Search dblp for Publications

export results for "toc:db/conf/wifs/wifs2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wifs/BahramiKF13,
  author       = {Khosro Bahrami and
                  Alex C. Kot and
                  Jiayuan Fan},
  title        = {Splicing detection in out-of-focus blurred images},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707809},
  doi          = {10.1109/WIFS.2013.6707809},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BahramiKF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaladoH13,
  author       = {F{\'{e}}lix Balado and
                  David Haughton},
  title        = {Optimum perfect steganography of memoryless sources as a rate-distortion
                  problem},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {174--179},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707814},
  doi          = {10.1109/WIFS.2013.6707814},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BaladoH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarasC13,
  author       = {Cl{\'{e}}o Baras and
                  Fran{\c{c}}ois Cayre},
  title        = {Towards a realistic channel model for security analysis of authentication
                  using graphical codes},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {115--119},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707804},
  doi          = {10.1109/WIFS.2013.6707804},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarasC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniT13,
  author       = {Mauro Barni and
                  Benedetta Tondi},
  title        = {Multiple-observation hypothesis testing under adversarial conditions},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707800},
  doi          = {10.1109/WIFS.2013.6707800},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BestaginiZAPST13,
  author       = {Paolo Bestagini and
                  Massimiliano Zanoni and
                  Luca Albonico and
                  Andrea Paganini and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Feature-based classification for audio bootlegs detection},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {126--131},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707806},
  doi          = {10.1109/WIFS.2013.6707806},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BestaginiZAPST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiPP13,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Near optimal detection of quantized signals and application to {JPEG}
                  forensics},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {168--173},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707813},
  doi          = {10.1109/WIFS.2013.6707813},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ConotterCP13,
  author       = {Valentina Conotter and
                  Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Joint detection of full-frame linear filtering and {JPEG} compression
                  in digital images},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707811},
  doi          = {10.1109/WIFS.2013.6707811},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ConotterCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DeCannR13,
  author       = {Brian DeCann and
                  Arun Ross},
  title        = {De-duplication errors in a biometric system: An investigative study},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707792},
  doi          = {10.1109/WIFS.2013.6707792},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DeCannR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ElicesP13,
  author       = {Juan A. Elices and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {The flow fingerprinting game},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707801},
  doi          = {10.1109/WIFS.2013.6707801},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ElicesP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Enzinger13,
  author       = {Ewald Enzinger},
  title        = {Testing the validity and reliability of forensic voice comparison
                  based on reassigned time-frequency representations of Chinese /iau/},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707787},
  doi          = {10.1109/WIFS.2013.6707787},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Enzinger13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving recommender systems in dynamic environments},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707795},
  doi          = {10.1109/WIFS.2013.6707795},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FontaniATB13,
  author       = {Marco Fontani and
                  Enrique Argones{-}R{\'{u}}a and
                  Carmela Troncoso and
                  Mauro Barni},
  title        = {The watchful forensic analyst: Multi-clue information fusion with
                  background knowledge},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {120--125},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707805},
  doi          = {10.1109/WIFS.2013.6707805},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FontaniATB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronJAM13,
  author       = {Teddy Furon and
                  Herv{\'{e}} J{\'{e}}gou and
                  Laurent Amsaleg and
                  Benjamin Mathon},
  title        = {Fast and secure similarity search in high dimensional space},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707797},
  doi          = {10.1109/WIFS.2013.6707797},
  timestamp    = {Wed, 24 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronJAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Hajj-AhmadG013,
  author       = {Adi Hajj{-}Ahmad and
                  Ravi Garg and
                  Min Wu},
  title        = {{ENF} based location classification of sensor recordings},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {138--143},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707808},
  doi          = {10.1109/WIFS.2013.6707808},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Hajj-AhmadG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangEE13,
  author       = {Chee Cheun Huang and
                  Julien Epps and
                  Ewald Enzinger},
  title        = {Separate {MAP} adaptation of {GMM} parameters for forensic voice comparison
                  on limited data},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707785},
  doi          = {10.1109/WIFS.2013.6707785},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangEE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Laarhoven13,
  author       = {Thijs Laarhoven},
  title        = {Dynamic traitor tracing schemes, revisited},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707817},
  doi          = {10.1109/WIFS.2013.6707817},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Laarhoven13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LabatiSS13,
  author       = {Ruggero Donida Labati and
                  Roberto Sassi and
                  Fabio Scotti},
  title        = {{ECG} biometric recognition: Permanence analysis of {QRS} signals
                  for 24 hours continuous authentication},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707790},
  doi          = {10.1109/WIFS.2013.6707790},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LabatiSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LazzerettiPB13,
  author       = {Riccardo Lazzeretti and
                  Tommaso Pignata and
                  Mauro Barni},
  title        = {Secure Evaluation of Private Functions through Piecewise Linear Approximation},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707794},
