.923824}, doi = {10.1109/TIFS.2008.923824}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Liu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuhK08, author = {William Luh and Deepa Kundur}, title = {Distributed Secret Sharing for Discrete Memoryless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {1--7}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.927422}, doi = {10.1109/TIFS.2008.927422}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuhK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MahdianS08, author = {Babak Mahdian and Stanislav Saic}, title = {Blind Authentication Using Periodic Properties of Interpolation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {529--538}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2004.924603}, doi = {10.1109/TIFS.2004.924603}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MahdianS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MahoorA08, author = {Mohammad H. Mahoor and Mohamed Abdel{-}Mottaleb}, title = {A Multimodal Approach for Face Modeling and Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {431--440}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924597}, doi = {10.1109/TIFS.2008.924597}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MahoorA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MairgiotisGY08, author = {Antonis Mairgiotis and Nikolas P. Galatsanos and Yongyi Yang}, title = {New Additive Watermark Detectors Based On {A} Hierarchical Spatially Adaptive Image Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {29--37}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916290}, doi = {10.1109/TIFS.2007.916290}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MairgiotisGY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohantySKP08, author = {Pranab K. Mohanty and Sudeep Sarkar and Rangachar Kasturi and P. Jonathon Phillips}, title = {Subspace Approximation of Face Recognition Algorithms: An Empirical Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {734--748}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007242}, doi = {10.1109/TIFS.2008.2007242}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohantySKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MpiperisMS08, author = {Iordanis Mpiperis and Sotiris Malassiotis and Michael G. Strintzis}, title = {Bilinear Models for 3-D Face and Facial Expression Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {498--511}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924598}, doi = {10.1109/TIFS.2008.924598}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MpiperisMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NassarALA08, author = {Diaa Eldin M. Nassar and Ayman Abaza and Xin Li and Hany H. Ammar}, title = {Automatic Construction of Dental Charts for Postmortem Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {234--246}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922452}, doi = {10.1109/TIFS.2008.922452}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NassarALA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NomirA08, author = {Omaima Nomir and Mohamed Abdel{-}Mottaleb}, title = {Fusion of Matching Algorithms for Human Identification Using Dental X-Ray Radiographs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {223--233}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.919343}, doi = {10.1109/TIFS.2008.919343}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NomirA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NoorkamiM08, author = {Maneli Noorkami and Russell M. Mersereau}, title = {Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {441--455}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.923825}, doi = {10.1109/TIFS.2008.923825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NoorkamiM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OliveiraB08, author = {Paulo F. Oliveira and Jo{\~{a}}o Barros}, title = {A Network Coding Approach to Secret Key Distribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {414--423}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.928538}, doi = {10.1109/TIFS.2008.928538}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OliveiraB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ParikhC08, author = {Devi Parikh and Tsuhan Chen}, title = {Data Fusion and Cost Minimization for Intrusion Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {381--389}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.928539}, doi = {10.1109/TIFS.2008.928539}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ParikhC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Perez-FreireP08, author = {Luis P{\'{e}}rez{-}Freire and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {593--610}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002938}, doi = {10.1109/TIFS.2008.2002938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Perez-FreireP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Perez-GonzalezM08, author = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Carlos Mosquera}, title = {Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {137--152}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922057}, doi = {10.1109/TIFS.2008.922057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Perez-GonzalezM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PevnyF08, author = {Tom{\'{a}}s Pevn{\'{y}} and Jessica J. Fridrich}, title = {Detection of Double-Compression in {JPEG} Images for Applications in Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {247--258}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922456}, doi = {10.1109/TIFS.2008.922456}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PevnyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PevnyF08a, author = {Tom{\'{a}}s Pevn{\'{y}} and Jessica J. Fridrich}, title = {Multiclass Detector of Current Steganographic Methods for {JPEG} Format}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {635--650}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002936}, doi = {10.1109/TIFS.2008.2002936}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PevnyF08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RabaouiDRE08, author = {Asma Rabaoui and Manuel Davy and St{\'{e}}phane Rossignol and Zied Ellouze}, title = {Using One-Class SVMs and Wavelets for Audio Surveillance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {763--775}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2008216}, doi = {10.1109/TIFS.2008.2008216}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RabaouiDRE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Regalia08, author = {Phillip A. Regalia}, title = {Cryptographic Secrecy of Steganographic Matrix Embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {786--791}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002940}, doi = {10.1109/TIFS.2008.2002940}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Regalia08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Schaathun08, author = {Hans Georg Schaathun}, title = {On the Assumption of Equal Contributions in Fingerprinting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {569--572}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926991}, doi = {10.1109/TIFS.2008.926991}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Schaathun08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SchmidN08, author = {Natalia A. Schmid and Francesco Nicolo}, title = {On Empirical Recognition Capacity of Biometric Systems Under Global {PCA} and {ICA} Encoding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {512--528}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.924607}, doi = {10.1109/TIFS.2008.924607}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SchmidN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SchonbergDYR08, author = {Daniel Schonberg and Stark C. Draper and Chuohao Yeo and Kannan Ramchandran}, title = {Toward Compression of Encrypted Images and Video Sequences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {749--762}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007244}, doi = {10.1109/TIFS.2008.2007244}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SchonbergDYR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShengHFD08, author = {Weiguo Sheng and Gareth Howells and Michael C. Fairhurst and Farzin Deravi}, title = {Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {183--191}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922056}, doi = {10.1109/TIFS.2008.922056}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShengHFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SwaminathanWL08, author = {Ashwin Swaminathan and Min Wu and K. J. Ray Liu}, title = {Digital Image Forensics via Intrinsic Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {101--117}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916010}, doi = {10.1109/TIFS.2007.916010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SwaminathanWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ToledoW08, author = {Alberto L{\'{o}}pez Toledo and Xiaodong Wang}, title = {Robust Detection of {MAC} Layer Denial-of-Service Attacks in {CSMA/CA} Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {347--358}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926098}, doi = {10.1109/TIFS.2008.926098}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ToledoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TsuiZA08, author = {Tsz Kin Tsui and Xiao{-}Ping (Steven) Zhang and Dimitrios Androutsos}, title = {Color Image Watermarking Using Multidimensional Fourier Transforms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {16--28}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916275}, doi = {10.1109/TIFS.2007.916275}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TsuiZA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TulyakovG08, author = {Sergey Tulyakov and Venu Govindaraju}, title = {Use of Identification Trial Statistics for the Combination of Biometric Matchers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {719--733}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2004287}, doi = {10.1109/TIFS.2008.2004287}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TulyakovG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangG08, author = {Tairan Wang and Georgios B. Giannakis}, title = {Mutual Information Jammer-Relay Games}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {290--303}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920730}, doi = {10.1109/TIFS.2008.920730}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLDB08, author = {Kai Wang and Guillaume Lavou{\'{e}} and Florence Denis and Atilla Baskurt}, title = {Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {620--634}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007229}, doi = {10.1109/TIFS.2008.2007229}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanWTLH08, author = {Shuicheng Yan and Huan Wang and Xiaoou Tang and Jianzhuang Liu and Thomas S. Huang}, title = {Regression From Uncertain Labels and Its Applications to Soft Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {698--708}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2006585}, doi = {10.1109/TIFS.2008.2006585}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanWTLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLLL08, author = {Chunfang Yang and Fenlin Liu and Xiangyang Luo and Bin Liu}, title = {Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {662--672}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007240}, doi = {10.1109/TIFS.2008.2007240}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangWWS08, author = {Cheng{-}Hsing Yang and Chi{-}Yao Weng and Shiuh{-}Jeng Wang and Hung{-}Min Sun}, title = {Adaptive Data Hiding in Edge Areas of Images With Spatial {LSB} Domain Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {3}, pages = {488--497}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.926097}, doi = {10.1109/TIFS.2008.926097}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangWWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuBS08, author = {Paul L. Yu and John S. Baras and Brian M. Sadler}, title = {Physical-Layer Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {1}, pages = {38--51}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2007.916273}, doi = {10.1109/TIFS.2007.916273}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuL08, author = {Wei Yu and K. J. Ray Liu}, title = {Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: {A} Game-Theoretic Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {317--330}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.922453}, doi = {10.1109/TIFS.2008.922453}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCQC08, author = {Chune Zhang and L. L. Cheng and Zhengding Qiu and Lee{-}Ming Cheng}, title = {Multipurpose Watermarking Based on Multiscale Curvelet Transform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {611--619}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2004288}, doi = {10.1109/TIFS.2008.2004288}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCQC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangGL08, author = {Xiaozheng Zhang and Yongsheng Gao and Maylor K. H. Leung}, title = {Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {684--697}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2004286}, doi = {10.1109/TIFS.2008.2004286}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLT08, author = {Yu Zhang and Zang Li and Wade Trappe}, title = {Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {259--272}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.919121}, doi = {10.1109/TIFS.2008.919121}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.