Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wifs/wifs2013.bht:"
@inproceedings{DBLP:conf/wifs/BahramiKF13, author = {Khosro Bahrami and Alex C. Kot and Jiayuan Fan}, title = {Splicing detection in out-of-focus blurred images}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {144--149}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707809}, doi = {10.1109/WIFS.2013.6707809}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BahramiKF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BaladoH13, author = {F{\'{e}}lix Balado and David Haughton}, title = {Optimum perfect steganography of memoryless sources as a rate-distortion problem}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {174--179}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707814}, doi = {10.1109/WIFS.2013.6707814}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BaladoH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BarasC13, author = {Cl{\'{e}}o Baras and Fran{\c{c}}ois Cayre}, title = {Towards a realistic channel model for security analysis of authentication using graphical codes}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {115--119}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707804}, doi = {10.1109/WIFS.2013.6707804}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BarasC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BarniT13, author = {Mauro Barni and Benedetta Tondi}, title = {Multiple-observation hypothesis testing under adversarial conditions}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {91--96}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707800}, doi = {10.1109/WIFS.2013.6707800}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BarniT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BestaginiZAPST13, author = {Paolo Bestagini and Massimiliano Zanoni and Luca Albonico and Andrea Paganini and Augusto Sarti and Stefano Tubaro}, title = {Feature-based classification for audio bootlegs detection}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {126--131}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707806}, doi = {10.1109/WIFS.2013.6707806}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BestaginiZAPST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BianchiPP13, author = {Tiziano Bianchi and Alessandro Piva and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Near optimal detection of quantized signals and application to {JPEG} forensics}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {168--173}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707813}, doi = {10.1109/WIFS.2013.6707813}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BianchiPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ConotterCP13, author = {Valentina Conotter and Pedro Comesa{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Joint detection of full-frame linear filtering and {JPEG} compression in digital images}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {156--161}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707811}, doi = {10.1109/WIFS.2013.6707811}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ConotterCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DeCannR13, author = {Brian DeCann and Arun Ross}, title = {De-duplication errors in a biometric system: An investigative study}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {43--48}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707792}, doi = {10.1109/WIFS.2013.6707792}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/DeCannR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ElicesP13, author = {Juan A. Elices and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {The flow fingerprinting game}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {97--102}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707801}, doi = {10.1109/WIFS.2013.6707801}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ElicesP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Enzinger13, author = {Ewald Enzinger}, title = {Testing the validity and reliability of forensic voice comparison based on reassigned time-frequency representations of Chinese /iau/}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {13--18}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707787}, doi = {10.1109/WIFS.2013.6707787}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/Enzinger13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ErkinVL13, author = {Zekeriya Erkin and Thijs Veugen and Reginald L. Lagendijk}, title = {Privacy-preserving recommender systems in dynamic environments}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {61--66}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707795}, doi = {10.1109/WIFS.2013.6707795}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ErkinVL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FontaniATB13, author = {Marco Fontani and Enrique Argones{-}R{\'{u}}a and Carmela Troncoso and Mauro Barni}, title = {The watchful forensic analyst: Multi-clue information fusion with background knowledge}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {120--125}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707805}, doi = {10.1109/WIFS.2013.6707805}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/FontaniATB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FuronJAM13, author = {Teddy Furon and Herv{\'{e}} J{\'{e}}gou and Laurent Amsaleg and Benjamin Mathon}, title = {Fast and secure similarity search in high dimensional space}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {73--78}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707797}, doi = {10.1109/WIFS.2013.6707797}, timestamp = {Wed, 24 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FuronJAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Hajj-AhmadG013, author = {Adi Hajj{-}Ahmad and Ravi Garg and Min Wu}, title = {{ENF} based location classification of sensor recordings}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {138--143}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707808}, doi = {10.1109/WIFS.2013.6707808}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Hajj-AhmadG013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/HuangEE13, author = {Chee Cheun Huang and Julien Epps and Ewald Enzinger}, title = {Separate {MAP} adaptation of {GMM} parameters for forensic voice comparison on limited data}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707785}, doi = {10.1109/WIFS.2013.6707785}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/HuangEE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Laarhoven13, author = {Thijs Laarhoven}, title = {Dynamic traitor tracing schemes, revisited}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {191--196}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707817}, doi = {10.1109/WIFS.2013.6707817}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Laarhoven13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LabatiSS13, author = {Ruggero Donida Labati and Roberto Sassi and Fabio Scotti}, title = {{ECG} biometric recognition: Permanence analysis of {QRS} signals for 24 hours continuous authentication}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {31--36}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707790}, doi = {10.1109/WIFS.2013.6707790}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/LabatiSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LazzerettiPB13, author = {Riccardo Lazzeretti and Tommaso Pignata and Mauro Barni}, title = {Secure Evaluation of Private Functions through Piecewise Linear Approximation}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {55--60}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707794}, doi = {10.1109/WIFS.2013.6707794}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LazzerettiPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LiK13, author = {Xiaojie Li and Adams Wai{-}Kin Kong}, title = {Restoring blood vessel patterns from {JPEG} compressed skin images for forensic analysis}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {19--24}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707788}, doi = {10.1109/WIFS.2013.6707788}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LinZM13, author = {Dajun Lin and Huicheng Zheng and Donghong Ma}, title = {Robust visual tracking using local salient coding and {PCA} subspace modeling}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {25--30}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707789}, doi = {10.1109/WIFS.2013.6707789}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LinZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LiuSLSL13, author = {Xiaocui Liu and Jiande Sun and Ju Liu}, title = {Shot-based temporally respective frame generation algorithm for video hashing}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {109--114}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707803}, doi = {10.1109/WIFS.2013.6707803}, timestamp = {Thu, 22 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LiuSLSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MelloniBCBTT13, author = {Andrea Melloni and Paolo Bestagini and Andrea Costanzo and Mauro Barni and Marco Tagliasacchi and Stefano Tubaro}, title = {Attacking image classification based on bag-of-visual-words}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {103--108}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707802}, doi = {10.1109/WIFS.2013.6707802}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MelloniBCBTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Moreira-PerezCDB13, author = {Juan Jose Moreira{-}Perez and Bertrand Chupeau and Gwena{\"{e}}l J. Do{\"{e}}rr and S{\'{e}}verine Baudry}, title = {Exploring color information to characterize camcorder piracy}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {132--137}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707807}, doi = {10.1109/WIFS.2013.6707807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Moreira-PerezCDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/RattaniPR13, author = {Ajita Rattani and Norman Poh and Arun Ross}, title = {A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {37--42}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707791}, doi = {10.1109/WIFS.2013.6707791}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/RattaniPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Rozier13, author = {Eric Rozier}, title = {The perils of cross-silo deduplication: Trading user security for provider storage efficiency}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {85--90}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707799}, doi = {10.1109/WIFS.2013.6707799}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Rozier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SkoricOD13, author = {Boris Skoric and Jan{-}Jaap Oosterwijk and Jeroen Doumen}, title = {The holey grail {A} special score function for non-binary traitor tracing}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {180--185}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707815}, doi = {10.1109/WIFS.2013.6707815}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SkoricOD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/StammCL13, author = {Matthew C. Stamm and Xiaoyu Chu and K. J. Ray Liu}, title = {Forensically determining the order of signal processing operations}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {162--167}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707812}, doi = {10.1109/WIFS.2013.6707812}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/StammCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Terelius13, author = {Bj{\"{o}}rn Terelius}, title = {Towards transferable watermarks in buyer-seller watermarking protocols}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {197--202}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707818}, doi = {10.1109/WIFS.2013.6707818}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Terelius13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Vazquez-PadinCP13, author = {David Vazquez{-}Padin and Pedro Comesa{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Set-membership identification of resampled signals}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {150--155}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707810}, doi = {10.1109/WIFS.2013.6707810}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Vazquez-PadinCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/WangN13, author = {Junxiang Wang and Jiangqun Ni}, title = {A {GA} optimization approach to {HS} based multiple reversible data hiding}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {203--208}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707819}, doi = {10.1109/WIFS.2013.6707819}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/WangN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/WangYC13, author = {Yi Wang and Pong C. Yuen and Yiu{-}ming Cheung}, title = {Hashing fingerprints for identity de-duplication}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {49--54}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707793}, doi = {10.1109/WIFS.2013.6707793}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/WangYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/WangZT13, author = {Qia Wang and Wenjun Zeng and Jun Tian}, title = {Integrated secure watermark detection and privacy preserving storage in the compressive sensing domain}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {67--72}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707796}, doi = {10.1109/WIFS.2013.6707796}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/WangZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ZeilemakerEPP13, author = {Niels Zeilemaker and Zekeriya Erkin and Paolo Palmieri and Johan A. Pouwelse}, title = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {79--84}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707798}, doi = {10.1109/WIFS.2013.6707798}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ZeilemakerEPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ZhangW13, author = {Xiaoqiang Zhang and Z. Jane Wang}, title = {Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {186--190}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707816}, doi = {10.1109/WIFS.2013.6707816}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ZhangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ZhaoED13, author = {Xuran Zhao and Nicholas W. D. Evans and Jean{-}Luc Dugelay}, title = {Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrieval}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {7--12}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707786}, doi = {10.1109/WIFS.2013.6707786}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/ZhaoED13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wifs/2013, title = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6693295/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.