  doi          = {10.1109/WIFS.2013.6707794},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LazzerettiPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiK13,
  author       = {Xiaojie Li and
                  Adams Wai{-}Kin Kong},
  title        = {Restoring blood vessel patterns from {JPEG} compressed skin images
                  for forensic analysis},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707788},
  doi          = {10.1109/WIFS.2013.6707788},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LinZM13,
  author       = {Dajun Lin and
                  Huicheng Zheng and
                  Donghong Ma},
  title        = {Robust visual tracking using local salient coding and {PCA} subspace
                  modeling},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707789},
  doi          = {10.1109/WIFS.2013.6707789},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LinZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuSLSL13,
  author       = {Xiaocui Liu and
                  Jiande Sun and
                  Ju Liu},
  title        = {Shot-based temporally respective frame generation algorithm for video
                  hashing},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {109--114},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707803},
  doi          = {10.1109/WIFS.2013.6707803},
  timestamp    = {Thu, 22 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuSLSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MelloniBCBTT13,
  author       = {Andrea Melloni and
                  Paolo Bestagini and
                  Andrea Costanzo and
                  Mauro Barni and
                  Marco Tagliasacchi and
                  Stefano Tubaro},
  title        = {Attacking image classification based on bag-of-visual-words},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707802},
  doi          = {10.1109/WIFS.2013.6707802},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MelloniBCBTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Moreira-PerezCDB13,
  author       = {Juan Jose Moreira{-}Perez and
                  Bertrand Chupeau and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  S{\'{e}}verine Baudry},
  title        = {Exploring color information to characterize camcorder piracy},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {132--137},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707807},
  doi          = {10.1109/WIFS.2013.6707807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Moreira-PerezCDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RattaniPR13,
  author       = {Ajita Rattani and
                  Norman Poh and
                  Arun Ross},
  title        = {A Bayesian approach for modeling sensor influence on quality, liveness
                  and match score values in fingerprint verification},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707791},
  doi          = {10.1109/WIFS.2013.6707791},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RattaniPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Rozier13,
  author       = {Eric Rozier},
  title        = {The perils of cross-silo deduplication: Trading user security for
                  provider storage efficiency},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707799},
  doi          = {10.1109/WIFS.2013.6707799},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Rozier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricOD13,
  author       = {Boris Skoric and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {The holey grail {A} special score function for non-binary traitor
                  tracing},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707815},
  doi          = {10.1109/WIFS.2013.6707815},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SkoricOD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/StammCL13,
  author       = {Matthew C. Stamm and
                  Xiaoyu Chu and
                  K. J. Ray Liu},
  title        = {Forensically determining the order of signal processing operations},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {162--167},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707812},
  doi          = {10.1109/WIFS.2013.6707812},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/StammCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Terelius13,
  author       = {Bj{\"{o}}rn Terelius},
  title        = {Towards transferable watermarks in buyer-seller watermarking protocols},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {197--202},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707818},
  doi          = {10.1109/WIFS.2013.6707818},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Terelius13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Vazquez-PadinCP13,
  author       = {David Vazquez{-}Padin and
                  Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Set-membership identification of resampled signals},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707810},
  doi          = {10.1109/WIFS.2013.6707810},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Vazquez-PadinCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangN13,
  author       = {Junxiang Wang and
                  Jiangqun Ni},
  title        = {A {GA} optimization approach to {HS} based multiple reversible data
                  hiding},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {203--208},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707819},
  doi          = {10.1109/WIFS.2013.6707819},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangYC13,
  author       = {Yi Wang and
                  Pong C. Yuen and
                  Yiu{-}ming Cheung},
  title        = {Hashing fingerprints for identity de-duplication},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707793},
  doi          = {10.1109/WIFS.2013.6707793},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangZT13,
  author       = {Qia Wang and
                  Wenjun Zeng and
                  Jun Tian},
  title        = {Integrated secure watermark detection and privacy preserving storage
                  in the compressive sensing domain},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707796},
  doi          = {10.1109/WIFS.2013.6707796},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZeilemakerEPP13,
  author       = {Niels Zeilemaker and
                  Zekeriya Erkin and
                  Paolo Palmieri and
                  Johan A. Pouwelse},
  title        = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707798},
  doi          = {10.1109/WIFS.2013.6707798},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZeilemakerEPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhangW13,
  author       = {Xiaoqiang Zhang and
                  Z. Jane Wang},
  title        = {Correlation-and-bit-aware multiplicative spread spectrum embedding
                  for data hiding},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {186--190},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707816},
  doi          = {10.1109/WIFS.2013.6707816},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhaoED13,
  author       = {Xuran Zhao and
                  Nicholas W. D. Evans and
                  Jean{-}Luc Dugelay},
  title        = {Unsupervised multi-view dimensionality reduction with application
                  to audio-visual speaker retrieval},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707786},
  doi          = {10.1109/WIFS.2013.6707786},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhaoED13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2013,
  title        = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6693295/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics