Search dblp for Publications

export results for "toc:db/journals/tifs/tifs3.bht:"

 download as .bib file

@article{DBLP:journals/tifs/AysalB08,
  author       = {Tuncer C. Aysal and
                  Kenneth E. Barner},
  title        = {Sensor Data Cryptography in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {273--289},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.919119},
  doi          = {10.1109/TIFS.2008.919119},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AysalB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BelcherD08,
  author       = {Craig Belcher and
                  Yingzi Du},
  title        = {A Selective Feature Information Approach for Iris Image-Quality Measure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {572--577},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924606},
  doi          = {10.1109/TIFS.2008.924606},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BelcherD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BlochNM08,
  author       = {Matthieu R. Bloch and
                  Rajesh Narasimha and
                  Steven W. McLaughlin},
  title        = {Network Security for Client-Server Architecture Using Wiretap Codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {404--413},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.927688},
  doi          = {10.1109/TIFS.2008.927688},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BlochNM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoyerDB08,
  author       = {Jean{-}Philippe Boyer and
                  Pierre Duhamel and
                  Jacques Blanc{-}Talon},
  title        = {Scalar {DC-QIM} for Semifragile Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {776--782},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2004285},
  doi          = {10.1109/TIFS.2008.2004285},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BoyerDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BringerCCKZ08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji and
                  Gilles Z{\'{e}}mor},
  title        = {Theoretical and Practical Boundaries of Binary Secure Sketches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {673--683},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002937},
  doi          = {10.1109/TIFS.2008.2002937},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BringerCCKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CadavidA08,
  author       = {Steven Cadavid and
                  Mohamed Abdel{-}Mottaleb},
  title        = {3-D Ear Modeling and Recognition From Video Sequences Using Shape
                  From Shading},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {709--718},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007239},
  doi          = {10.1109/TIFS.2008.2007239},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CadavidA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CappelliFM08,
  author       = {Raffaele Cappelli and
                  Matteo Ferrara and
                  Davide Maltoni},
  title        = {On the Operational Quality of Fingerprint Scanners},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {192--202},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.919336},
  doi          = {10.1109/TIFS.2008.919336},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CappelliFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CayreB08,
  author       = {Fran{\c{c}}ois Cayre and
                  Patrick Bas},
  title        = {Kerckhoffs-Based Embedding Security Classes for {WOA} Data Hiding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {1--15},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916006},
  doi          = {10.1109/TIFS.2007.916006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CayreB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CelikLKV08,
  author       = {Mehmet Utku Celik and
                  Aweke N. Lemma and
                  Stefan Katzenbeisser and
                  Michiel van der Veen},
  title        = {Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum
                  Watermarks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {475--487},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926988},
  doi          = {10.1109/TIFS.2008.926988},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CelikLKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CeliktutanSA08,
  author       = {Oya {\c{C}}eliktutan and
                  B{\"{u}}lent Sankur and
                  Ismail Avcibas},
  title        = {Blind Identification of Source Cell-Phone Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {553--566},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926993},
  doi          = {10.1109/TIFS.2008.926993},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CeliktutanSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenFGL08,
  author       = {Mo Chen and
                  Jessica J. Fridrich and
                  Miroslav Goljan and
                  Jan Luk{\'{a}}s},
  title        = {Determining Image Origin and Integrity Using Sensor Noise},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {74--90},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916285},
  doi          = {10.1109/TIFS.2007.916285},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenFGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Coria-MendozaPNW08,
  author       = {Lino Coria{-}Mendoza and
                  Mark R. Pickering and
                  Panos Nasiopoulos and
                  Rabab K. Ward},
  title        = {A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet
                  Transform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {466--474},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.927421},
  doi          = {10.1109/TIFS.2008.927421},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Coria-MendozaPNW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CoumouS08,
  author       = {David J. Coumou and
                  Gaurav Sharma},
  title        = {Insertion, Deletion Codes With Feature-Based Embedding: {A} New Paradigm
                  for Watermark Synchronization With Applications to Speech Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {153--165},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.920728},
  doi          = {10.1109/TIFS.2008.920728},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CoumouS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DasNZMC08,
  author       = {Abhishek Das and
                  David Nguyen and
                  Joseph Zambreno and
                  Gokhan Memik and
                  Alok N. Choudhary},
  title        = {An FPGA-Based Network Intrusion Detection Architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {118--132},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916288},
  doi          = {10.1109/TIFS.2007.916288},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DasNZMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaugmanD08,
  author       = {John Daugman and
                  Cathryn Downing},
  title        = {Effect of Severe Image Compression on Iris Recognition Performance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {52--61},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916009},
  doi          = {10.1109/TIFS.2007.916009},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaugmanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DirikSM08,
  author       = {Ahmet Emir Dirik and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Digital Single Lens Reflex Camera Identification From Traces of Sensor
                  Dust},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {539--552},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926987},
  doi          = {10.1109/TIFS.2008.926987},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DirikSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EngelPU08,
  author       = {Dominik Engel and
                  Elias Pschernig and
                  Andreas Uhl},
  title        = {An Analysis of Lightweight Encryption Schemes for Fingerprint Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {173--182},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922058},
  doi          = {10.1109/TIFS.2008.922058},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EngelPU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Estevez-TapiadorCAR08,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Almudena Alcaide and
                  Arturo Ribagorda},
  title        = {On the Distinguishability of Distance-Bounded Permutations in Ordered
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {166--172},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.920724},
  doi          = {10.1109/TIFS.2008.920724},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Estevez-TapiadorCAR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FaltemierBF08,
  author       = {Timothy C. Faltemier and
                  Kevin W. Bowyer and
                  Patrick J. Flynn},
  title        = {A Region Ensemble for 3-D Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {62--73},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916287},
  doi          = {10.1109/TIFS.2007.916287},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FaltemierBF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FavaBY08,
  author       = {Daniel S. Fava and
                  Stephen R. Byers and
                  Shanchieh Jay Yang},
  title        = {Projecting Cyberattacks Through Variable-Length Markov Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {359--369},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924605},
  doi          = {10.1109/TIFS.2008.924605},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FavaBY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FronthalerKBFAOG08,
  author       = {Hartwig Fronthaler and
                  Klaus Kollreider and
                  Josef Big{\"{u}}n and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Fernando Alonso{-}Fernandez and
                  Javier Ortega{-}Garcia and
                  Joaquin Gonzalez{-}Rodriguez},
  title        = {Fingerprint Image-Quality Estimation and its Application to Multialgorithm
                  Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {331--338},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.920725},
  doi          = {10.1109/TIFS.2008.920725},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FronthalerKBFAOG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuYH08,
  author       = {Yun Fu and
                  Shuicheng Yan and
                  Thomas S. Huang},
  title        = {Classification and Feature Extraction by Simplexization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {91--100},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916280},
  doi          = {10.1109/TIFS.2007.916280},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuYH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaoDZ08,
  author       = {Feng Hao and
                  John Daugman and
                  Piotr Zielinski},
  title        = {A Fast Search Algorithm for a Large Fuzzy Database},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {203--212},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.920726},
  doi          = {10.1109/TIFS.2008.920726},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaoDZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeT08,
  author       = {Ting He and
                  Lang Tong},
  title        = {Distributed Detection of Information Flows},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {390--403},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.928537},
  doi          = {10.1109/TIFS.2008.928537},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HoZSM08,
  author       = {Anthony Tung Shuen Ho and
                  Xunzhan Zhu and
                  Jun Shen and
                  Pina Marziliano},
  title        = {Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {567--569},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926994},
  doi          = {10.1109/TIFS.2008.926994},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HoZSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KatzenbeisserLCVM08,
  author       = {Stefan Katzenbeisser and
                  Aweke N. Lemma and
                  Mehmet Utku Celik and
                  Michiel van der Veen and
                  Martijn Maas},
  title        = {A Buyer-Seller Watermarking Protocol Based on Secure Embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {783--786},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002939},
  doi          = {10.1109/TIFS.2008.2002939},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KatzenbeisserLCVM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimSSNC08,
  author       = {Hyoung{-}Joong Kim and
                  Vasiliy Sachnev and
                  Yun{-}Qing Shi and
                  Jeho Nam and
                  Hyon{-}Gon Choo},
  title        = {A Novel Difference Expansion Transform for Reversible Data Embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {456--465},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924600},
  doi          = {10.1109/TIFS.2008.924600},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimSSNC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimXNP08,
  author       = {E{-}yong Kim and
                  Li Xiao and
                  Klara Nahrstedt and
                  Kunsoo Park},
  title        = {Secure Interdomain Routing Registry},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {304--316},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922050},
  doi          = {10.1109/TIFS.2008.922050},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimXNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KirchnerB08,
  author       = {Matthias Kirchner and
                  Rainer B{\"{o}}hme},
  title        = {Hiding Traces of Resampling in Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {582--592},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2008214},
  doi          = {10.1109/TIFS.2008.2008214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KirchnerB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KocalYA08,
  author       = {Osman Hilmi Ko{\c{c}}al and
                  Emrah Y{\"{u}}r{\"{u}}kl{\"{u}} and
                  Ismail Avcibas},
  title        = {Chaotic-Type Features for Speech Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {651--661},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2004289},
  doi          = {10.1109/TIFS.2008.2004289},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KocalYA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeH08,
  author       = {Tung Le and
                  Christoforos N. Hadjicostis},
  title        = {Graphical Inference for Multiple Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {370--380},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.928536},
  doi          = {10.1109/TIFS.2008.928536},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeCCK08,
  author       = {Sanghoon Lee and
                  Heeseung Choi and
                  Kyoungtaek Choi and
                  Jaihie Kim},
  title        = {Fingerprint-Quality Index Using Gradient Components},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {792--800},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007245},
  doi          = {10.1109/TIFS.2008.2007245},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeCCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Liu08,
  author       = {Chengjun Liu},
  title        = {Learning the Uncorrelated, Independent, and Discriminating Color Spaces
                  for Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {213--222},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.923824},
  doi          = {10.1109/TIFS.2008.923824},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Liu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuhK08,
  author       = {William Luh and
                  Deepa Kundur},
  title        = {Distributed Secret Sharing for Discrete Memoryless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {1--7},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.927422},
  doi          = {10.1109/TIFS.2008.927422},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuhK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MahdianS08,
  author       = {Babak Mahdian and
                  Stanislav Saic},
  title        = {Blind Authentication Using Periodic Properties of Interpolation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {529--538},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2004.924603},
  doi          = {10.1109/TIFS.2004.924603},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MahdianS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MahoorA08,
  author       = {Mohammad H. Mahoor and
                  Mohamed Abdel{-}Mottaleb},
  title        = {A Multimodal Approach for Face Modeling and Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {431--440},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924597},
  doi          = {10.1109/TIFS.2008.924597},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MahoorA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MairgiotisGY08,
  author       = {Antonis Mairgiotis and
                  Nikolas P. Galatsanos and
                  Yongyi Yang},
  title        = {New Additive Watermark Detectors Based On {A} Hierarchical Spatially
                  Adaptive Image Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {29--37},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916290},
  doi          = {10.1109/TIFS.2007.916290},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MairgiotisGY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohantySKP08,
  author       = {Pranab K. Mohanty and
                  Sudeep Sarkar and
                  Rangachar Kasturi and
                  P. Jonathon Phillips},
  title        = {Subspace Approximation of Face Recognition Algorithms: An Empirical
                  Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {734--748},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007242},
  doi          = {10.1109/TIFS.2008.2007242},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohantySKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MpiperisMS08,
  author       = {Iordanis Mpiperis and
                  Sotiris Malassiotis and
                  Michael G. Strintzis},
  title        = {Bilinear Models for 3-D Face and Facial Expression Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {498--511},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924598},
  doi          = {10.1109/TIFS.2008.924598},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MpiperisMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NassarALA08,
  author       = {Diaa Eldin M. Nassar and
                  Ayman Abaza and
                  Xin Li and
                  Hany H. Ammar},
  title        = {Automatic Construction of Dental Charts for Postmortem Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {234--246},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922452},
  doi          = {10.1109/TIFS.2008.922452},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NassarALA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NomirA08,
  author       = {Omaima Nomir and
                  Mohamed Abdel{-}Mottaleb},
  title        = {Fusion of Matching Algorithms for Human Identification Using Dental
                  X-Ray Radiographs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {223--233},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.919343},
  doi          = {10.1109/TIFS.2008.919343},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NomirA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NoorkamiM08,
  author       = {Maneli Noorkami and
                  Russell M. Mersereau},
  title        = {Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate
                  Increase},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {441--455},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.923825},
  doi          = {10.1109/TIFS.2008.923825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NoorkamiM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OliveiraB08,
  author       = {Paulo F. Oliveira and
                  Jo{\~{a}}o Barros},
  title        = {A Network Coding Approach to Secret Key Distribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {414--423},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.928538},
  doi          = {10.1109/TIFS.2008.928538},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OliveiraB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ParikhC08,
  author       = {Devi Parikh and
                  Tsuhan Chen},
  title        = {Data Fusion and Cost Minimization for Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {381--389},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.928539},
  doi          = {10.1109/TIFS.2008.928539},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ParikhC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Perez-FreireP08,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Security of Lattice-Based Data Hiding Against the Watermarked-Only
                  Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {593--610},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002938},
  doi          = {10.1109/TIFS.2008.2002938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Perez-FreireP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Perez-GonzalezM08,
  author       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Carlos Mosquera},
  title        = {Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {137--152},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922057},
  doi          = {10.1109/TIFS.2008.922057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Perez-GonzalezM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PevnyF08,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Jessica J. Fridrich},
  title        = {Detection of Double-Compression in {JPEG} Images for Applications
                  in Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {247--258},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922456},
  doi          = {10.1109/TIFS.2008.922456},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PevnyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PevnyF08a,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Jessica J. Fridrich},
  title        = {Multiclass Detector of Current Steganographic Methods for {JPEG} Format},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {635--650},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002936},
  doi          = {10.1109/TIFS.2008.2002936},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PevnyF08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RabaouiDRE08,
  author       = {Asma Rabaoui and
                  Manuel Davy and
                  St{\'{e}}phane Rossignol and
                  Zied Ellouze},
  title        = {Using One-Class SVMs and Wavelets for Audio Surveillance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {763--775},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2008216},
  doi          = {10.1109/TIFS.2008.2008216},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RabaouiDRE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Regalia08,
  author       = {Phillip A. Regalia},
  title        = {Cryptographic Secrecy of Steganographic Matrix Embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {786--791},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002940},
  doi          = {10.1109/TIFS.2008.2002940},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Regalia08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Schaathun08,
  author       = {Hans Georg Schaathun},
  title        = {On the Assumption of Equal Contributions in Fingerprinting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {569--572},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926991},
  doi          = {10.1109/TIFS.2008.926991},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Schaathun08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchmidN08,
  author       = {Natalia A. Schmid and
                  Francesco Nicolo},
  title        = {On Empirical Recognition Capacity of Biometric Systems Under Global
                  {PCA} and {ICA} Encoding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {512--528},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.924607},
  doi          = {10.1109/TIFS.2008.924607},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SchmidN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchonbergDYR08,
  author       = {Daniel Schonberg and
                  Stark C. Draper and
                  Chuohao Yeo and
                  Kannan Ramchandran},
  title        = {Toward Compression of Encrypted Images and Video Sequences},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {749--762},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007244},
  doi          = {10.1109/TIFS.2008.2007244},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SchonbergDYR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShengHFD08,
  author       = {Weiguo Sheng and
                  Gareth Howells and
                  Michael C. Fairhurst and
                  Farzin Deravi},
  title        = {Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {183--191},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922056},
  doi          = {10.1109/TIFS.2008.922056},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShengHFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SwaminathanWL08,
  author       = {Ashwin Swaminathan and
                  Min Wu and
                  K. J. Ray Liu},
  title        = {Digital Image Forensics via Intrinsic Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {101--117},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916010},
  doi          = {10.1109/TIFS.2007.916010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SwaminathanWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ToledoW08,
  author       = {Alberto L{\'{o}}pez Toledo and
                  Xiaodong Wang},
  title        = {Robust Detection of {MAC} Layer Denial-of-Service Attacks in {CSMA/CA}
                  Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {347--358},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926098},
  doi          = {10.1109/TIFS.2008.926098},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ToledoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TsuiZA08,
  author       = {Tsz Kin Tsui and
                  Xiao{-}Ping (Steven) Zhang and
                  Dimitrios Androutsos},
  title        = {Color Image Watermarking Using Multidimensional Fourier Transforms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {16--28},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916275},
  doi          = {10.1109/TIFS.2007.916275},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TsuiZA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TulyakovG08,
  author       = {Sergey Tulyakov and
                  Venu Govindaraju},
  title        = {Use of Identification Trial Statistics for the Combination of Biometric
                  Matchers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {719--733},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2004287},
  doi          = {10.1109/TIFS.2008.2004287},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TulyakovG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangG08,
  author       = {Tairan Wang and
                  Georgios B. Giannakis},
  title        = {Mutual Information Jammer-Relay Games},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {290--303},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.920730},
  doi          = {10.1109/TIFS.2008.920730},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLDB08,
  author       = {Kai Wang and
                  Guillaume Lavou{\'{e}} and
                  Florence Denis and
                  Atilla Baskurt},
  title        = {Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {620--634},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007229},
  doi          = {10.1109/TIFS.2008.2007229},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanWTLH08,
  author       = {Shuicheng Yan and
                  Huan Wang and
                  Xiaoou Tang and
                  Jianzhuang Liu and
                  Thomas S. Huang},
  title        = {Regression From Uncertain Labels and Its Applications to Soft Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {698--708},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2006585},
  doi          = {10.1109/TIFS.2008.2006585},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanWTLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLLL08,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Bin Liu},
  title        = {Steganalysis Frameworks of Embedding in Multiple Least-Significant
                  Bits},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {662--672},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007240},
  doi          = {10.1109/TIFS.2008.2007240},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWWS08,
  author       = {Cheng{-}Hsing Yang and
                  Chi{-}Yao Weng and
                  Shiuh{-}Jeng Wang and
                  Hung{-}Min Sun},
  title        = {Adaptive Data Hiding in Edge Areas of Images With Spatial {LSB} Domain
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {3},
  pages        = {488--497},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.926097},
  doi          = {10.1109/TIFS.2008.926097},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangWWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuBS08,
  author       = {Paul L. Yu and
                  John S. Baras and
                  Brian M. Sadler},
  title        = {Physical-Layer Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {1},
  pages        = {38--51},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2007.916273},
  doi          = {10.1109/TIFS.2007.916273},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuL08,
  author       = {Wei Yu and
                  K. J. Ray Liu},
  title        = {Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise
                  and Imperfect Monitoring: {A} Game-Theoretic Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {317--330},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.922453},
  doi          = {10.1109/TIFS.2008.922453},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCQC08,
  author       = {Chune Zhang and
                  L. L. Cheng and
                  Zhengding Qiu and
                  Lee{-}Ming Cheng},
  title        = {Multipurpose Watermarking Based on Multiscale Curvelet Transform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {611--619},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2004288},
  doi          = {10.1109/TIFS.2008.2004288},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCQC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangGL08,
  author       = {Xiaozheng Zhang and
                  Yongsheng Gao and
                  Maylor K. H. Leung},
  title        = {Recognizing Rotated Faces From Frontal and Side Views: An Approach
                  Toward Effective Use of Mugshot Databases},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {684--697},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2004286},
  doi          = {10.1109/TIFS.2008.2004286},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLT08,
  author       = {Yu Zhang and
                  Zang Li and
                  Wade Trappe},
  title        = {Evaluation of Localization Attacks on Power-Modulated Challenge-Response
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {2},
  pages        = {259--272},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.919121},
  doi          = {10.1109/TIFS.2008.919121},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics