Search dblp for Publications

export results for "stream:conf/wifs:"

 download as .bib file

@inproceedings{DBLP:conf/wifs/0001LB23,
  author       = {Martin Benes and
                  Benedikt Lorch and
                  Rainer B{\"{o}}hme},
  title        = {{JPEG} Steganalysis Using Leaked Cover Thumbnails},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374587},
  doi          = {10.1109/WIFS58808.2023.10374587},
  timestamp    = {Tue, 09 Jan 2024 17:57:28 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/0001LB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/0007M23,
  author       = {Awais Khan and
                  Khalid Mahmood Malik},
  title        = {Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake
                  Detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374968},
  doi          = {10.1109/WIFS58808.2023.10374968},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/0007M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AbecidanIBBP23,
  author       = {Rony Abecidan and
                  Vincent Itier and
                  J{\'{e}}r{\'{e}}mie Boulanger and
                  Patrick Bas and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Leveraging Data Geometry to Mitigate {CSM} in Steganalysis},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374944},
  doi          = {10.1109/WIFS58808.2023.10374944},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AbecidanIBBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AliKRM23,
  author       = {Hashim Ali and
                  Dhimant Khuttan and
                  Rafi Ud Daula Refat and
                  Hafiz Malik},
  title        = {Protecting Voice-Controlled Devices Against {LASER} Injection Attacks},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374658},
  doi          = {10.1109/WIFS58808.2023.10374658},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AliKRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Alonso-Fernandez23,
  author       = {Fernando Alonso{-}Fernandez and
                  Kevin Hernandez{-}Diaz and
                  Jose Maria Buades Rubio and
                  Prayag Tiwari and
                  Josef Big{\"{u}}n},
  title        = {An Explainable Model-Agnostic Algorithm for CNN-Based Biometrics Verification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374866},
  doi          = {10.1109/WIFS58808.2023.10374866},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Alonso-Fernandez23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BakirtasE23,
  author       = {Serhat Bakirtas and
                  Elza Erkip},
  title        = {Distribution-Agnostic Database De-Anonymization Under Synchronization
                  Errors},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374831},
  doi          = {10.1109/WIFS58808.2023.10374831},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BakirtasE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarringtonBKF23,
  author       = {Sarah Barrington and
                  Romit Barua and
                  Gautham Koorma and
                  Hany Farid},
  title        = {Single and Multi-Speaker Cloned Voice Detection: From Perceptual to
                  Learned Features},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374911},
  doi          = {10.1109/WIFS58808.2023.10374911},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BarringtonBKF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauspiessZCRK023,
  author       = {Pia Bauspie{\ss} and
                  Chiara{-}Marie Zok and
                  Anamaria Costache and
                  Christian Rathgeb and
                  Jascha Kolberg and
                  Christoph Busch},
  title        = {{MT-PRO:} Multibiometric Template Protection Based On Homomorphic
                  Transciphering},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374697},
  doi          = {10.1109/WIFS58808.2023.10374697},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BauspiessZCRK023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BelousovTKV23,
  author       = {Yury Belousov and
                  Olga Taran and
                  Vitaliy Kinakh and
                  Slava Voloshynovskiy},
  title        = {Stochastic Digital Twin for Copy Detection Patterns},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10375049},
  doi          = {10.1109/WIFS58808.2023.10375049},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BelousovTKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CannasBBTD23,
  author       = {Edoardo Daniele Cannas and
                  Sriram Baireddy and
                  Paolo Bestagini and
                  Stefano Tubaro and
                  Edward J. Delp},
  title        = {Enhancement Strategies For Copy-Paste Generation {\&} Localization
                  in {RGB} Satellite Imagery},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374637},
  doi          = {10.1109/WIFS58808.2023.10374637},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CannasBBTD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CuccovilloGA23,
  author       = {Luca Cuccovillo and
                  Milica Gerhardt and
                  Patrick Aichroth},
  title        = {Audio Spectrogram Transformer for Synthetic Speech Detection via Speech
                  Formant Analysis},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374615},
  doi          = {10.1109/WIFS58808.2023.10374615},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CuccovilloGA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DaleSBR23,
  author       = {Melissa R. Dale and
                  Elliot Singer and
                  Bengt J. Borgstr{\"{o}}m and
                  Arun Ross},
  title        = {To Impute or Not: Recommendations for Multibiometric Fusion},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374772},
  doi          = {10.1109/WIFS58808.2023.10374772},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DaleSBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiXTB23,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Robust Retraining-free {GAN} Fingerprinting via Personalized Normalization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374953},
  doi          = {10.1109/WIFS58808.2023.10374953},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiXTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FernandezCTCF23,
  author       = {Pierre Fernandez and
                  Antoine Chaffin and
                  Karim Tit and
                  Vivien Chappelier and
                  Teddy Furon},
  title        = {Three Bricks to Consolidate Watermarks for Large Language Models},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374576},
  doi          = {10.1109/WIFS58808.2023.10374576},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FernandezCTCF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GangwalTBC23,
  author       = {Ankit Gangwal and
                  Apoorva Thirupathi and
                  Alessandro Brighente and
                  Mauro Conti},
  title        = {A First Look at Shill Looping in {NFT} Ecosystem},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374954},
  doi          = {10.1109/WIFS58808.2023.10374954},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GangwalTBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GardellaMCMP23,
  author       = {Marina Gardella and
                  Pablo Mus{\'{e}} and
                  Miguel Colom and
                  Jean{-}Michel Morel and
                  Denis Perraud},
  title        = {PRNU-Based Source Camera Statistical Certification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10375045},
  doi          = {10.1109/WIFS58808.2023.10375045},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GardellaMCMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GerhardtCA23,
  author       = {Milica Gerhardt and
                  Luca Cuccovillo and
                  Patrick Aichroth},
  title        = {Advancing Audio Phylogeny: {A} Neural Network Approach for Transformation
                  Detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10375058},
  doi          = {10.1109/WIFS58808.2023.10375058},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GerhardtCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangZ023,
  author       = {Lin Huang and
                  Gejian Zhao and
                  Chuan Qin},
  title        = {Recoverable Active Protection Framework for Neural Network Models},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374926},
  doi          = {10.1109/WIFS58808.2023.10374926},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KaziakhmedovDF23,
  author       = {Edgar Kaziakhmedov and
                  Eli Dworetzky and
                  Jessica J. Fridrich},
  title        = {Observing Bag Gain in {JPEG} Batch Steganography},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374876},
  doi          = {10.1109/WIFS58808.2023.10374876},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KaziakhmedovDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KlementV023,
  author       = {Felix Klement and
                  Emily Vorderw{\"{u}}lbeke and
                  Stefan Katzenbeisser},
  title        = {One Standard to Rule Them All? Assessing the Disruptive Potential
                  of Jamming Attacks on Matter Networks},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374874},
  doi          = {10.1109/WIFS58808.2023.10374874},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KlementV023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LoisP23,
  author       = {Elena Rodr{\'{\i}}guez Lois and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Towards Traitor Tracing in Black-and-White-Box {DNN} Watermarking
                  with Tardos-Based Codes},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374879},
  doi          = {10.1109/WIFS58808.2023.10374879},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LoisP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LyuRKBLJ23,
  author       = {Shangxuan Lyu and
                  Ramprasad Raghunath and
                  Luca Kunz and
                  Karl{-}Ludwig Besser and
                  Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {Practical Wiretap Code Design by Concatenated Autoencoder and {LDPC}
                  Codes},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10375067},
  doi          = {10.1109/WIFS58808.2023.10375067},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LyuRKBLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RoigGR023,
  author       = {Dail{\'{e}} Osorio Roig and
                  Paul A. Gerlitz and
                  Christian Rathgeb and
                  Christoph Busch},
  title        = {Reversing Deep Face Embeddings with Probable Privacy Protection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374819},
  doi          = {10.1109/WIFS58808.2023.10374819},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RoigGR023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RoigGRV0F23,
  author       = {Dail{\'{e}} Osorio Roig and
                  Mahdi Ghafourian and
                  Christian Rathgeb and
                  Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
                  Christoph Busch and
                  Julian Fi{\'{e}}rrez},
  title        = {Optimizing Key-Selection for Face-Based One-Time Biometrics via Morphing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374998},
  doi          = {10.1109/WIFS58808.2023.10374998},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RoigGRV0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RoxoCI023,
  author       = {Tiago Roxo and
                  Joana Cabral Costa and
                  Pedro R. M. In{\'{a}}cio and
                  Hugo Proen{\c{c}}a},
  title        = {On Exploring Audio Anomaly in Speech},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374734},
  doi          = {10.1109/WIFS58808.2023.10374734},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RoxoCI023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SalviPMBT23,
  author       = {Davide Salvi and
                  Mirco Pezzoli and
                  Sara Mandelli and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Are you Really Alone? Detecting the use of Speech Separation Techniques
                  on Audio Recordings},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374717},
  doi          = {10.1109/WIFS58808.2023.10374717},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SalviPMBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SharmaWBRR23,
  author       = {Tilak Sharma and
                  Mahika Wason and
                  Vishnu Boddeti and
                  Arun Ross and
                  Nalini K. Ratha},
  title        = {Fully Homomorphic Encryption Operators for Score and Decision Fusion
                  in Biometric Identification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374571},
  doi          = {10.1109/WIFS58808.2023.10374571},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SharmaWBRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/StrandbergAO23,
  author       = {Kim Strandberg and
                  Ulf Arnljung and
                  Tomas Olovsson},
  title        = {The Automotive BlackBox: Towards a Standardization of Automotive Digital
                  Forensics},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10375003},
  doi          = {10.1109/WIFS58808.2023.10375003},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/StrandbergAO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Tapia023,
  author       = {Juan E. Tapia and
                  Christoph Busch},
  title        = {AlphaNet: Single Morphing Attack Detection Using Multiple Contributors},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374584},
  doi          = {10.1109/WIFS58808.2023.10374584},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Tapia023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YaroshchukPCAVT23,
  author       = {Artem Yaroshchuk and
                  Christoforos Papastergiopoulos and
                  Luca Cuccovillo and
                  Patrick Aichroth and
                  Konstantinos Votis and
                  Dimitrios Tzovaras},
  title        = {An Open Dataset of Synthetic Speech},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374863},
  doi          = {10.1109/WIFS58808.2023.10374863},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YaroshchukPCAVT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZamaniOGS23,
  author       = {Amirreza Zamani and
                  Tobias J. Oechtering and
                  Deniz G{\"{u}}nd{\"{u}}z and
                  Mikael Skoglund},
  title        = {Private Variable-Length Coding with Zero Leakage},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374696},
  doi          = {10.1109/WIFS58808.2023.10374696},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZamaniOGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZamaniOS23,
  author       = {Amirreza Zamani and
                  Tobias J. Oechtering and
                  Mikael Skoglund},
  title        = {Private Variable-Length Coding with Non-Zero Leakage},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374604},
  doi          = {10.1109/WIFS58808.2023.10374604},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZamaniOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZeghidiCT23,
  author       = {H{\'{e}}di Zeghidi and
                  Carlos Fernando Crispim Junior and
                  Iuliia Tkachenko},
  title        = {CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection
                  Patterns},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374744},
  doi          = {10.1109/WIFS58808.2023.10374744},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZeghidiCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2023,
  title        = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023},
  doi          = {10.1109/WIFS58808.2023},
  isbn         = {979-8-3503-2491-4},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AbecidanIBBP22,
  author       = {Rony Abecidan and
                  Vincent Itier and
                  J{\'{e}}r{\'{e}}mie Boulanger and
                  Patrick Bas and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Using Set Covering to Generate Databases for Holistic Steganalysis},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975430},
  doi          = {10.1109/WIFS55849.2022.9975430},
  timestamp    = {Wed, 21 Dec 2022 18:19:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AbecidanIBBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaldiniA22,
  author       = {Gianmarco Baldini and
                  Irene Amerini},
  title        = {Microphone Identification based on Spectral Entropy with Convolutional
                  Neural Network},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975406},
  doi          = {10.1109/WIFS55849.2022.9975406},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BaldiniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BammeyGM22,
  author       = {Quentin Bammey and
                  Rafael Grompone von Gioi and
                  Jean{-}Michel Morel},
  title        = {Demosaicing to Detect Demosaicing and Image Forgeries},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975454},
  doi          = {10.1109/WIFS55849.2022.9975454},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BammeyGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaoZO22,
  author       = {Yicheng Bao and
                  Linghui Zhou and
                  Tobias J. Oechtering},
  title        = {Proof-of-Concept of Polar Codes for Biometric Identification and Authentication},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975472},
  doi          = {10.1109/WIFS55849.2022.9975472},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BaoZO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaumCYA22,
  author       = {Malte Baum and
                  Luca Cuccovillo and
                  Artem Yaroshchuk and
                  Patrick Aichroth},
  title        = {Environment Classification via Blind Roomprints Estimation},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975411},
  doi          = {10.1109/WIFS55849.2022.9975411},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BaumCYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BelousovPCTTHV22,
  author       = {Yury Belousov and
                  Brian Pulfer and
                  Roman Chaban and
                  Joakim Tutt and
                  Olga Taran and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Digital twins of physical printing-imaging channel},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975439},
  doi          = {10.1109/WIFS55849.2022.9975439},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BelousovPCTTHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChabanTTBPHV22,
  author       = {Roman Chaban and
                  Olga Taran and
                  Joakim Tutt and
                  Yury Belousov and
                  Brian Pulfer and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Printing variability of copy detection patterns},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975380},
  doi          = {10.1109/WIFS55849.2022.9975380},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ChabanTTBPHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CuccovilloPVYAV22,
  author       = {Luca Cuccovillo and
                  Christoforos Papastergiopoulos and
                  Anastasios Vafeiadis and
                  Artem Yaroshchuk and
                  Patrick Aichroth and
                  Konstantinos Votis and
                  Dimitrios Tzovaras},
  title        = {Open Challenges in Synthetic Speech Detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975433},
  doi          = {10.1109/WIFS55849.2022.9975433},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CuccovilloPVYAV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiXTB22,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Supervised {GAN} Watermarking for Intellectual Property Protection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975409},
  doi          = {10.1109/WIFS55849.2022.9975409},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiXTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JinXBC22,
  author       = {Shan Jin and
                  Minghua Xu and
                  Riccardo Bettati and
                  Mihai Christodorescu},
  title        = {Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel
                  Attacks},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975384},
  doi          = {10.1109/WIFS55849.2022.9975384},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JinXBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KallasF22,
  author       = {Kassem Kallas and
                  Teddy Furon},
  title        = {{ROSE:} {A} RObust and SEcure {DNN} Watermarking},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975300},
  doi          = {10.1109/WIFS55849.2022.9975300},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KallasF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KesterLE22,
  author       = {David Kester and
                  Tianyu Li and
                  Zekeriya Erkin},
  title        = {{PRIDE:} {A} Privacy-Preserving Decentralised Key Management System},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975379},
  doi          = {10.1109/WIFS55849.2022.9975379},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KesterLE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LeGNE22,
  author       = {Trung{-}Nghia Le and
                  Ta Gu and
                  Huy H. Nguyen and
                  Isao Echizen},
  title        = {Rethinking Adversarial Examples for Location Privacy Protection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975388},
  doi          = {10.1109/WIFS55849.2022.9975388},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LeGNE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LevecqueKBB22,
  author       = {Etienne Levecque and
                  John Klein and
                  Patrick Bas and
                  Jan Butora},
  title        = {Toward Reliable {JPEG} Steganalysis (at {QF100)}},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975393},
  doi          = {10.1109/WIFS55849.2022.9975393},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LevecqueKBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MariLM22,
  author       = {Daniele Mari and
                  Federica Latora and
                  Simone Milani},
  title        = {The Sound of Silence: Efficiency of First Digit Features in Synthetic
                  Audio Detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975404},
  doi          = {10.1109/WIFS55849.2022.9975404},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MariLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NascimentoCYR22,
  author       = {Jos{\'{e}} Nascimento and
                  Jo{\~{a}}o Phillipe Cardenuto and
                  Jing Yang and
                  Anderson Rocha},
  title        = {Few-shot Learning for Multi-modal Social Media Event Filtering},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975429},
  doi          = {10.1109/WIFS55849.2022.9975429},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NascimentoCYR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PianeseCPV22,
  author       = {Alessandro Pianese and
                  Davide Cozzolino and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  title        = {Deepfake audio detection by speaker verification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975428},
  doi          = {10.1109/WIFS55849.2022.9975428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PianeseCPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PulferBTCTHV22,
  author       = {Brian Pulfer and
                  Yury Belousov and
                  Joakim Tutt and
                  Roman Chaban and
                  Olga Taran and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Anomaly localization for copy detection patterns through print estimations},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975416},
  doi          = {10.1109/WIFS55849.2022.9975416},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PulferBTCTHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RahmanGCCML22,
  author       = {Md. Hafizur Rahman and
                  Martin Graciarena and
                  Diego Cast{\'{a}}n and
                  Chris Cobo{-}Kroenke and
                  Mitchell McLaren and
                  Aaron Lawson},
  title        = {Detecting Synthetic Speech Manipulation in Real Audio Recordings},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975381},
  doi          = {10.1109/WIFS55849.2022.9975381},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RahmanGCCML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RoseCB22,
  author       = {Adam I. Rose and
                  Bindu Chandna and
                  Kevin B. Burke},
  title        = {Phase-Only Artificial Noise for Secure Communication with Multiple
                  Antennas Using Simultaneous Orthogonalization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975471},
  doi          = {10.1109/WIFS55849.2022.9975471},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RoseCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SalviBT22,
  author       = {Davide Salvi and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Exploring the Synthetic Speech Attribution Problem Through Data-Driven
                  Detectors},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975440},
  doi          = {10.1109/WIFS55849.2022.9975440},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SalviBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TaoQ22,
  author       = {Yitong Tao and
                  Chuan Qin},
  title        = {Graph-based Robust Model Hashing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975424},
  doi          = {10.1109/WIFS55849.2022.9975424},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TaoQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TheophiloR22,
  author       = {Antonio Theophilo and
                  Anderson Rocha},
  title        = {Authorship Attribution of Small Messages Through Language Models},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975413},
  doi          = {10.1109/WIFS55849.2022.9975413},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TheophiloR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TuttTCPBHV22,
  author       = {Joakim Tutt and
                  Olga Taran and
                  Roman Chaban and
                  Brian Pulfer and
                  Yury Belousov and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Mathematical model of printing-imaging channel for blind detection
                  of fake copy detection patterns},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975447},
  doi          = {10.1109/WIFS55849.2022.9975447},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TuttTCPBHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VermaGHA22,
  author       = {Kunaal Verma and
                  Mansi Girdhar and
                  Azeem Hafeez and
                  Selim S. Awad},
  title        = {{ECU} Identification using Neural Network Classification and Hyperparameter
                  Tuning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975396},
  doi          = {10.1109/WIFS55849.2022.9975396},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VermaGHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YangXZH22,
  author       = {Zhen Yang and
                  Zihan Xu and
                  Ru Zhang and
                  Yongfeng Huang},
  title        = {{T-GRU:} conTextual Gated Recurrent Unit model for high quality Linguistic
                  Steganography},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975301},
  doi          = {10.1109/WIFS55849.2022.9975301},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YangXZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YriartePT22,
  author       = {Felix Yriarte and
                  Pauline Puteaux and
                  Iuliia Tkachenko},
  title        = {A Two-Step Method for Ensuring Printed Document Integrity using Crossing
                  Number Distances},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975383},
  doi          = {10.1109/WIFS55849.2022.9975383},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YriartePT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhangWYH22,
  author       = {Fei Zhang and
                  Hongxia Wang and
                  Ling Yang and
                  Mingze He},
  title        = {Robust Blind Video Watermarking by Constructing Spread-Spectrum Matrix},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975392},
  doi          = {10.1109/WIFS55849.2022.9975392},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhangWYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2022,
  title        = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022},
  doi          = {10.1109/WIFS55849.2022},
  isbn         = {979-8-3503-0967-6},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AbecidanIBB21,
  author       = {Rony Abecidan and
                  Vincent Itier and
                  J{\'{e}}r{\'{e}}mie Boulanger and
                  Patrick Bas},
  title        = {Unsupervised {JPEG} Domain Adaptation for Practical Digital Image
                  Forensics},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648397},
  doi          = {10.1109/WIFS53200.2021.9648397},
  timestamp    = {Sat, 08 Jan 2022 01:37:58 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AbecidanIBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AdhataraoL21,
  author       = {Supriya Adhatarao and
                  C{\'{e}}dric Lauradoux},
  title        = {How are {PDF} files published in the Scientific Community?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648374},
  doi          = {10.1109/WIFS53200.2021.9648374},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AdhataraoL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AgarwalRVS21,
  author       = {Akshay Agarwal and
                  Nalini K. Ratha and
                  Mayank Vatsa and
                  Richa Singh},
  title        = {Impact of Super-Resolution and Human Identification in Drone Surveillance},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648399},
  doi          = {10.1109/WIFS53200.2021.9648399},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AgarwalRVS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AlbrightMRB21,
  author       = {Michael Albright and
                  Nitesh Menon and
                  Kristy Roschke and
                  Arslan Basharat},
  title        = {Source Attribution of Online News Images by Compression Analysis},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648385},
  doi          = {10.1109/WIFS53200.2021.9648385},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AlbrightMRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AroraA21,
  author       = {Shashank Arora and
                  Pradeep K. Atrey},
  title        = {Secure Collaborative Editing Using Secret Sharing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648395},
  doi          = {10.1109/WIFS53200.2021.9648395},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AroraA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChabanTTHBV21,
  author       = {Roman Chaban and
                  Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Machine learning attack on copy detection patterns: are {\textdollar}1{\textbackslash}times
                  1{\textdollar} patterns cloneable?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648387},
  doi          = {10.1109/WIFS53200.2021.9648387},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ChabanTTHBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenCCO21,
  author       = {Dongjie Chen and
                  Sen{-}ching Samson Cheung and
                  Chen{-}Nee Chuah and
                  Sally Ozonoff},
  title        = {Differentially Private Generative Adversarial Networks with Model
                  Inversion},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648378},
  doi          = {10.1109/WIFS53200.2021.9648378},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenCCO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenMZZ21,
  author       = {Yanmei Chen and
                  Zehua Ma and
                  Hang Zhou and
                  Weiming Zhang},
  title        = {3D Print-Scan Resilient Localized Mesh Watermarking},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648379},
  doi          = {10.1109/WIFS53200.2021.9648379},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenMZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FerreiraCB21,
  author       = {Anselmo Ferreira and
                  Changsheng Chen and
                  Mauro Barni},
  title        = {Fusing Multiscale Texture and Residual Descriptors for Multilevel
                  2D Barcode Rebroadcasting Detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648391},
  doi          = {10.1109/WIFS53200.2021.9648391},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FerreiraCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GunluSP21,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {Quality of Service Guarantees for Physical Unclonable Functions},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648377},
  doi          = {10.1109/WIFS53200.2021.9648377},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GunluSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/IbsenSRDGB21,
  author       = {Mathias Ibsen and
                  L{\'{a}}zaro J. Gonz{\'{a}}lez Soler and
                  Christian Rathgeb and
                  Pawel Drozdowski and
                  Marta Gomez{-}Barrero and
                  Christoph Busch},
  title        = {Differential Anomaly Detection for Facial Images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648392},
  doi          = {10.1109/WIFS53200.2021.9648392},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/IbsenSRDGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ItagakiFA21,
  author       = {Toshiki Itagaki and
                  Yuki Funabiki and
                  Toru Akishita},
  title        = {Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular
                  Region},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648383},
  doi          = {10.1109/WIFS53200.2021.9648383},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ItagakiFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ItzhakiYF21,
  author       = {Tomer Itzhaki and
                  Yassine Yousfi and
                  Jessica J. Fridrich},
  title        = {Data Augmentation for {JPEG} Steganalysis},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648390},
  doi          = {10.1109/WIFS53200.2021.9648390},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ItzhakiYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JawadeASR21,
  author       = {Bhavin Jawade and
                  Akshay Agarwal and
                  Srirangaraj Setlur and
                  Nalini K. Ratha},
  title        = {Multi Loss Fusion For Matching Smartphone Captured Contactless Finger
                  Images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648393},
  doi          = {10.1109/WIFS53200.2021.9648393},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/JawadeASR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JochlU21,
  author       = {Robert J{\"{o}}chl and
                  Andreas Uhl},
  title        = {Apart from In-field Sensor Defects, are there Additional Age Traces
                  Hidden in a Digital Image?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648396},
  doi          = {10.1109/WIFS53200.2021.9648396},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JochlU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KhermazaTP21,
  author       = {Elyes Khermaza and
                  Iuliia Tkachenko and
                  Justin Picard},
  title        = {Can Copy Detection Patterns be copied? Evaluating the performance
                  of attacks and highlighting the role of the detector},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648384},
  doi          = {10.1109/WIFS53200.2021.9648384},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KhermazaTP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchgasserKU21,
  author       = {Simon Kirchgasser and
                  Christof Kauba and
                  Andreas Uhl},
  title        = {Assessment of Synthetically Generated Mated Samples from Single Fingerprint
                  Samples Instances},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648394},
  doi          = {10.1109/WIFS53200.2021.9648394},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchgasserKU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiGTLLB21,
  author       = {Zhenyu Li and
                  Daofu Gong and
                  Lei Tan and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Adrian G. Bors},
  title        = {Self-embedding watermarking method for G-code used in 3D printing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648386},
  doi          = {10.1109/WIFS53200.2021.9648386},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiGTLLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Otroshi-Shahreza21,
  author       = {Hatef Otroshi{-}Shahreza and
                  Vedrana Krivokuca Hahn and
                  S{\'{e}}bastien Marcel},
  title        = {On the Recognition Performance of BioHashing on state-of-the-art Face
                  Recognition models},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648382},
  doi          = {10.1109/WIFS53200.2021.9648382},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Otroshi-Shahreza21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PiliaMBT21,
  author       = {Michele Pilia and
                  Sara Mandelli and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Time Scaling Detection and Estimation in Audio Recordings},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648389},
  doi          = {10.1109/WIFS53200.2021.9648389},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PiliaMBT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TaranTHCBV21,
  author       = {Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Roman Chaban and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Mobile authentication of copy detection patterns: how critical is
                  to know fakes?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648398},
  doi          = {10.1109/WIFS53200.2021.9648398},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TaranTHCBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ThebaudLL21,
  author       = {Thomas Thebaud and
                  Ga{\"{e}}l Le Lan and
                  Anthony Larcher},
  title        = {Spoofing Speaker Verification With Voice Style Transfer And Reconstruction
                  Loss},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648375},
  doi          = {10.1109/WIFS53200.2021.9648375},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ThebaudLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VosED21,
  author       = {Jelle Vos and
                  Zekeriya Erkin and
                  Christian Doerr},
  title        = {Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence
                  Providers},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648381},
  doi          = {10.1109/WIFS53200.2021.9648381},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VosED21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YangVSR21,
  author       = {Jing Yang and
                  Didier Augusto Vega{-}Oliveros and
                  Tais Seibt and
                  Anderson Rocha},
  title        = {Scalable Fact-checking with Human-in-the-Loop},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648388},
  doi          = {10.1109/WIFS53200.2021.9648388},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YangVSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YingWY21,
  author       = {Kaiyu Ying and
                  Rangding Wang and
                  Diqun Yan},
  title        = {Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648380},
  doi          = {10.1109/WIFS53200.2021.9648380},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YingWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YousfiBF21,
  author       = {Yassine Yousfi and
                  Jan Butora and
                  Jessica J. Fridrich},
  title        = {{CNN} Steganalyzers Leverage Local Embedding Artifacts},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648400},
  doi          = {10.1109/WIFS53200.2021.9648400},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YousfiBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhaoYWZ21,
  author       = {Xiangyu Zhao and
                  Yinzhe Yao and
                  Hanzhou Wu and
                  Xinpeng Zhang},
  title        = {Structural Watermarking to Deep Neural Networks via Network Channel
                  Pruning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648376},
  doi          = {10.1109/WIFS53200.2021.9648376},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhaoYWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2021,
  title        = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021},
  doi          = {10.1109/WIFS53200.2021},
  isbn         = {978-1-6654-1717-4},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AgarwalFEL20,
  author       = {Shruti Agarwal and
                  Hany Farid and
                  Tarek El{-}Gaaly and
                  Ser{-}Nam Lim},
  title        = {Detecting Deep-Fake Videos from Appearance and Behavior},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360904},
  doi          = {10.1109/WIFS49906.2020.9360904},
  timestamp    = {Wed, 03 Mar 2021 11:37:40 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AgarwalFEL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BajpaiCTAMSE20,
  author       = {Pranshu Bajpai and
                  Cody Carter and
                  Daria Tarasova and
                  David Ackley and
                  Ian Masterson and
                  Jamie Schmidt and
                  Richard J. Enbody},
  title        = {The Suitability of {RSA} for Bulk Data Encryption},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360899},
  doi          = {10.1109/WIFS49906.2020.9360899},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BajpaiCTAMSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniKNT20,
  author       = {Mauro Barni and
                  Kassem Kallas and
                  Ehsan Nowroozi and
                  Benedetta Tondi},
  title        = {{CNN} Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences
                  Analysis},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360905},
  doi          = {10.1109/WIFS49906.2020.9360905},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniKNT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauspiessKDK020,
  author       = {Pia Bauspie{\ss} and
                  Jascha Kolberg and
                  Daniel Demmler and
                  Juliane Kr{\"{a}}mer and
                  Christoph Busch},
  title        = {Post-Quantum Secure Two-Party Computation for Iris Biometric Template
                  Protection},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360881},
  doi          = {10.1109/WIFS49906.2020.9360881},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BauspiessKDK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BondiCBT20,
  author       = {Luca Bondi and
                  Edoardo Daniele Cannas and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Training Strategies and Data Augmentations in CNN-based DeepFake Video
                  Detection},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360901},
  doi          = {10.1109/WIFS49906.2020.9360901},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BondiCBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BorsigNEG0B20,
  author       = {Matthias B{\"{o}}rsig and
                  Sven Nitzsche and
                  Max Eisele and
                  Roland Gr{\"{o}}ll and
                  J{\"{u}}rgen Becker and
                  Ingmar Baumgart},
  title        = {Fuzzing Framework for {ESP32} Microcontrollers},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360889},
  doi          = {10.1109/WIFS49906.2020.9360889},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BorsigNEG0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BrandesKMBR20,
  author       = {T. Scott Brandes and
                  Scott Kuzdeba and
                  Jessee McClelland and
                  Neil Bomberger and
                  Andrew Radlbeck},
  title        = {{RF} Waveform Synthesis Guided by Deep Reinforcement Learning},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360894},
  doi          = {10.1109/WIFS49906.2020.9360894},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BrandesKMBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BrissaudFCCB20,
  author       = {Pierre{-}Olivier Brissaud and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Isabelle Chrisment and
                  Thibault Cholez and
                  Olivier Bettan},
  title        = {Encrypted {HTTP/2} Traffic Monitoring: Standing the Test of Time and
                  Space},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360895},
  doi          = {10.1109/WIFS49906.2020.9360895},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BrissaudFCCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CapoferriBBAST20,
  author       = {Davide Capoferri and
                  Clara Borrelli and
                  Paolo Bestagini and
                  Fabio Antonacci and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Speech Audio Splicing Detection and Localization Exploiting Reverberation
                  Cues},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360900},
  doi          = {10.1109/WIFS49906.2020.9360900},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CapoferriBBAST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Chubachi20,
  author       = {Kaizaburo Chubachi},
  title        = {An Ensemble Model using CNNs on Different Domains for {ALASKA2} Image
                  Steganalysis},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360892},
  doi          = {10.1109/WIFS49906.2020.9360892},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Chubachi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CogranneGB20,
  author       = {R{\'{e}}mi Cogranne and
                  Quentin Giboulot and
                  Patrick Bas},
  title        = {ALASKA{\#}2: Challenging Academic Research on Steganalysis with Realistic
                  Images},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360896},
  doi          = {10.1109/WIFS49906.2020.9360896},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CogranneGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaineAPND20,
  author       = {Cl{\'{e}}ment Gaine and
                  Driss Aboulkassimi and
                  Simon Ponti{\'{e}} and
                  Jean{-}Pierre Nikolovski and
                  Jean{-}Max Dutertre},
  title        = {Electromagnetic Fault Injection as a New Forensic Approach for SoCs},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360902},
  doi          = {10.1109/WIFS49906.2020.9360902},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GaineAPND20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarnaevTMP20,
  author       = {Andrey Garnaev and
                  Wade Trappe and
                  Narayan B. Mandayam and
                  H. Vincent Poor},
  title        = {A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping
                  and Jamming Game},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360898},
  doi          = {10.1109/WIFS49906.2020.9360898},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GarnaevTMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GiboulotBC20,
  author       = {Quentin Giboulot and
                  Patrick Bas and
                  R{\'{e}}mi Cogranne},
  title        = {Synchronization Minimizing Statistical Detectability for Side-Informed
                  {JPEG} Steganography},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360884},
  doi          = {10.1109/WIFS49906.2020.9360884},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GiboulotBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Gonzalez-Soler020,
  author       = {L{\'{a}}zaro Janier Gonz{\'{a}}lez{-}Soler and
                  Jose Patino and
                  Marta Gomez{-}Barrero and
                  Massimiliano Todisco and
                  Christoph Busch and
                  Nicholas W. D. Evans},
  title        = {Texture-based Presentation Attack Detection for Automatic Speaker
                  Verification},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360882},
  doi          = {10.1109/WIFS49906.2020.9360882},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Gonzalez-Soler020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/IshizukaW20,
  author       = {Tetsuro Ishizuka and
                  Yodai Watanabe},
  title        = {Threshold audio secret sharing schemes encrypting audio secrets},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360907},
  doi          = {10.1109/WIFS49906.2020.9360907},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/IshizukaW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JinB20,
  author       = {Shan Jin and
                  Riccardo Bettati},
  title        = {Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360908},
  doi          = {10.1109/WIFS49906.2020.9360908},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JinB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JoshiKKM20,
  author       = {Sharad Joshi and
                  Pawel Korus and
                  Nitin Khanna and
                  Nasir D. Memon},
  title        = {Empirical Evaluation of {PRNU} Fingerprint Variation for Mismatched
                  Imaging Pipelines},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360911},
  doi          = {10.1109/WIFS49906.2020.9360911},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JoshiKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KeongDJMD20,
  author       = {Jin Keong and
                  Xingbo Dong and
                  Zhe Jin and
                  Khawla Mallat and
                  Jean{-}Luc Dugelay},
  title        = {Multi-spectral Facial Landmark Detection},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360890},
  doi          = {10.1109/WIFS49906.2020.9360890},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KeongDJMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LorchMR20,
  author       = {Benedikt Lorch and
                  Anatol Maier and
                  Christian Riess},
  title        = {Reliable {JPEG} Forensics via Model Uncertainty},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360893},
  doi          = {10.1109/WIFS49906.2020.9360893},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LorchMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MaK20,
  author       = {Liangping Ma and
                  John Kaewell},
  title        = {Fast Monte Carlo Dropout and Error Correction for Radio Transmitter
                  Classification},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360887},
  doi          = {10.1109/WIFS49906.2020.9360887},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MandelliBBT20,
  author       = {Sara Mandelli and
                  Nicol{\`{o}} Bonettini and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Training CNNs in Presence of {JPEG} Compression: Multimedia Forensics
                  vs Computer Vision},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360903},
  doi          = {10.1109/WIFS49906.2020.9360903},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MandelliBBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MontserratHYZD20,
  author       = {Daniel Mas Montserrat and
                  J{\'{a}}nos Horv{\'{a}}th and
                  Sri Kalyan Yarlagadda and
                  Fengqing Zhu and
                  Edward J. Delp},
  title        = {Generative Autoregressive Ensembles for Satellite Imagery Manipulation
                  Detection},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360909},
  doi          = {10.1109/WIFS49906.2020.9360909},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MontserratHYZD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NakajimaK20,
  author       = {Tamio{-}Vesa Nakajima and
                  Andrew D. Ker},
  title        = {The Syndrome-Trellis Sampler for Generative Steganography},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360885},
  doi          = {10.1109/WIFS49906.2020.9360885},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NakajimaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Pedrouzo-UlloaT20,
  author       = {Alberto Pedrouzo{-}Ulloa and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear
                  Function Evaluation},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360891},
  doi          = {10.1109/WIFS49906.2020.9360891},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Pedrouzo-UlloaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RazeghiCGV20,
  author       = {Behrooz Razeghi and
                  Fl{\'{a}}vio P. Calmon and
                  Deniz G{\"{u}}nd{\"{u}}z and
                  Slava Voloshynovskiy},
  title        = {On Perfect Obfuscation: Local Information Geometry Analysis},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360888},
  doi          = {10.1109/WIFS49906.2020.9360888},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RazeghiCGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SudhakaranAOCR20,
  author       = {Sneha Sudhakaran and
                  Aisha I. Ali{-}Gombe and
                  Augustine Orgah and
                  Andrew Case and
                  Golden G. Richard III},
  title        = {AmpleDroid Recovering Large Object Files from Android Application
                  Memory},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360906},
  doi          = {10.1109/WIFS49906.2020.9360906},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SudhakaranAOCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SunLQL20,
  author       = {Pu Sun and
                  Yuezun Li and
                  Honggang Qi and
                  Siwei Lyu},
  title        = {Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360910},
  doi          = {10.1109/WIFS49906.2020.9360910},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SunLQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TapiaG020,
  author       = {Juan E. Tapia and
                  Marta Gomez{-}Barrero and
                  Christoph Busch},
  title        = {An Efficient Super-Resolution Single Image Network using Sharpness
                  Loss Metrics for Iris},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360886},
  doi          = {10.1109/WIFS49906.2020.9360886},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TapiaG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TkachenkoTF20,
  author       = {Iuliia Tkachenko and
                  Alain Tr{\'{e}}meau and
                  Thierry Fournel},
  title        = {Fighting against medicine packaging counterfeits: rotogravure press
                  vs cylinder signatures},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360883},
  doi          = {10.1109/WIFS49906.2020.9360883},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TkachenkoTF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YousfiBKF20,
  author       = {Yassine Yousfi and
                  Jan Butora and
                  Eugene Khvedchenya and
                  Jessica J. Fridrich},
  title        = {ImageNet Pre-trained CNNs for {JPEG} Steganalysis},
  booktitle    = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020.9360897},
  doi          = {10.1109/WIFS49906.2020.9360897},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/YousfiBKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2020,
  title        = {12th {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2020, New York City, NY, USA, December 6-11, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WIFS49906.2020},
  doi          = {10.1109/WIFS49906.2020},
  isbn         = {978-1-7281-9930-6},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/0022KC19,
  author       = {Xu Zhang and
                  Svebor Karaman and
                  Shih{-}Fu Chang},
  title        = {Detecting and Simulating Artifacts in {GAN} Fake Images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035107},
  doi          = {10.1109/WIFS47025.2019.9035107},
  timestamp    = {Mon, 23 Mar 2020 09:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/0022KC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniHLT19,
  author       = {Mauro Barni and
                  Dequ Huang and
                  Bin Li and
                  Benedetta Tondi},
  title        = {Adversarial {CNN} Training Under {JPEG} Laundering Attacks: a Game-Theoretic
                  Approach},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035110},
  doi          = {10.1109/WIFS47025.2019.9035110},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniHLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Baur0WB19,
  author       = {Sebastian Baur and
                  Ning Cai and
                  Moritz Wiese and
                  Holger Boche},
  title        = {Secret Key Generation from a Two Component Compound Source with Rate
                  Constrained One Way Communication: Perfect Secrecy},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035091},
  doi          = {10.1109/WIFS47025.2019.9035091},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Baur0WB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BlumB19,
  author       = {Yoav Blum and
                  David Burshtein},
  title        = {Blind Vocoder Speech Reconstruction using Generative Adversarial Networks},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035106},
  doi          = {10.1109/WIFS47025.2019.9035106},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BlumB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BocheSP19,
  author       = {Holger Boche and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {Resource Allocation for Secure Communication Systems: Algorithmic
                  Solvability},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035108},
  doi          = {10.1109/WIFS47025.2019.9035108},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BocheSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BorrelliBAST19,
  author       = {Clara Borrelli and
                  Paolo Bestagini and
                  Fabio Antonacci and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Automatic Reliability Estimation for Speech Audio Surveillance Recordings},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034986},
  doi          = {10.1109/WIFS47025.2019.9034986},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BorrelliBAST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BoursK19,
  author       = {Patrick Bours and
                  Halvor Kulsrud},
  title        = {Detection of Cyber Grooming in Online Conversation},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035090},
  doi          = {10.1109/WIFS47025.2019.9035090},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BoursK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BrighenteFRT19,
  author       = {Alessandro Brighente and
                  Francesco Formaggio and
                  G. Ruvoletto and
                  Stefano Tomasin},
  title        = {Ranking-Based Attacks to In-Region Location Verification Systems},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035088},
  doi          = {10.1109/WIFS47025.2019.9035088},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BrighenteFRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CarraraCFA19,
  author       = {Fabio Carrara and
                  Roberto Caldelli and
                  Fabrizio Falchi and
                  Giuseppe Amato},
  title        = {On the Robustness to Adversarial Examples of Neural {ODE} Image Classifiers},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035109},
  doi          = {10.1109/WIFS47025.2019.9035109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CarraraCFA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DebiasiKPUGK19,
  author       = {Luca Debiasi and
                  Simon Kirchgasser and
                  Bernhard Prommegger and
                  Andreas Uhl and
                  Artur Grudzien and
                  Marcin Kowalski},
  title        = {Biometric Template Protection in the Image Domain Using Non-invertible
                  Grey-scale Transforms},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034984},
  doi          = {10.1109/WIFS47025.2019.9034984},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DebiasiKPUGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErdemirDG19,
  author       = {Ece Naz Erdemir and
                  Pier Luigi Dragotti and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Privacy-Aware Location Sharing with Deep Reinforcement Learning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035097},
  doi          = {10.1109/WIFS47025.2019.9035097},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErdemirDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarnaevT19,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {A Power Control Game Involving Jamming and Eavesdropping Defense},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035092},
  doi          = {10.1109/WIFS47025.2019.9035092},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GarnaevT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GheisariFA19,
  author       = {Marzieh Gheisari and
                  Teddy Furon and
                  Laurent Amsaleg},
  title        = {Group Membership Verification with Privacy: Sparse or Dense?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034985},
  doi          = {10.1109/WIFS47025.2019.9034985},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GheisariFA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GiotR19,
  author       = {Romain Giot and
                  Anderson Rocha},
  title        = {Siamese Networks for Static Keystroke Dynamics Authentication},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035100},
  doi          = {10.1109/WIFS47025.2019.9035100},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GiotR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchnerJ19,
  author       = {Matthias Kirchner and
                  Cameron Johnson},
  title        = {{SPN-CNN:} Boosting Sensor-Based Source Camera Attribution With Deep
                  Learning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035103},
  doi          = {10.1109/WIFS47025.2019.9035103},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchnerJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchnerPS19,
  author       = {Matthias Kirchner and
                  Cecilia Pasquini and
                  Ilia Shumailov},
  title        = {Information Security Meets Adversarial Examples},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034980},
  doi          = {10.1109/WIFS47025.2019.9034980},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchnerPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KolbergBGRDB19,
  author       = {Jascha Kolberg and
                  Pia Bauspie{\ss} and
                  Marta Gomez{-}Barrero and
                  Christian Rathgeb and
                  Markus D{\"{u}}rmuth and
                  Christoph Busch},
  title        = {Template Protection based on Homomorphic Encryption: Computationally
                  Efficient Application to Iris-Biometric Verification and Identification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034982},
  doi          = {10.1109/WIFS47025.2019.9034982},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KolbergBGRDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KustersW19,
  author       = {Lieneke Kusters and
                  Frans M. J. Willems},
  title        = {Debiasing of {SRAM} PUFs: Selection and Balancing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035094},
  doi          = {10.1109/WIFS47025.2019.9035094},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KustersW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LinKSJ19,
  author       = {Pin{-}Hsun Lin and
                  Christiane Kuhn and
                  Thorsten Strufe and
                  Eduard A. Jorswieck},
  title        = {Physical Layer Privacy in Broadcast Channels},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035093},
  doi          = {10.1109/WIFS47025.2019.9035093},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LinKSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MarraSBV19,
  author       = {Francesco Marra and
                  Cristiano Saltori and
                  Giulia Boato and
                  Luisa Verdoliva},
  title        = {Incremental learning for the detection and classification of GAN-generated
                  images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035099},
  doi          = {10.1109/WIFS47025.2019.9035099},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MarraSBV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MeerJDBBE19,
  author       = {Vincent van der Meer and
                  Hugo Jonker and
                  Guy Dols and
                  Harm M. A. van Beek and
                  Jeroen van den Bos and
                  Marko C. J. D. van Eekelen},
  title        = {File Fragmentation in the Wild: a Privacy-Friendly Approach},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034981},
  doi          = {10.1109/WIFS47025.2019.9034981},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MeerJDBBE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoSCLH19,
  author       = {Huaxiao Mo and
                  Tingting Song and
                  Bolin Chen and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Enhancing {JPEG} Steganography using Iterative Adversarial Examples},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035101},
  doi          = {10.1109/WIFS47025.2019.9035101},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MoSCLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RaneB19,
  author       = {Shantanu Rane and
                  Alejandro E. Brito},
  title        = {A Version Space Perspective on Differentially Private Pool-Based Active
                  Learning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035089},
  doi          = {10.1109/WIFS47025.2019.9035089},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RaneB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RazeghiSSV19,
  author       = {Behrooz Razeghi and
                  Taras Stanko and
                  Boris Skoric and
                  Slava Voloshynovskiy},
  title        = {Single-Component Privacy Guarantees in Helper Data Systems and Sparse
                  Coding with Ambiguation},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035095},
  doi          = {10.1109/WIFS47025.2019.9035095},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RazeghiSSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RodriguesPRD19,
  author       = {Caroline Mazini Rodrigues and
                  Lu{\'{\i}}s A. M. Pereira and
                  Anderson Rocha and
                  Zanoni Dias},
  title        = {Image Semantic Representation for Event Understanding},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035102},
  doi          = {10.1109/WIFS47025.2019.9035102},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RodriguesPRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SeiboldHMKNDE19,
  author       = {Clemens Seibold and
                  Anna Hilsmann and
                  Andrey Makrushin and
                  Christian Kraetzer and
                  Tom Neubert and
                  Jana Dittmann and
                  Peter Eisert},
  title        = {Visual Feature Space Analyses of Face Morphing Detectors},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034983},
  doi          = {10.1109/WIFS47025.2019.9034983},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SeiboldHMKNDE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SenigagliesiCBG19,
  author       = {Linda Senigagliesi and
                  Lorenzo Cintioni and
                  Marco Baldi and
                  Ennio Gambi},
  title        = {Blind Physical Layer Authentication over Fading Wireless Channels
                  through Machine Learning},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035105},
  doi          = {10.1109/WIFS47025.2019.9035105},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SenigagliesiCBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VogtLSZ19,
  author       = {Hendrik Vogt and
                  Chu Li and
                  Aydin Sezgin and
                  Christian T. Zenger},
  title        = {On the Precise Phase Recovery for Physical-Layer Authentication in
                  Dynamic Channels},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034987},
  doi          = {10.1109/WIFS47025.2019.9034987},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VogtLSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WildeFP19,
  author       = {Florian Wilde and
                  Christoph Frisch and
                  Michael Pehl},
  title        = {Efficient Bound for Conditional Min-Entropy of Physical Unclonable
                  Functions Beyond {IID}},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035098},
  doi          = {10.1109/WIFS47025.2019.9035098},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WildeFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YadavTTF19,
  author       = {Rohit Yadav and
                  Iuliia Tkachenko and
                  Alain Tr{\'{e}}meau and
                  Thierry Fournel},
  title        = {Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035104},
  doi          = {10.1109/WIFS47025.2019.9035104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YadavTTF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZakariaCS19,
  author       = {Ahmad Zakaria and
                  Marc Chaumont and
                  G{\'{e}}rard Subsol},
  title        = {Pooled Steganalysis in {JPEG:} how to deal with the spreading strategy?},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035096},
  doi          = {10.1109/WIFS47025.2019.9035096},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZakariaCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2019,
  title        = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9034067/proceeding},
  isbn         = {978-1-7281-3217-4},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AfcharNYE18,
  author       = {Darius Afchar and
                  Vincent Nozick and
                  Junichi Yamagishi and
                  Isao Echizen},
  title        = {MesoNet: a Compact Facial Video Forgery Detection Network},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630761},
  doi          = {10.1109/WIFS.2018.8630761},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AfcharNYE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AkellaRP18,
  author       = {Ravi Tej Akella and
                  Raviteja Rekula and
                  Vinod Pankajakshan},
  title        = {A Randomized Kernel-Based Secret Image Sharing Scheme},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630770},
  doi          = {10.1109/WIFS.2018.8630770},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AkellaRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AkellaRP18a,
  author       = {Ravi Tej Akella and
                  Raviteja Rekula and
                  Vinod Pankajakshan},
  title        = {A Randomized Kernel-Based Secret Image Sharing Scheme - Supplementary
                  -},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630781},
  doi          = {10.1109/WIFS.2018.8630781},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AkellaRP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AndriotisT18,
  author       = {Panagiotis Andriotis and
                  Atsuhiro Takasu},
  title        = {Emotional Bots: Content-based Spammer Detection on Social Media},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630760},
  doi          = {10.1109/WIFS.2018.8630760},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AndriotisT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniNST18,
  author       = {Mauro Barni and
                  Mariko Nakano{-}Miyatake and
                  Hector Santoyo{-}Garcia and
                  Benedetta Tondi},
  title        = {Countering the Pooled Triangle Test for PRNU-based camera identification},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630778},
  doi          = {10.1109/WIFS.2018.8630778},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniNST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BocheSP18,
  author       = {Holger Boche and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {Performance Evaluation of Secure Communication Systems on Turing Machines},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630789},
  doi          = {10.1109/WIFS.2018.8630789},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BocheSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BonettiniBBT18,
  author       = {Nicol{\`{o}} Bonettini and
                  Luca Bondi and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {{JPEG} Implementation Forensics Based on Eigen-Algorithms},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630765},
  doi          = {10.1109/WIFS.2018.8630765},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BonettiniBBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenW18,
  author       = {Mingliang Chen and
                  Min Wu},
  title        = {Protect Your Deep Neural Networks from Piracy},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630791},
  doi          = {10.1109/WIFS.2018.8630791},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CheungRT18,
  author       = {Sen{-}Ching S. Cheung and
                  Muhammad Usman Rafique and
                  Wai{-}tian Tan},
  title        = {Privacy-Preserving Distributed Deep Learning with Privacy Transformations},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630790},
  doi          = {10.1109/WIFS.2018.8630790},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CheungRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DrozdowskiFRSB18,
  author       = {Pawel Drozdowski and
                  Daniel Fischer and
                  Christian Rathgeb and
                  C. Schiel and
                  Christoph Busch},
  title        = {Database Binning and Retrieval in Multi-Fingerprint Identification
                  Systems},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630763},
  doi          = {10.1109/WIFS.2018.8630763},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DrozdowskiFRSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FangYESK18,
  author       = {Fuming Fang and
                  Junichi Yamagishi and
                  Isao Echizen and
                  Md. Sahidullah and
                  Tomi Kinnunen},
  title        = {Transforming acoustic characteristics to deceive playback spoofing
                  countermeasures of speaker verification systems},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630764},
  doi          = {10.1109/WIFS.2018.8630764},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FangYESK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FerreiraCLH18,
  author       = {Anselmo Ferreira and
                  Han Chen and
                  Bin Li and
                  Jiwu Huang},
  title        = {An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630774},
  doi          = {10.1109/WIFS.2018.8630774},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FerreiraCLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Hua18,
  author       = {Guang Hua},
  title        = {Error Analysis of Forensic {ENF} Matching},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630786},
  doi          = {10.1109/WIFS.2018.8630786},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Hua18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HusseinSXA18,
  author       = {Mohamed E. Hussein and
                  Leonidas Spinoulas and
                  Fei Xiong and
                  Wael Abd{-}Almageed},
  title        = {Fingerprint Presentation Attack Detection Using {A} Novel Multi-Spectral
                  Capture Device and Patch-Based Convolutional Neural Networks},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630773},
  doi          = {10.1109/WIFS.2018.8630773},
  timestamp    = {Fri, 02 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HusseinSXA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JalilianU18,
  author       = {Ehsaneddin Jalilian and
                  Andreas Uhl},
  title        = {Finger-vein Recognition using Deep Fully Convolutional Neural Semantic
                  Segmentation Networks: The Impact of Training Data},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630794},
  doi          = {10.1109/WIFS.2018.8630794},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JalilianU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JinB18,
  author       = {Shan Jin and
                  Riccardo Bettati},
  title        = {Adaptive Channel Estimation in Side Channel Attacks},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630771},
  doi          = {10.1109/WIFS.2018.8630771},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JinB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Kin-CleavesK18,
  author       = {Christy Kin{-}Cleaves and
                  Andrew D. Ker},
  title        = {Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis
                  Codes},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630779},
  doi          = {10.1109/WIFS.2018.8630779},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Kin-CleavesK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KoppGK18,
  author       = {Martin Kopp and
                  Martin Grill and
                  Jan Kohout},
  title        = {Community-based anomaly detection},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630772},
  doi          = {10.1109/WIFS.2018.8630772},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KoppGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LeeJT18,
  author       = {Ming Jie Lee and
                  Zhe Jin and
                  Andrew Beng Jin Teoh},
  title        = {One-factor Cancellable Scheme for Fingerprint Template Protection:
                  Extended Feature Vector {(EFV)} Hashing},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630782},
  doi          = {10.1109/WIFS.2018.8630782},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LeeJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiCL18,
  author       = {Yuezun Li and
                  Ming{-}Ching Chang and
                  Siwei Lyu},
  title        = {In Ictu Oculi: Exposing {AI} Created Fake Videos by Detecting Eye
                  Blinking},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630787},
  doi          = {10.1109/WIFS.2018.8630787},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LiCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuLCLP18,
  author       = {Kuan{-}Hsien Liu and
                  Hsin{-}Hua Liu and
                  Pak Ki Chan and
                  Tsung{-}Jung Liu and
                  Soo{-}Chang Pei},
  title        = {Age Estimation via Fusion of Depthwise Separable Convolutional Neural
                  Networks},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630776},
  doi          = {10.1109/WIFS.2018.8630776},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuLCLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuW018,
  author       = {Runze Liu and
                  Chau{-}Wai Wong and
                  Min Wu},
  title        = {Enhanced Geometric Reflection Models for Paper Surface Based Authentication},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630759},
  doi          = {10.1109/WIFS.2018.8630759},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MansourSB18,
  author       = {Ahmed S. Mansour and
                  Rafael F. Schaefer and
                  Holger Boche},
  title        = {The Deterministic and Correlated Random Public-Confidential Capacity
                  Regions of the Arbitrarily Varying Wiretap Channel},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630767},
  doi          = {10.1109/WIFS.2018.8630767},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MansourSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NateghizadEL18,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {A Novel Approach For Data Packing: Using Trapdoor Knapsack},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630769},
  doi          = {10.1109/WIFS.2018.8630769},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NateghizadEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Pedrouzo-UlloaM18,
  author       = {Alberto Pedrouzo{-}Ulloa and
                  Miguel Masciopinto and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Camera Attribution Forensic Analyzer in the Encrypted Domain},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630777},
  doi          = {10.1109/WIFS.2018.8630777},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Pedrouzo-UlloaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PrimoracTBS18,
  author       = {Rudi Primorac and
                  Roberto Togneri and
                  Mohammed Bennamoun and
                  Ferdous Sohel},
  title        = {Generalized Joint Sparse Representation for Multimodal Biometric Fusion
                  of Heterogeneous Features},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630775},
  doi          = {10.1109/WIFS.2018.8630775},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PrimoracTBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PuteauxP18,
  author       = {Pauline Puteaux and
                  William Puech},
  title        = {EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630788},
  doi          = {10.1109/WIFS.2018.8630788},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PuteauxP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PuyangYQ18,
  author       = {Yi Puyang and
                  Zhaoxia Yin and
                  Zhenxing Qian},
  title        = {Reversible Data Hiding in Encrypted Images with Two-MSB Prediction},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630785},
  doi          = {10.1109/WIFS.2018.8630785},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PuyangYQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/QiuWWQFZ18,
  author       = {Yingqiang Qiu and
                  Hangxing Wang and
                  Zichi Wang and
                  Zhenxing Qian and
                  Gui Feng and
                  Xinpeng Zhang},
  title        = {Reversible Contrast Mapping based Reversible Data Hiding in Encrypted
                  Images},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630793},
  doi          = {10.1109/WIFS.2018.8630793},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/QiuWWQFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RassouliRG18,
  author       = {Borzoo Rassouli and
                  Fernando Rosas and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Latent Feature Disclosure under Perfect Sample Privacy},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630780},
  doi          = {10.1109/WIFS.2018.8630780},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RassouliRG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SahuO18,
  author       = {Sidhant Sahu and
                  Manish Okade},
  title        = {Exposing Image Resizing utilizing Welch Power Spectral Density Analysis
                  for Double Compressed {JPEG} Images},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630784},
  doi          = {10.1109/WIFS.2018.8630784},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SahuO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TkachenkoD18,
  author       = {Iuliia Tkachenko and
                  Christophe Destruel},
  title        = {Exploitation of redundancy for pattern estimation of copy-sensitive
                  two level {QR} code},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630792},
  doi          = {10.1109/WIFS.2018.8630792},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TkachenkoD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VukoticCF18,
  author       = {Vedran Vukotic and
                  Vivien Chappelier and
                  Teddy Furon},
  title        = {Are Deep Neural Networks good for blind image watermarking?},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630768},
  doi          = {10.1109/WIFS.2018.8630768},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VukoticCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangLLK18,
  author       = {Lihua Wang and
                  Huixin Liang and
                  Xiaodan Lin and
                  Xiangui Kang},
  title        = {Revealing the processing history of pitch-shifted voice using CNNs},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630783},
  doi          = {10.1109/WIFS.2018.8630783},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WangLLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WertherFPKCW18,
  author       = {Caroline Werther and
                  Morgan Ferguson and
                  Kevin Park and
                  Troy Kling and
                  Cuixian Chen and
                  Yishi Wang},
  title        = {Gender Effect on Face Recognition for a Large Longitudinal Database},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630762},
  doi          = {10.1109/WIFS.2018.8630762},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WertherFPKCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YuTLLL18,
  author       = {Xiangyu Yu and
                  Huabin Tan and
                  Hui Liang and
                  Chang{-}Tsun Li and
                  Guangjun Liao},
  title        = {A Multi-Task Learning {CNN} for Image Steganalysis},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630766},
  doi          = {10.1109/WIFS.2018.8630766},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YuTLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2018,
  title        = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8627366/proceeding},
  isbn         = {978-1-5386-6536-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AgarwalF17,
  author       = {Shruti Agarwal and
                  Hany Farid},
  title        = {Photo forensics from {JPEG} dimples},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267641},
  doi          = {10.1109/WIFS.2017.8267641},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AgarwalF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AmeriniUC17,
  author       = {Irene Amerini and
                  Tiberio Uricchio and
                  Roberto Caldelli},
  title        = {Tracing images back to their social network of origin: {A} CNN-based
                  approach},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267660},
  doi          = {10.1109/WIFS.2017.8267660},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AmeriniUC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AmsalegBBEHNR17,
  author       = {Laurent Amsaleg and
                  James Bailey and
                  Dominique Barbe and
                  Sarah M. Erfani and
                  Michael E. Houle and
                  Vinh Nguyen and
                  Milos Radovanovic},
  title        = {The vulnerability of learning to adversarial perturbation increases
                  with intrinsic dimensionality},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267651},
  doi          = {10.1109/WIFS.2017.8267651},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AmsalegBBEHNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AvatefipourHTM17,
  author       = {Omid Avatefipour and
                  Azeem Hafeez and
                  Muhammad Tayyab and
                  Hafiz Malik},
  title        = {Linking received packet to the transmitter through physical-fingerprinting
                  of controller area network},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267643},
  doi          = {10.1109/WIFS.2017.8267643},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AvatefipourHTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaurB17,
  author       = {Sebastian Baur and
                  Holger Boche},
  title        = {Robust secure storage of data sources with perfect secrecy},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267669},
  doi          = {10.1109/WIFS.2017.8267669},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BaurB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BocheD17,
  author       = {Holger Boche and
                  Christian Deppe},
  title        = {Secure identification under jamming attacks},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267648},
  doi          = {10.1109/WIFS.2017.8267648},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BocheD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BondiPBT17,
  author       = {Luca Bondi and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Design of projection matrices for {PRNU} compression},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267652},
  doi          = {10.1109/WIFS.2017.8267652},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BondiPBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CekerU17,
  author       = {Hayreddin {\c{C}}eker and
                  Shambhu J. Upadhyaya},
  title        = {Sensitivity analysis in keystroke dynamics using convolutional neural
                  networks},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267667},
  doi          = {10.1109/WIFS.2017.8267667},
  timestamp    = {Wed, 31 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CekerU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenTLNZB17,
  author       = {Zhipeng Chen and
                  Benedetta Tondi and
                  Xiaolong Li and
                  Rongrong Ni and
                  Yao Zhao and
                  Mauro Barni},
  title        = {A gradient-based pixel-domain attack against {SVM} detection of global
                  image manipulations},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267668},
  doi          = {10.1109/WIFS.2017.8267668},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenTLNZB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ContiLLLQ17,
  author       = {Mauro Conti and
                  Daniele Lain and
                  Riccardo Lazzeretti and
                  Giulio Lovisotto and
                  Walter Quattrociocchi},
  title        = {It's always April fools' day!: On the difficulty of social network
                  misinformation classification via propagation features},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267653},
  doi          = {10.1109/WIFS.2017.8267653},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ContiLLLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DurmusMTUM17,
  author       = {Emre Durmus and
                  Manoranjan Mohanty and
                  Samet Taspinar and
                  Erkam Uzun and
                  Nasir D. Memon},
  title        = {Image carving with missing headers and missing fragments},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267665},
  doi          = {10.1109/WIFS.2017.8267665},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DurmusMTUM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GougeonBLAR17,
  author       = {Thomas Gougeon and
                  Morgan Barbier and
                  Patrick Lacharme and
                  Gildas Avoine and
                  Christophe Rosenberger},
  title        = {Retrieving dates in smart card dumps is as hard as finding a needle
                  in a haystack},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267663},
  doi          = {10.1109/WIFS.2017.8267663},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GougeonBLAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HelslootTE17,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {AHEad: Privacy-preserving online behavioural advertising using homomorphic
                  encryption},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267662},
  doi          = {10.1109/WIFS.2017.8267662},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HelslootTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangHSLS17,
  author       = {Jiaju Huang and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Timothy Law and
                  Adam Sherwin},
  title        = {Benchmarking keystroke authentication algorithms},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267670},
  doi          = {10.1109/WIFS.2017.8267670},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangHSLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/IwazakiI17,
  author       = {Sho Iwazaki and
                  Koichi Ichige},
  title        = {Extended beamforming by sum and difference composite co-array for
                  radio surveillance},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267658},
  doi          = {10.1109/WIFS.2017.8267658},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/IwazakiI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JimenezR17,
  author       = {Abelino Jimenez and
                  Bhiksha Raj},
  title        = {A two factor transformation for speaker verification through {\(\mathscr{l}\)}1
                  comparison},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267661},
  doi          = {10.1109/WIFS.2017.8267661},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JimenezR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KnirschEE17,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Zekeriya Erkin},
  title        = {A fault-tolerant and efficient scheme for data aggregation over groups
                  in the smart grid},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267646},
  doi          = {10.1109/WIFS.2017.8267646},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KnirschEE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LenziniORRGLN17,
  author       = {Gabriele Lenzini and
                  Samir Ouchani and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Yong Geng and
                  Jan Lagerwall and
                  JungHyun Noh},
  title        = {Security in the shell: An optical physical unclonable function made
                  of shells of cholesteric liquid crystals},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267644},
  doi          = {10.1109/WIFS.2017.8267644},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LenziniORRGLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiSGPJ17,
  author       = {Borui Li and
                  Han Sun and
                  Yang Gao and
                  Vir V. Phoha and
                  Zhanpeng Jin},
  title        = {Enhanced free-text keystroke continuous authentication based on dynamics
                  of wrist motion},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267642},
  doi          = {10.1109/WIFS.2017.8267642},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LiSGPJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NandakumarRPD17,
  author       = {Karthik Nandakumar and
                  Nalini K. Ratha and
                  Sharath Pankanti and
                  Shelby Darnell},
  title        = {Secure one-time biometrie tokens for non-repudiable multi-party transactions},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267654},
  doi          = {10.1109/WIFS.2017.8267654},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/NandakumarRPD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RahmouniNYE17,
  author       = {Nicolas Rahmouni and
                  Vincent Nozick and
                  Junichi Yamagishi and
                  Isao Echizen},
  title        = {Distinguishing computer graphics from natural images using convolution
                  neural networks},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267647},
  doi          = {10.1109/WIFS.2017.8267647},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RahmouniNYE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RazeghiVKT17,
  author       = {Behrooz Razeghi and
                  Slava Voloshynovskiy and
                  Dimche Kostadinov and
                  Olga Taran},
  title        = {Privacy preserving identification using sparse approximation with
                  ambiguization},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267664},
  doi          = {10.1109/WIFS.2017.8267664},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RazeghiVKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SchramlDKU17,
  author       = {Rudolf Schraml and
                  Luca Debiasi and
                  Christof Kauba and
                  Andreas Uhl},
  title        = {On the feasibility of classification-based product package authentication},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267659},
  doi          = {10.1109/WIFS.2017.8267659},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SchramlDKU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/StankoS17,
  author       = {Taras Stanko and
                  Boris Skoric},
  title        = {Minutia-pair spectral representations for fingerprint template protection},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267656},
  doi          = {10.1109/WIFS.2017.8267656},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/StankoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SunH17,
  author       = {Zhaohui Sun and
                  Anthony Hoogs},
  title        = {Object insertion and removal in images with mirror reflection},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267645},
  doi          = {10.1109/WIFS.2017.8267645},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SunH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TandoganST17,
  author       = {Sinan E. Tandogan and
                  Husrev T. Sencar and
                  B{\"{u}}lent Tavli},
  title        = {Towards measuring uniqueness of human voice},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267666},
  doi          = {10.1109/WIFS.2017.8267666},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TandoganST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TestaBM17,
  author       = {Matteo Testa and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Energy obfuscation for compressive encryption and processing},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267649},
  doi          = {10.1109/WIFS.2017.8267649},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TestaBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TieuNNYE17,
  author       = {Ngoc{-}Dung T. Tieu and
                  Huy H. Nguyen and
                  Hoang{-}Quoc Nguyen{-}Son and
                  Junichi Yamagishi and
                  Isao Echizen},
  title        = {An approach for gait anonymization using deep learning},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267657},
  doi          = {10.1109/WIFS.2017.8267657},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TieuNNYE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VerdeMBT17,
  author       = {Sebastiano Verde and
                  Simone Milani and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Audio phylogenetic analysis using geometric transforms},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267650},
  doi          = {10.1109/WIFS.2017.8267650},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VerdeMBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhuYJH17,
  author       = {Yanming Zhu and
                  Xuefei Yin and
                  Xiuping Jia and
                  Jiankun Hu},
  title        = {Latent fingerprint segmentation based on convolutional neural networks},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267655},
  doi          = {10.1109/WIFS.2017.8267655},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhuYJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2017,
  title        = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8258575/proceeding},
  isbn         = {978-1-5090-6769-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AndriotisSS16,
  author       = {Panagiotis Andriotis and
                  Martina Angela Sasse and
                  Gianluca Stringhini},
  title        = {Permissions snapshots: Assessing users' adaptation to the Android
                  runtime permission model},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823922},
  doi          = {10.1109/WIFS.2016.7823922},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AndriotisSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniCT16,
  author       = {Mauro Barni and
                  Zhipeng Chen and
                  Benedetta Tondi},
  title        = {Adversary-aware, data-driven detection of double {JPEG} compression:
                  How to make counter-forensics harder},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823902},
  doi          = {10.1109/WIFS.2016.7823902},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Bas16,
  author       = {Patrick Bas},
  title        = {Steganography via cover-source switching},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823905},
  doi          = {10.1109/WIFS.2016.7823905},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Bas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BuscherKJK16,
  author       = {Niklas B{\"{u}}scher and
                  David Kretzmer and
                  Arnav Jindal and
                  Stefan Katzenbeisser},
  title        = {Scalable secure computation from {ANSI-C}},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823913},
  doi          = {10.1109/WIFS.2016.7823913},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BuscherKJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenZZYF16,
  author       = {Kejiang Chen and
                  Weiming Zhang and
                  Hang Zhou and
                  Nenghai Yu and
                  Guorui Feng},
  title        = {Defining cost functions for adaptive steganography at the microscale},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823900},
  doi          = {10.1109/WIFS.2016.7823900},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenZZYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CostaLBDTR16,
  author       = {Filipe de Oliveira Costa and
                  Silvia Lameri and
                  Paolo Bestagini and
                  Zanoni Dias and
                  Stefano Tubaro and
                  Anderson Rocha},
  title        = {Hash-based frame selection for video phylogeny},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823906},
  doi          = {10.1109/WIFS.2016.7823906},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CostaLBDTR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CoudriauLF16,
  author       = {Marc Coudriau and
                  Abdelkader Lahmadi and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois},
  title        = {Topological analysis and visualisation of network monitoring data:
                  Darknet case study},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823920},
  doi          = {10.1109/WIFS.2016.7823920},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CoudriauLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CozzolinoV16,
  author       = {Davide Cozzolino and
                  Luisa Verdoliva},
  title        = {Single-image splicing localization through autoencoder-based anomaly
                  detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823921},
  doi          = {10.1109/WIFS.2016.7823921},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CozzolinoV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DingR16,
  author       = {Yaohui Ding and
                  Arun Ross},
  title        = {An ensemble of one-class SVMs for fingerprint spoof detection across
                  different fabrication materials},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823572},
  doi          = {10.1109/WIFS.2016.7823572},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DingR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FerdowsiVKH16,
  author       = {Sohrab Ferdowsi and
                  Slava Voloshynovskiy and
                  Dimche Kostadinov and
                  Taras Holotyak},
  title        = {Fast content identification in high-dimensional feature spaces using
                  Sparse Ternary Codes},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823919},
  doi          = {10.1109/WIFS.2016.7823919},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FerdowsiVKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GuiYJRL16,
  author       = {Qiong Gui and
                  Wei Yang and
                  Zhanpeng Jin and
                  Maria V. Ruiz{-}Blondet and
                  Sarah Laszlo},
  title        = {A residual feature-based replay attack detection approach for brainprint
                  biometric systems},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823907},
  doi          = {10.1109/WIFS.2016.7823907},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GuiYJRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangHSU16,
  author       = {Jiaju Huang and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Shambhu J. Upadhyaya},
  title        = {Effects of text filtering on authentication performance of keystroke
                  biometrics},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823899},
  doi          = {10.1109/WIFS.2016.7823899},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangHSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KabatianskyFE16,
  author       = {Grigory Kabatiansky and
                  Marcel Fernandez and
                  Elena Egorova},
  title        = {Multimedia fingerprinting codes resistant against colluders and noise},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823904},
  doi          = {10.1109/WIFS.2016.7823904},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KabatianskyFE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KhanjiJIM16,
  author       = {Salam Ismail Rasheed Khanji and
                  Raja Jabir and
                  Farkhund Iqbal and
                  Andrew Marrington},
  title        = {Forensic analysis of xbox one and playstation 4 gaming consoles},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823917},
  doi          = {10.1109/WIFS.2016.7823917},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KhanjiJIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KomarekGP16,
  author       = {Tom{\'{a}}s Kom{\'{a}}rek and
                  Martin Grill and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Passive {NAT} detection using {HTTP} access logs},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823896},
  doi          = {10.1109/WIFS.2016.7823896},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KomarekGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KorusH16,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Evaluation of random field models in multi-modal unsupervised tampering
                  localization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823898},
  doi          = {10.1109/WIFS.2016.7823898},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KorusH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Macia-Fernandez16,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jos{\'{e}} Camacho and
                  Pedro Garcia{-}Teodoro and
                  Rafael A. Rodr{\'{\i}}guez{-}G{\'{o}}mez},
  title        = {Hierarchical PCA-based multivariate statistical network monitoring
                  for anomaly detection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823895},
  doi          = {10.1109/WIFS.2016.7823895},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Macia-Fernandez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MarraPSV16,
  author       = {Francesco Marra and
                  Giovanni Poggi and
                  Carlo Sansone and
                  Luisa Verdoliva},
  title        = {Correlation clustering for PRNU-based blind image source identification},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823910},
  doi          = {10.1109/WIFS.2016.7823910},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MarraPSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MilaniBT16,
  author       = {Simone Milani and
                  Paolo Bestagini and
                  Stefano Tubaro},
  title        = {Phylogenetic analysis of near-duplicate and semantically-similar images
                  using viewpoint localization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823909},
  doi          = {10.1109/WIFS.2016.7823909},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MilaniBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MongaZ16,
  author       = {Amnol Monga and
                  Quanyan Zhu},
  title        = {On solving large-scale low-rank zero-sum security games of incomplete
                  information},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823923},
  doi          = {10.1109/WIFS.2016.7823923},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MongaZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NateghizadEL16,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Efficient and secure equality tests},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823915},
  doi          = {10.1109/WIFS.2016.7823915},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NateghizadEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PawlickZ16,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {A Stackelberg game perspective on the conflict between machine learning
                  and data obfuscation},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823893},
  doi          = {10.1109/WIFS.2016.7823893},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PawlickZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Pedrouzo-UlloaT16,
  author       = {Alberto Pedrouzo{-}Ulloa and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Image denoising in the encrypted domain},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823916},
  doi          = {10.1109/WIFS.2016.7823916},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Pedrouzo-UlloaT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RaoN16,
  author       = {Yuan Rao and
                  Jiangqun Ni},
  title        = {A deep learning approach to detection of splicing and copy-move forgeries
                  in images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823911},
  doi          = {10.1109/WIFS.2016.7823911},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/RaoN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SharmaSJME16,
  author       = {Shishir Sharma and
                  A. Venkata Subramanyam and
                  Monika Jain and
                  Ambuj Mehrish and
                  Sabu Emmanuel},
  title        = {Anti-forensic technique for median filtering using {L1-L2} {TV} model},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823571},
  doi          = {10.1109/WIFS.2016.7823571},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SharmaSJME16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SunCU16,
  author       = {Yan Sun and
                  Hayreddin {\c{C}}eker and
                  Shambhu J. Upadhyaya},
  title        = {Shared keystroke dataset for continuous authentication},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823894},
  doi          = {10.1109/WIFS.2016.7823894},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SunCU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TaspinarMM16,
  author       = {Samet Taspinar and
                  Manoranjan Mohanty and
                  Nasir D. Memon},
  title        = {Source camera attribution using stabilized video},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823918},
  doi          = {10.1109/WIFS.2016.7823918},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TaspinarMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TuamaCC16,
  author       = {Amel Tuama and
                  Fr{\'{e}}d{\'{e}}ric Comby and
                  Marc Chaumont},
  title        = {Camera model identification with the use of deep convolutional neural
                  networks},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823908},
  doi          = {10.1109/WIFS.2016.7823908},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TuamaCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VuOS16,
  author       = {Minh Thanh Vu and
                  Tobias J. Oechtering and
                  Mikael Skoglund},
  title        = {Polar code for secure Wyner-Ziv coding},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823897},
  doi          = {10.1109/WIFS.2016.7823897},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VuOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WuBLFH16,
  author       = {Xiaoting Wu and
                  Elhocine Boutellaa and
                  Miguel Bordallo L{\'{o}}pez and
                  Xiaoyi Feng and
                  Abdenour Hadid},
  title        = {On the usefulness of color for kinship verification from face images},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823901},
  doi          = {10.1109/WIFS.2016.7823901},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WuBLFH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WuWS16,
  author       = {Han{-}Zhou Wu and
                  Hong{-}Xia Wang and
                  Yun{-}Qing Shi},
  title        = {Dynamic content selection-and-prediction framework applied to reversible
                  data hiding},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823903},
  doi          = {10.1109/WIFS.2016.7823903},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WuWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YanOT16,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Theo Tryfonas},
  title        = {Cryptographic randomness on a {CC2538:} {A} case study},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823912},
  doi          = {10.1109/WIFS.2016.7823912},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YanOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2016,
  title        = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7811906/proceeding},
  isbn         = {978-1-5090-1138-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Alonso-Fernandez15,
  author       = {Fernando Alonso{-}Fernandez and
                  Reuben A. Farrugia and
                  Josef Big{\"{u}}n},
  title        = {Reconstruction of smartphone images for low resolution iris recognition},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368600},
  doi          = {10.1109/WIFS.2015.7368600},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Alonso-Fernandez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Balado15,
  author       = {F{\'{e}}lix Balado},
  title        = {Optimum reversible data hiding and permutation coding},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368572},
  doi          = {10.1109/WIFS.2015.7368572},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Balado15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCKLS15,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Firas Kraiem and
                  Roch Lescuyer and
                  Eduardo Soria{-}Vazquez},
  title        = {Some applications of verifiable computation to biometric verification},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368568},
  doi          = {10.1109/WIFS.2015.7368568},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BringerCKLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CarneinSB15,
  author       = {Matthias Carnein and
                  Pascal Sch{\"{o}}ttle and
                  Rainer B{\"{o}}hme},
  title        = {Forensics of high-quality {JPEG} images with color subsampling},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368556},
  doi          = {10.1109/WIFS.2015.7368556},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CarneinSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenS15,
  author       = {Chen Chen and
                  Matthew C. Stamm},
  title        = {Camera model identification framework using an ensemble of demosaicing
                  features},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368573},
  doi          = {10.1109/WIFS.2015.7368573},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Cogranne15,
  author       = {R{\'{e}}mi Cogranne},
  title        = {A sequential method for online steganalysis},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368596},
  doi          = {10.1109/WIFS.2015.7368596},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Cogranne15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CogranneSFP15,
  author       = {R{\'{e}}mi Cogranne and
                  Vahid Sedighi and
                  Jessica J. Fridrich and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Is ensemble classifier needed for steganalysis in high-dimensional
                  feature spaces?},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368597},
  doi          = {10.1109/WIFS.2015.7368597},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CogranneSFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ContiCPS15,
  author       = {Mauro Conti and
                  Vittoria Cozza and
                  Marinella Petrocchi and
                  Angelo Spognardi},
  title        = {{TRAP:} Using Targeted ads to unveil Google personal profiles},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368607},
  doi          = {10.1109/WIFS.2015.7368607},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ContiCPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CozzolinoPV15,
  author       = {Davide Cozzolino and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  title        = {Splicebuster: {A} new blind image splicing detector},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368565},
  doi          = {10.1109/WIFS.2015.7368565},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CozzolinoPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DenemarkF15,
  author       = {Tom{\'{a}}s Denemark and
                  Jessica J. Fridrich},
  title        = {Side-informed steganography with additive distortion},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368589},
  doi          = {10.1109/WIFS.2015.7368589},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DenemarkF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/EastonSHBDP15,
  author       = {Roger L. Easton Jr. and
                  Kevin Sacca and
                  Gregory Heyworth and
                  Kenneth Boydston and
                  Chet Van Duzer and
                  Michael Phelps},
  title        = {Rediscovering text in the Yale Martellus map},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368592},
  doi          = {10.1109/WIFS.2015.7368592},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/EastonSHBDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/El-NaggarR15,
  author       = {Susan El{-}Naggar and
                  Arun Ross},
  title        = {Which dataset is this iris image from?},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368570},
  doi          = {10.1109/WIFS.2015.7368570},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/El-NaggarR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Erkin15,
  author       = {Zekeriya Erkin},
  title        = {Private data aggregation with groups for smart grids in a dynamic
                  setting using {CRT}},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368584},
  doi          = {10.1109/WIFS.2015.7368584},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Erkin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/EsquefAB15,
  author       = {Paulo A. A. Esquef and
                  Jos{\'{e}} Antonio Apolin{\'{a}}rio and
                  Luiz W. P. Biscainho},
  title        = {Improved edit detection in speech via {ENF} patterns},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368585},
  doi          = {10.1109/WIFS.2015.7368585},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/EsquefAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FanWC15,
  author       = {Wei Fan and
                  Kai Wang and
                  Fran{\c{c}}ois Cayre},
  title        = {General-purpose image forensics using patch likelihood under image
                  statistical models},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368606},
  doi          = {10.1109/WIFS.2015.7368606},
  timestamp    = {Tue, 12 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FanWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FarhadzadehWV15,
  author       = {Farzad Farhadzadeh and
                  Frans M. J. Willems and
                  Sviatoslav Voloshynovskiy},
  title        = {Information-theoretical limits of active content fingerprinting in
                  content-based identification systems},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368605},
  doi          = {10.1109/WIFS.2015.7368605},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FarhadzadehWV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FaridulD15,
  author       = {Hasan Sheikh Faridul and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  title        = {A population of eagles, horses, and moles: Perceptual sensitivity
                  to watermark disparity coherence},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368562},
  doi          = {10.1109/WIFS.2015.7368562},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FaridulD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FernandezEK15,
  author       = {Marcel Fernandez and
                  Elena Egorova and
                  Grigory Kabatiansky},
  title        = {Binary fingerprinting codes - can we prove that someone is guilty?!},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368558},
  doi          = {10.1109/WIFS.2015.7368558},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FernandezEK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GangwarJ15,
  author       = {Abhishek Kumar Gangwar and
                  Akanksha Joshi},
  title        = {Local Gabor Rank Pattern {(LGRP):} {A} novel descriptor for face representation
                  and recognition},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368581},
  doi          = {10.1109/WIFS.2015.7368581},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GangwarJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarnaevT15,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Impact of incomplete knowledge on scanning strategy},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368564},
  doi          = {10.1109/WIFS.2015.7368564},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GarnaevT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GrigorescuBS15,
  author       = {Andrea Grigorescu and
                  Holger Boche and
                  Rafael F. Schaefer},
  title        = {Robust {PUF} based authentication},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368560},
  doi          = {10.1109/WIFS.2015.7368560},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GrigorescuBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GunluIK15,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Onurcan Iscan and
                  Gerhard Kramer},
  title        = {Reliable secret key generation from physical unclonable functions
                  under varying environmental conditions},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368554},
  doi          = {10.1109/WIFS.2015.7368554},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GunluIK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HarutaTS15,
  author       = {Shuichiro Haruta and
                  Kentaroh Toyoda and
                  Iwao Sasase},
  title        = {Trust-based Sybil nodes detection with robust seed selection and graph
                  pruning on {SNS}},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368595},
  doi          = {10.1109/WIFS.2015.7368595},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HarutaTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HirayamaTS15,
  author       = {Takayuki Hirayama and
                  Kentaroh Toyoda and
                  Iwao Sasase},
  title        = {Fast target link flooding attack detection scheme by analyzing traceroute
                  packets flow},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368594},
  doi          = {10.1109/WIFS.2015.7368594},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HirayamaTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/IulianiFP15,
  author       = {Massimo Iuliani and
                  Giovanni Fabbri and
                  Alessandro Piva},
  title        = {Image splicing detection based on general perspective constraints},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368598},
  doi          = {10.1109/WIFS.2015.7368598},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/IulianiFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JiaSLM15,
  author       = {Ning Jia and
                  Victor Sanchez and
                  Chang{-}Tsun Li and
                  Hassan Mansour},
  title        = {The influence of segmentation on individual gait recognition},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368563},
  doi          = {10.1109/WIFS.2015.7368563},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/JiaSLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JimenezRPT15,
  author       = {Abelino Jimenez and
                  Bhiksha Raj and
                  Jos{\'{e}} Portelo and
                  Isabel Trancoso},
  title        = {Secure Modular Hashing},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368567},
  doi          = {10.1109/WIFS.2015.7368567},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/JimenezRPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Karthik15,
  author       = {Kannan Karthik},
  title        = {Key search and adaptation based on association rules for backward
                  secrecy},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368582},
  doi          = {10.1109/WIFS.2015.7368582},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Karthik15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KimLQK15,
  author       = {Suah Kim and
                  Rolf Lussi and
                  Xiaochao Qu and
                  Hyoung Joong Kim},
  title        = {Automatic contrast enhancement using reversible data hiding},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368603},
  doi          = {10.1109/WIFS.2015.7368603},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KimLQK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchnerC15,
  author       = {Matthias Kirchner and
                  Sujoy Chakraborty},
  title        = {A second look at first significant digit histogram restoration},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368578},
  doi          = {10.1109/WIFS.2015.7368578},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchnerC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KrishFR15,
  author       = {Ram P. Krish and
                  Julian Fi{\'{e}}rrez and
                  Daniel Ramos},
  title        = {Integrating rare minutiae in generic fingerprint matchers for forensics},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368557},
  doi          = {10.1109/WIFS.2015.7368557},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KrishFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuLH15,
  author       = {Ta{-}Yuan Liu and
                  Shih{-}Chun Lin and
                  Yao{-}Win Peter Hong},
  title        = {Multicasting with untrusted relays: {A} noncoherent secure network
                  coding approach},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368574},
  doi          = {10.1109/WIFS.2015.7368574},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MondalB15,
  author       = {Soumik Mondal and
                  Patrick Bours},
  title        = {Continuous authentication and identification for mobile devices: Combining
                  security and forensics},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368591},
  doi          = {10.1109/WIFS.2015.7368591},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MondalB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NguyenCDR15,
  author       = {Tan N. Nguyen and
                  R{\'{e}}mi Cogranne and
                  Guillaume Doyen and
                  Florent Retraint},
  title        = {Detection of interest flooding attacks in Named Data Networking using
                  hypothesis testing},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368571},
  doi          = {10.1109/WIFS.2015.7368571},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NguyenCDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NguyenK15,
  author       = {Binh Van Nguyen and
                  Kiseon Kim},
  title        = {Single relay selection for secure communication in a cooperative system
                  with multiple full-duplex decode-and-forward relays},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368590},
  doi          = {10.1109/WIFS.2015.7368590},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NguyenK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PengWDT15,
  author       = {Bo Peng and
                  Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  title        = {Improved 3D lighting environment estimation for image forgery detection},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368587},
  doi          = {10.1109/WIFS.2015.7368587},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PengWDT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PevnyN15,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Ivan Nikolaev},
  title        = {Optimizing pooling function for pooled steganalysis},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368555},
  doi          = {10.1109/WIFS.2015.7368555},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PevnyN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ProntiFUPP15,
  author       = {Lucilla Pronti and
                  Pasquale Ferrara and
                  Francesca Uccheddu and
                  Anna Pelagotti and
                  Alessandro Piva},
  title        = {Identification of pictorial materials by means of optimized multispectral
                  reflectance image processing},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368561},
  doi          = {10.1109/WIFS.2015.7368561},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ProntiFUPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/QuiringK15,
  author       = {Erwin Quiring and
                  Matthias Kirchner},
  title        = {Fragile sensor fingerprint camera identification},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368580},
  doi          = {10.1109/WIFS.2015.7368580},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/QuiringK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RaneFBU15,
  author       = {Shantanu Rane and
                  Julien Freudiger and
                  Alejandro E. Brito and
                  Ersin Uzun},
  title        = {Privacy, efficiency {\&} fault tolerance in aggregate computations
                  on massive star networks},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368608},
  doi          = {10.1109/WIFS.2015.7368608},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RaneFBU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RouxTBAWM15,
  author       = {St{\'{e}}phane G. Roux and
                  Nicolas Tremblay and
                  Pierre Borgnat and
                  Patrice Abry and
                  Herwig Wendt and
                  Paul Messier},
  title        = {Multiscale anisotropic texture unsupervised clustering for photographic
                  paper},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368593},
  doi          = {10.1109/WIFS.2015.7368593},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RouxTBAWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SajidC15,
  author       = {Hasan Sajid and
                  Sen{-}Ching Samson Cheung},
  title        = {VSig: Hand-gestured signature recognition and authentication with
                  wearable camera},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368566},
  doi          = {10.1109/WIFS.2015.7368566},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SajidC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SarkisyanDN15,
  author       = {Allen Sarkisyan and
                  Ryan Debbiny and
                  Ani Nahapetian},
  title        = {WristSnoop: Smartphone PINs prediction using smartwatch motion sensors},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368569},
  doi          = {10.1109/WIFS.2015.7368569},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SarkisyanDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricG15,
  author       = {Boris Skoric and
                  Wouter de Groot},
  title        = {Generalised tally-based decoders for traitor tracing and group testing},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368586},
  doi          = {10.1109/WIFS.2015.7368586},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SkoricG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TirunagariPBW15,
  author       = {Santosh Tirunagari and
                  Norman Poh and
                  Miroslaw Bober and
                  David Windridge},
  title        = {Windowed {DMD} as a microtexture descriptor for finger vein counter-spoofing
                  in biometrics},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368599},
  doi          = {10.1109/WIFS.2015.7368599},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TirunagariPBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TolosanaVOF15,
  author       = {Ruben Tolosana and
                  Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
                  Javier Ortega{-}Garcia and
                  Julian Fi{\'{e}}rrez},
  title        = {Update strategies for HMM-based dynamic signature biometric systems},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368583},
  doi          = {10.1109/WIFS.2015.7368583},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TolosanaVOF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TondiAPB15,
  author       = {Benedetta Tondi and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Mauro Barni},
  title        = {On the effectiveness of meta-detection for countering oracle attacks
                  in watermarking},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368576},
  doi          = {10.1109/WIFS.2015.7368576},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TondiAPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TondiBM15,
  author       = {Benedetta Tondi and
                  Mauro Barni and
                  Neri Merhav},
  title        = {Detection games with a fully active attacker},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368575},
  doi          = {10.1109/WIFS.2015.7368575},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TondiBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VogtS15,
  author       = {Hendrik Vogt and
                  Aydin Sezgin},
  title        = {Full-duplex vs. half-duplex secret-key generation},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368602},
  doi          = {10.1109/WIFS.2015.7368602},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VogtS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VuongLGB15,
  author       = {Tuan Phan Vuong and
                  George Loukas and
                  Diane Gan and
                  Anatolij Bezemskij},
  title        = {Decision tree-based detection of denial of service and command injection
                  attacks on robotic vehicles},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368559},
  doi          = {10.1109/WIFS.2015.7368559},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VuongLGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WachterG15,
  author       = {Philipp Wachter and
                  Michael Gruhn},
  title        = {Practicability study of android volatile memory forensic research},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368601},
  doi          = {10.1109/WIFS.2015.7368601},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WachterG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WolfJJ15,
  author       = {Anne Wolf and
                  Eduard A. Jorswieck and
                  Carsten Rudolf Janda},
  title        = {Worst-case secrecy rates in {MIMOME} systems under input and state
                  constraints},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368577},
  doi          = {10.1109/WIFS.2015.7368577},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WolfJJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Wong015,
  author       = {Chau{-}Wai Wong and
                  Min Wu},
  title        = {Counterfeit detection using paper {PUF} and mobile cameras},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368579},
  doi          = {10.1109/WIFS.2015.7368579},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Wong015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YangFZX15,
  author       = {Xiao Yang and
                  Jianjiang Feng and
                  Jie Zhou and
                  Shutao Xia},
  title        = {Detection and segmentation of latent fingerprints},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368604},
  doi          = {10.1109/WIFS.2015.7368604},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YangFZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
  title        = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7364553/proceeding},
  isbn         = {978-1-4673-6802-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/000114,
  author       = {Min Wu},
  title        = {Traces in the environment: exploring power network signatures for
                  information forensics},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084292},
  doi          = {10.1109/WIFS.2014.7084292},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/000114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AbidinM14,
  author       = {Aysajan Abidin and
                  Aikaterini Mitrokotsa},
  title        = {Security aspects of privacy-preserving biometric authentication based
                  on ideal lattices and ring-LWE},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {60--65},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084304},
  doi          = {10.1109/WIFS.2014.7084304},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AbidinM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AmeriniBCM14,
  author       = {Irene Amerini and
                  Rudy Becarelli and
                  Roberto Caldelli and
                  Andrea Del Mastio},
  title        = {Splicing forgeries localization through the use of first digit features},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {143--148},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084318},
  doi          = {10.1109/WIFS.2014.7084318},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AmeriniBCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniT14,
  author       = {Mauro Barni and
                  Benedetta Tondi},
  title        = {Source distinguishability under corrupted training},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {197--202},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084327},
  doi          = {10.1109/WIFS.2014.7084327},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaudryCVD14,
  author       = {S{\'{e}}verine Baudry and
                  Bertrand Chupeau and
                  Mario de Vito and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  title        = {Modeling the flicker effect in camcorded videos to improve watermark
                  robustness},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084301},
  doi          = {10.1109/WIFS.2014.7084301},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BaudryCVD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BhattaraiMJF14,
  author       = {Binod Bhattarai and
                  Alexis Mignon and
                  Fr{\'{e}}d{\'{e}}ric Jurie and
                  Teddy Furon},
  title        = {Puzzling face verification algorithms for privacy protection},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {66--71},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084305},
  doi          = {10.1109/WIFS.2014.7084305},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BhattaraiMJF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiM14,
  author       = {Tiziano Bianchi and
                  Enrico Magli},
  title        = {Analysis of the security of compressed sensing with circulant matrices},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084323},
  doi          = {10.1109/WIFS.2014.7084323},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BioglioBM14,
  author       = {Valerio Bioglio and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Secure compressed sensing over finite fields},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084326},
  doi          = {10.1109/WIFS.2014.7084326},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BioglioBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BuccoliBZST14,
  author       = {Michele Buccoli and
                  Paolo Bestagini and
                  Massimiliano Zanoni and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Unsupervised feature learning for bootleg detection using deep learning
                  architectures},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084316},
  doi          = {10.1109/WIFS.2014.7084316},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BuccoliBZST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenZHS14,
  author       = {Zhen Chen and
                  Yongbo Zeng and
                  Gerald Hefferman and
                  Yan Sun},
  title        = {FiberID: molecular-level secret for identification of things},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {84--88},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084308},
  doi          = {10.1109/WIFS.2014.7084308},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenZHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChupeauBD14,
  author       = {Bertrand Chupeau and
                  S{\'{e}}verine Baudry and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  title        = {Forensic characterization of pirated movies: digital cinema cam vs.
                  optical disc rip},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084320},
  doi          = {10.1109/WIFS.2014.7084320},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChupeauBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CogranneDF14,
  author       = {R{\'{e}}mi Cogranne and
                  Tom{\'{a}}s Denemark and
                  Jessica J. Fridrich},
  title        = {Theoretical model of the {FLD} ensemble classifier based on hypothesis
                  testing theory},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084322},
  doi          = {10.1109/WIFS.2014.7084322},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CogranneDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ComesanaP14,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {The optimal attack to histogram-based forensic detectors is simple(x)},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084317},
  doi          = {10.1109/WIFS.2014.7084317},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ComesanaP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Dang-NguyenCBN14,
  author       = {Duc{-}Tien Dang{-}Nguyen and
                  Valentina Conotter and
                  Giulia Boato and
                  Francesco G. B. De Natale},
  title        = {Video forensics based on expression dynamics},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084321},
  doi          = {10.1109/WIFS.2014.7084321},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Dang-NguyenCBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DenemarkSHCF14,
  author       = {Tom{\'{a}}s Denemark and
                  Vahid Sedighi and
                  Vojtech Holub and
                  R{\'{e}}mi Cogranne and
                  Jessica J. Fridrich},
  title        = {Selection-channel-aware rich model for Steganalysis of digital images},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084302},
  doi          = {10.1109/WIFS.2014.7084302},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DenemarkSHCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FrancoisF14,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Olivier Festor},
  title        = {Anomaly traceback using software defined networking},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {203--208},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084328},
  doi          = {10.1109/WIFS.2014.7084328},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FrancoisF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronD14,
  author       = {Teddy Furon and
                  Mathieu Desoubeaux},
  title        = {Tardos codes for real},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {24--29},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084298},
  doi          = {10.1109/WIFS.2014.7084298},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaboriniBMTT14,
  author       = {Lorenzo Gaborini and
                  Paolo Bestagini and
                  Simone Milani and
                  Marco Tagliasacchi and
                  Stefano Tubaro},
  title        = {Multi-Clue Image Tampering Localization},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084315},
  doi          = {10.1109/WIFS.2014.7084315},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaboriniBMTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarnaevT14,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Fair resource allocation under an unknown jamming attack: a Bayesian
                  game},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {227--232},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084332},
  doi          = {10.1109/WIFS.2014.7084332},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GarnaevT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GoljanFC14,
  author       = {Miroslav Goljan and
                  Jessica J. Fridrich and
                  R{\'{e}}mi Cogranne},
  title        = {Rich model for Steganalysis of color images},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {185--190},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084325},
  doi          = {10.1109/WIFS.2014.7084325},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GoljanFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Gonzalez-Serrano14,
  author       = {Francisco Javier Gonz{\'{a}}lez{-}Serrano and
                  Adrian Amor{-}Martin and
                  Jorge Casamayon{-}Anton},
  title        = {State estimation using an extended Kalman filter with privacy-protected
                  observed inputs},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {54--59},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084303},
  doi          = {10.1109/WIFS.2014.7084303},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Gonzalez-Serrano14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GrillR14,
  author       = {Martin Grill and
                  Martin Reh{\'{a}}k},
  title        = {Malware detection using {HTTP} user-agent discrepancy identification},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {221--226},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084331},
  doi          = {10.1109/WIFS.2014.7084331},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GrillR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HarperB14,
  author       = {Andrew D. Harper and
                  Robert J. Baxley},
  title        = {Asymptotic {MIMO} artificial-noise secrecy rates with eigenmode partitioning},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {78--83},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084307},
  doi          = {10.1109/WIFS.2014.7084307},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HarperB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KorusBD14,
  author       = {Pawel Korus and
                  Jaroslaw Bialas and
                  Andrzej Dziech},
  title        = {Iterative filtering for semi-fragile self-recovery},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {36--41},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084300},
  doi          = {10.1109/WIFS.2014.7084300},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KorusBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LeyvaSL14,
  author       = {Roberto Leyva and
                  Victor Sanchez and
                  Chang{-}Tsun Li},
  title        = {Video anomaly detection based on wake motion descriptors and perspective
                  grids},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {209--214},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084329},
  doi          = {10.1109/WIFS.2014.7084329},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LeyvaSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LuN14,
  author       = {Jingyang Lu and
                  Ruixin Niu},
  title        = {Malicious attacks on state estimation in multi-sensor dynamic systems},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084309},
  doi          = {10.1109/WIFS.2014.7084309},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LuN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MeryB14,
  author       = {Domingo Mery and
                  Kevin W. Bowyer},
  title        = {Face recognition via adaptive sparse representations of random patches},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084296},
  doi          = {10.1109/WIFS.2014.7084296},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MeryB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Ochoa-VillegasN14,
  author       = {Miguel A. Ochoa{-}Villegas and
                  Juan Arturo Nolazco{-}Flores and
                  Olivia Barron{-}Cano and
                  Ioannis A. Kakadiaris},
  title        = {Bidimensional empirical mode decomposition-based unlighting for face
                  recognition},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {19--23},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084297},
  doi          = {10.1109/WIFS.2014.7084297},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Ochoa-VillegasN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/OyaTP14,
  author       = {Simon Oya and
                  Carmela Troncoso and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Understanding the effects of real-world behavior in statistical disclosure
                  attacks},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {72--77},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084306},
  doi          = {10.1109/WIFS.2014.7084306},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/OyaTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PasquiniBP14,
  author       = {Cecilia Pasquini and
                  Giulia Boato and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Multiple {JPEG} compression detection by means of Benford-Fourier
                  coefficients},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {113--118},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084313},
  doi          = {10.1109/WIFS.2014.7084313},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PasquiniBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Rolland-Neviere14,
  author       = {Xavier Rolland{-}Nevi{\`{e}}re and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Pierre Alliez},
  title        = {Security analysis of radial-based 3D watermarking systems},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {30--35},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084299},
  doi          = {10.1109/WIFS.2014.7084299},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Rolland-Neviere14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SchmidtL14,
  author       = {Jorge F. Schmidt and
                  Roberto L{\'{o}}pez{-}Valcarce},
  title        = {Detecting Misreporting Attacks to the Proportional Fair Scheduler},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {95--100},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084310},
  doi          = {10.1109/WIFS.2014.7084310},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SchmidtL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SgroiBF14,
  author       = {Amanda Sgroi and
                  Kevin W. Bowyer and
                  Patrick J. Flynn},
  title        = {Metadata-based understanding of impostor pair score variations},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084295},
  doi          = {10.1109/WIFS.2014.7084295},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SgroiBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SiboniC14,
  author       = {Shachar Siboni and
                  Asaf Cohen},
  title        = {Botnet identification via universal anomaly detection},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084311},
  doi          = {10.1109/WIFS.2014.7084311},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SiboniC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Thai14,
  author       = {Thanh Hai Thai},
  title        = {Optimal detection of outguess using an accurate model of {DCT} coefficients},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {179--184},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084324},
  doi          = {10.1109/WIFS.2014.7084324},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Thai14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TianOH14,
  author       = {Qizhi Tian and
                  M{\'{a}}ire O'Neill and
                  Neil Hanley},
  title        = {Can leakage models be more efficient? non-linear models in side channel
                  attacks},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {215--220},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084330},
  doi          = {10.1109/WIFS.2014.7084330},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TianOH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Troncoso-Pastoriza14,
  author       = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Serena Caputo},
  title        = {Bootstrap-based proxy reencryption for private multi-user computing},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084312},
  doi          = {10.1109/WIFS.2014.7084312},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Troncoso-Pastoriza14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VerdolivaCP14,
  author       = {Luisa Verdoliva and
                  Davide Cozzolino and
                  Giovanni Poggi},
  title        = {A feature-based approach for image tampering detection and localization},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {149--154},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084319},
  doi          = {10.1109/WIFS.2014.7084319},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VerdolivaCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WongWKT14,
  author       = {Wei Jing Wong and
                  M. L. Dennis Wong and
                  Yau Hee Kho and
                  Andrew Beng Jin Teoh},
  title        = {Minutiae set to bit-string conversion using multi-scale bag-of-words
                  paradigm},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084294},
  doi          = {10.1109/WIFS.2014.7084294},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WongWKT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZandiAM14,
  author       = {Mohsen Zandi and
                  Ahmad Mahmoudi Aznaveh and
                  Azadeh Mansouri},
  title        = {Adaptive matching for copy-move Forgery detection},
  booktitle    = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  pages        = {119--124},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WIFS.2014.7084314},
  doi          = {10.1109/WIFS.2014.7084314},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZandiAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2014,
  title        = {2014 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2014, Atlanta, GA, USA, December 3-5, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7070475/proceeding},
  isbn         = {978-1-4799-8882-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BahramiKF13,
  author       = {Khosro Bahrami and
                  Alex C. Kot and
                  Jiayuan Fan},
  title        = {Splicing detection in out-of-focus blurred images},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707809},
  doi          = {10.1109/WIFS.2013.6707809},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BahramiKF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BaladoH13,
  author       = {F{\'{e}}lix Balado and
                  David Haughton},
  title        = {Optimum perfect steganography of memoryless sources as a rate-distortion
                  problem},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {174--179},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707814},
  doi          = {10.1109/WIFS.2013.6707814},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BaladoH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarasC13,
  author       = {Cl{\'{e}}o Baras and
                  Fran{\c{c}}ois Cayre},
  title        = {Towards a realistic channel model for security analysis of authentication
                  using graphical codes},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {115--119},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707804},
  doi          = {10.1109/WIFS.2013.6707804},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarasC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniT13,
  author       = {Mauro Barni and
                  Benedetta Tondi},
  title        = {Multiple-observation hypothesis testing under adversarial conditions},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707800},
  doi          = {10.1109/WIFS.2013.6707800},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BestaginiZAPST13,
  author       = {Paolo Bestagini and
                  Massimiliano Zanoni and
                  Luca Albonico and
                  Andrea Paganini and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Feature-based classification for audio bootlegs detection},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {126--131},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707806},
  doi          = {10.1109/WIFS.2013.6707806},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BestaginiZAPST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiPP13,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Near optimal detection of quantized signals and application to {JPEG}
                  forensics},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {168--173},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707813},
  doi          = {10.1109/WIFS.2013.6707813},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ConotterCP13,
  author       = {Valentina Conotter and
                  Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Joint detection of full-frame linear filtering and {JPEG} compression
                  in digital images},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707811},
  doi          = {10.1109/WIFS.2013.6707811},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ConotterCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DeCannR13,
  author       = {Brian DeCann and
                  Arun Ross},
  title        = {De-duplication errors in a biometric system: An investigative study},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707792},
  doi          = {10.1109/WIFS.2013.6707792},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DeCannR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ElicesP13,
  author       = {Juan A. Elices and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {The flow fingerprinting game},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707801},
  doi          = {10.1109/WIFS.2013.6707801},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ElicesP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Enzinger13,
  author       = {Ewald Enzinger},
  title        = {Testing the validity and reliability of forensic voice comparison
                  based on reassigned time-frequency representations of Chinese /iau/},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707787},
  doi          = {10.1109/WIFS.2013.6707787},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Enzinger13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving recommender systems in dynamic environments},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707795},
  doi          = {10.1109/WIFS.2013.6707795},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FontaniATB13,
  author       = {Marco Fontani and
                  Enrique Argones{-}R{\'{u}}a and
                  Carmela Troncoso and
                  Mauro Barni},
  title        = {The watchful forensic analyst: Multi-clue information fusion with
                  background knowledge},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {120--125},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707805},
  doi          = {10.1109/WIFS.2013.6707805},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FontaniATB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronJAM13,
  author       = {Teddy Furon and
                  Herv{\'{e}} J{\'{e}}gou and
                  Laurent Amsaleg and
                  Benjamin Mathon},
  title        = {Fast and secure similarity search in high dimensional space},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707797},
  doi          = {10.1109/WIFS.2013.6707797},
  timestamp    = {Wed, 24 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronJAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Hajj-AhmadG013,
  author       = {Adi Hajj{-}Ahmad and
                  Ravi Garg and
                  Min Wu},
  title        = {{ENF} based location classification of sensor recordings},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {138--143},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707808},
  doi          = {10.1109/WIFS.2013.6707808},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Hajj-AhmadG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangEE13,
  author       = {Chee Cheun Huang and
                  Julien Epps and
                  Ewald Enzinger},
  title        = {Separate {MAP} adaptation of {GMM} parameters for forensic voice comparison
                  on limited data},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707785},
  doi          = {10.1109/WIFS.2013.6707785},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangEE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Laarhoven13,
  author       = {Thijs Laarhoven},
  title        = {Dynamic traitor tracing schemes, revisited},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707817},
  doi          = {10.1109/WIFS.2013.6707817},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Laarhoven13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LabatiSS13,
  author       = {Ruggero Donida Labati and
                  Roberto Sassi and
                  Fabio Scotti},
  title        = {{ECG} biometric recognition: Permanence analysis of {QRS} signals
                  for 24 hours continuous authentication},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707790},
  doi          = {10.1109/WIFS.2013.6707790},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LabatiSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LazzerettiPB13,
  author       = {Riccardo Lazzeretti and
                  Tommaso Pignata and
                  Mauro Barni},
  title        = {Secure Evaluation of Private Functions through Piecewise Linear Approximation},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707794},
  doi          = {10.1109/WIFS.2013.6707794},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LazzerettiPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiK13,
  author       = {Xiaojie Li and
                  Adams Wai{-}Kin Kong},
  title        = {Restoring blood vessel patterns from {JPEG} compressed skin images
                  for forensic analysis},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707788},
  doi          = {10.1109/WIFS.2013.6707788},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LinZM13,
  author       = {Dajun Lin and
                  Huicheng Zheng and
                  Donghong Ma},
  title        = {Robust visual tracking using local salient coding and {PCA} subspace
                  modeling},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707789},
  doi          = {10.1109/WIFS.2013.6707789},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LinZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuSLSL13,
  author       = {Xiaocui Liu and
                  Jiande Sun and
                  Ju Liu},
  title        = {Shot-based temporally respective frame generation algorithm for video
                  hashing},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {109--114},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707803},
  doi          = {10.1109/WIFS.2013.6707803},
  timestamp    = {Thu, 22 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuSLSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MelloniBCBTT13,
  author       = {Andrea Melloni and
                  Paolo Bestagini and
                  Andrea Costanzo and
                  Mauro Barni and
                  Marco Tagliasacchi and
                  Stefano Tubaro},
  title        = {Attacking image classification based on bag-of-visual-words},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707802},
  doi          = {10.1109/WIFS.2013.6707802},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MelloniBCBTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Moreira-PerezCDB13,
  author       = {Juan Jose Moreira{-}Perez and
                  Bertrand Chupeau and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  S{\'{e}}verine Baudry},
  title        = {Exploring color information to characterize camcorder piracy},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {132--137},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707807},
  doi          = {10.1109/WIFS.2013.6707807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Moreira-PerezCDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RattaniPR13,
  author       = {Ajita Rattani and
                  Norman Poh and
                  Arun Ross},
  title        = {A Bayesian approach for modeling sensor influence on quality, liveness
                  and match score values in fingerprint verification},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707791},
  doi          = {10.1109/WIFS.2013.6707791},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RattaniPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Rozier13,
  author       = {Eric Rozier},
  title        = {The perils of cross-silo deduplication: Trading user security for
                  provider storage efficiency},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707799},
  doi          = {10.1109/WIFS.2013.6707799},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Rozier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricOD13,
  author       = {Boris Skoric and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {The holey grail {A} special score function for non-binary traitor
                  tracing},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707815},
  doi          = {10.1109/WIFS.2013.6707815},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SkoricOD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/StammCL13,
  author       = {Matthew C. Stamm and
                  Xiaoyu Chu and
                  K. J. Ray Liu},
  title        = {Forensically determining the order of signal processing operations},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {162--167},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707812},
  doi          = {10.1109/WIFS.2013.6707812},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/StammCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Terelius13,
  author       = {Bj{\"{o}}rn Terelius},
  title        = {Towards transferable watermarks in buyer-seller watermarking protocols},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {197--202},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707818},
  doi          = {10.1109/WIFS.2013.6707818},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Terelius13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Vazquez-PadinCP13,
  author       = {David Vazquez{-}Padin and
                  Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Set-membership identification of resampled signals},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707810},
  doi          = {10.1109/WIFS.2013.6707810},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Vazquez-PadinCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangN13,
  author       = {Junxiang Wang and
                  Jiangqun Ni},
  title        = {A {GA} optimization approach to {HS} based multiple reversible data
                  hiding},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {203--208},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707819},
  doi          = {10.1109/WIFS.2013.6707819},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangYC13,
  author       = {Yi Wang and
                  Pong C. Yuen and
                  Yiu{-}ming Cheung},
  title        = {Hashing fingerprints for identity de-duplication},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707793},
  doi          = {10.1109/WIFS.2013.6707793},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangZT13,
  author       = {Qia Wang and
                  Wenjun Zeng and
                  Jun Tian},
  title        = {Integrated secure watermark detection and privacy preserving storage
                  in the compressive sensing domain},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707796},
  doi          = {10.1109/WIFS.2013.6707796},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZeilemakerEPP13,
  author       = {Niels Zeilemaker and
                  Zekeriya Erkin and
                  Paolo Palmieri and
                  Johan A. Pouwelse},
  title        = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707798},
  doi          = {10.1109/WIFS.2013.6707798},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZeilemakerEPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhangW13,
  author       = {Xiaoqiang Zhang and
                  Z. Jane Wang},
  title        = {Correlation-and-bit-aware multiplicative spread spectrum embedding
                  for data hiding},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {186--190},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707816},
  doi          = {10.1109/WIFS.2013.6707816},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhaoED13,
  author       = {Xuran Zhao and
                  Nicholas W. D. Evans and
                  Jean{-}Luc Dugelay},
  title        = {Unsupervised multi-view dimensionality reduction with application
                  to audio-visual speaker retrieval},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707786},
  doi          = {10.1109/WIFS.2013.6707786},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhaoED13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2013,
  title        = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6693295/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AndriotisOT12,
  author       = {Panagiotis Andriotis and
                  George C. Oikonomou and
                  Theo Tryfonas},
  title        = {Forensic analysis of wireless networking evidence of Android smartphones},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {109--114},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412634},
  doi          = {10.1109/WIFS.2012.6412634},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AndriotisOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniT12,
  author       = {Mauro Barni and
                  Benedetta Tondi},
  title        = {Optimum forensic and counter-forensic strategies for source identification
                  with training data},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {199--204},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412649},
  doi          = {10.1109/WIFS.2012.6412649},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeekhofVF12,
  author       = {Fokko Beekhof and
                  Sviatoslav Voloshynovskiy and
                  Farzad Farhadzadeh},
  title        = {Content authentication and identification under informed attacks},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412638},
  doi          = {10.1109/WIFS.2012.6412638},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BeekhofVF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiP12,
  author       = {Tiziano Bianchi and
                  Alessandro Piva},
  title        = {Reverse engineering of double {JPEG} compression in the presence of
                  image resizing},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412637},
  doi          = {10.1109/WIFS.2012.6412637},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BocheW12,
  author       = {Holger Boche and
                  Rafael F. Wyrembelski},
  title        = {Comparison of different attack classes in arbitrarily varying wiretap
                  channels},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {270--275},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412661},
  doi          = {10.1109/WIFS.2012.6412661},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BocheW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Bravo-SolorioLN12,
  author       = {Sergio Bravo{-}Solorio and
                  Chang{-}Tsun Li and
                  Asoke K. Nandi},
  title        = {Watermarking method with exact self-propagating restoration capabilities},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {217--222},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412652},
  doi          = {10.1109/WIFS.2012.6412652},
  timestamp    = {Tue, 12 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Bravo-SolorioLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CaciulaC12,
  author       = {Ion Caciula and
                  Dinu Coltuc},
  title        = {Capacity control of reversible watermarking by two-thresholds embedding},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {223--227},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412653},
  doi          = {10.1109/WIFS.2012.6412653},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CaciulaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChenABD12,
  author       = {Xiao{-}Ming Chen and
                  Michael Arnold and
                  Peter G. Baum and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  title        = {{AC-3} bit stream watermarking},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {181--186},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412646},
  doi          = {10.1109/WIFS.2012.6412646},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChenABD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Comesana12,
  author       = {Pedro Comesa{\~{n}}a},
  title        = {Detection and information theoretic measures for quantifying the distinguishability
                  between multimedia operator chains},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {211--216},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412651},
  doi          = {10.1109/WIFS.2012.6412651},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Comesana12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Dang-NguyenBN12,
  author       = {Duc{-}Tien Dang{-}Nguyen and
                  Giulia Boato and
                  Francesco G. B. De Natale},
  title        = {Identify computer generated characters by analysing facial expressions
                  variation},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {252--257},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412658},
  doi          = {10.1109/WIFS.2012.6412658},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Dang-NguyenBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DeCannR12,
  author       = {Brian DeCann and
                  Arun Ross},
  title        = {Can a "poor" verification system be a "good" identification system?
                  {A} preliminary study},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412621},
  doi          = {10.1109/WIFS.2012.6412621},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DeCannR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ElicesP12,
  author       = {Juan A. Elices and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Fingerprinting a flow of messages to an anonymous server},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412632},
  doi          = {10.1109/WIFS.2012.6412632},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ElicesP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FradiD12,
  author       = {Hajer Fradi and
                  Jean{-}Luc Dugelay},
  title        = {Low level crowd analysis using frame-wise normalized feature for people
                  counting},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {246--251},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412657},
  doi          = {10.1109/WIFS.2012.6412657},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FradiD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Fridrich12,
  author       = {Jessica J. Fridrich},
  title        = {Effect of cover quantization on steganographic fisher information},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {163--168},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412643},
  doi          = {10.1109/WIFS.2012.6412643},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Fridrich12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronGC12,
  author       = {Teddy Furon and
                  Arnaud Guyader and
                  Fr{\'{e}}d{\'{e}}ric C{\'{e}}rou},
  title        = {Decoding fingerprints using the Markov Chain Monte Carlo method},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {187--192},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412647},
  doi          = {10.1109/WIFS.2012.6412647},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GargV012,
  author       = {Ravi Garg and
                  Avinash L. Varna and
                  Min Wu},
  title        = {Modeling and analysis of Electric Network Frequency signal for timestamp
                  verification},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412627},
  doi          = {10.1109/WIFS.2012.6412627},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GargV012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GerbrachtJZO12,
  author       = {Sabrina Gerbracht and
                  Eduard A. Jorswieck and
                  Gan Zheng and
                  Bj{\"{o}}rn E. Ottersten},
  title        = {Non-regenerative two-hop wiretap channels using interference neutralization},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {258--263},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412659},
  doi          = {10.1109/WIFS.2012.6412659},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GerbrachtJZO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GiulianoNV12,
  author       = {Romeo Giuliano and
                  Alessandro Neri and
                  Damiano Valletta},
  title        = {End-to-end secure connection in heterogeneous networks for critical
                  scenarios},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {264--269},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412660},
  doi          = {10.1109/WIFS.2012.6412660},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GiulianoNV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Gloe12,
  author       = {Thomas Gloe},
  title        = {Forensic analysis of ordered data structures on the example of {JPEG}
                  files},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412639},
  doi          = {10.1109/WIFS.2012.6412639},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Gloe12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GuoNS12,
  author       = {Linjie Guo and
                  Jiangqun Ni and
                  Yun{-}Qing Shi},
  title        = {An efficient {JPEG} steganographic scheme using uniform embedding},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {169--174},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412644},
  doi          = {10.1109/WIFS.2012.6412644},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GuoNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HolubF12,
  author       = {Vojtech Holub and
                  Jessica J. Fridrich},
  title        = {Designing steganographic distortion using directional filters},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {234--239},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412655},
  doi          = {10.1109/WIFS.2012.6412655},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HolubF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HospodarMV12,
  author       = {Gabriel Hospodar and
                  Roel Maes and
                  Ingrid Verbauwhede},
  title        = {Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses
                  strict bounds on usability},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412622},
  doi          = {10.1109/WIFS.2012.6412622},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HospodarMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangEKPSK12,
  author       = {Chengwei Huang and
                  Boris A. Efraty and
                  Uday Kurkure and
                  Manos Papadakis and
                  Shishir K. Shah and
                  Ioannis A. Kakadiaris},
  title        = {Facial landmark configuration for improved detection},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412618},
  doi          = {10.1109/WIFS.2012.6412618},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangEKPSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LaarhovenOD12,
  author       = {Thijs Laarhoven and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {Dynamic traitor tracing for arbitrary alphabets: Divide and conquer},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412656},
  doi          = {10.1109/WIFS.2012.6412656},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LaarhovenOD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LeF12,
  author       = {Pham Hai Dang Le and
                  Matthias O. Franz},
  title        = {How to find relevant training data: {A} paired bootstrapping approach
                  to blind steganalysis},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {228--233},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412654},
  doi          = {10.1109/WIFS.2012.6412654},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LeF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiP12,
  author       = {Jiangyuan Li and
                  Athina P. Petropulu},
  title        = {Optimality of beamforming for secrecy capacity of {MIMO} wiretap channels},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {276--281},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412662},
  doi          = {10.1109/WIFS.2012.6412662},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LinWR12,
  author       = {Bing{-}Rong Lin and
                  Ye Wang and
                  Shantanu Rane},
  title        = {A framework for privacy preserving statistical analysis on distributed
                  databases},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412626},
  doi          = {10.1109/WIFS.2012.6412626},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LinWR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuP12,
  author       = {Yupeng Liu and
                  Athina P. Petropulu},
  title        = {Destination assisted cooperative jamming for wireless physical layer
                  security},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {282--287},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412663},
  doi          = {10.1109/WIFS.2012.6412663},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuSW12,
  author       = {Changwei Liu and
                  Anoop Singhal and
                  Duminda Wijesekera},
  title        = {Mapping evidence graphs to attack graphs},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {121--126},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412636},
  doi          = {10.1109/WIFS.2012.6412636},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MaioranaBC12,
  author       = {Emanuele Maiorana and
                  Daniele Blasi and
                  Patrizio Campisi},
  title        = {Biometric template protection using turbo codes and modulation constellations},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412620},
  doi          = {10.1109/WIFS.2012.6412620},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MaioranaBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MarchalFSE12,
  author       = {Samuel Marchal and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Radu State and
                  Thomas Engel},
  title        = {Semantic based {DNS} forensics},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412631},
  doi          = {10.1109/WIFS.2012.6412631},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MarchalFSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MasciopintoC12,
  author       = {Miguel Masciopinto and
                  Pedro Comesa{\~{n}}a},
  title        = {{IPTV} streaming source classification},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {157--162},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412642},
  doi          = {10.1109/WIFS.2012.6412642},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MasciopintoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MerkelDV12,
  author       = {Ronny Merkel and
                  Jana Dittmann and
                  Claus Vielhauer},
  title        = {Novel fingerprint aging features using binary pixel sub-tendencies:
                  {A} comparison of contactless {CLSM} and {CWL} sensors},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412617},
  doi          = {10.1109/WIFS.2012.6412617},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MerkelDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Metzler12,
  author       = {J{\"{u}}rgen Metzler},
  title        = {Two-stage appearance-based re-identification of humans in low-resolution
                  videos},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412619},
  doi          = {10.1109/WIFS.2012.6412619},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Metzler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PanagakisK12,
  author       = {Yannis Panagakis and
                  Constantine Kotropoulos},
  title        = {Telephone handset identification by feature selection and sparse representations},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412628},
  doi          = {10.1109/WIFS.2012.6412628},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PanagakisK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Perez-GonzalezT12,
  author       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Carmela Troncoso},
  title        = {A Least Squares approach to user profiling in pool mix-based anonymous
                  communication systems},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {115--120},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412635},
  doi          = {10.1109/WIFS.2012.6412635},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Perez-GonzalezT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PeterH0K12,
  author       = {Andreas Peter and
                  Thomas Hartmann and
                  Sascha M{\"{u}}ller and
                  Stefan Katzenbeisser},
  title        = {Privacy-preserving architecture for forensic image recognition},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412629},
  doi          = {10.1109/WIFS.2012.6412629},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PeterH0K12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PevnyRG12,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Martin Reh{\'{a}}k and
                  Martin Grill},
  title        = {Detecting anomalous network hosts by means of {PCA}},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412633},
  doi          = {10.1109/WIFS.2012.6412633},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PevnyRG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PignataLB12,
  author       = {Tommaso Pignata and
                  Riccardo Lazzeretti and
                  Mauro Barni},
  title        = {General function evaluation in a {STPC} setting via piecewise linear
                  approximation},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412625},
  doi          = {10.1109/WIFS.2012.6412625},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PignataLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SchottMD12,
  author       = {Maik Schott and
                  Ronny Merkel and
                  Jana Dittmann},
  title        = {Sequence detection of overlapping latent fingerprints using a short-term
                  aging feature},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412630},
  doi          = {10.1109/WIFS.2012.6412630},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SchottMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SchottleKB12,
  author       = {Pascal Sch{\"{o}}ttle and
                  Stefan Korff and
                  Rainer B{\"{o}}hme},
  title        = {Weighted stego-image steganalysis for naive content-adaptive embedding},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {193--198},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412648},
  doi          = {10.1109/WIFS.2012.6412648},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SchottleKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SiFZ12,
  author       = {Xuanbin Si and
                  Jianjiang Feng and
                  Jie Zhou},
  title        = {Detecting fingerprint distortion from a single image},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412616},
  doi          = {10.1109/WIFS.2012.6412616},
  timestamp    = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SiFZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Vazquez-PadinC12,
  author       = {David Vazquez{-}Padin and
                  Pedro Comesa{\~{n}}a},
  title        = {{ML} estimation of the resampling factor},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {205--210},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412650},
  doi          = {10.1109/WIFS.2012.6412650},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Vazquez-PadinC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Vazquez-PadinFBCPB12,
  author       = {David Vazquez{-}Padin and
                  Marco Fontani and
                  Tiziano Bianchi and
                  Pedro Comesa{\~{n}}a and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Detection of video double encoding with {GOP} size estimation},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412641},
  doi          = {10.1109/WIFS.2012.6412641},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Vazquez-PadinFBCPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Veugen12,
  author       = {Thijs Veugen},
  title        = {Improving the {DGK} comparison protocol},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412624},
  doi          = {10.1109/WIFS.2012.6412624},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Veugen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyDBKK12,
  author       = {Sviatoslav Voloshynovskiy and
                  Maurits Diephuis and
                  Fokko Beekhof and
                  Oleksiy J. Koval and
                  Bruno Keel},
  title        = {Towards reproducible results in authentication based on physical non-cloneable
                  functions: The forensic authentication microstructure optical set
                  {(FAMOS)}},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412623},
  doi          = {10.1109/WIFS.2012.6412623},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyDBKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyFKH12,
  author       = {Sviatoslav Voloshynovskiy and
                  Farzad Farhadzadeh and
                  Oleksiy J. Koval and
                  Taras Holotyak},
  title        = {Active content fingerprinting: {A} marriage of digital watermarking
                  and content fingerprinting},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {175--180},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412645},
  doi          = {10.1109/WIFS.2012.6412645},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyFKH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YamadaGE12,
  author       = {Takayuki Yamada and
                  Seiichi Gohshi and
                  Isao Echizen},
  title        = {Preventing unauthorized copying of displayed information by utilizing
                  differences in spectral sensitivity between humans and imaging devices},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412640},
  doi          = {10.1109/WIFS.2012.6412640},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YamadaGE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2012,
  title        = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6395850/proceeding},
  isbn         = {978-1-4673-2285-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AboulkassimiAFFRT11,
  author       = {Driss Aboulkassimi and
                  Michel Agoyan and
                  Laurent Freund and
                  Jacques J. A. Fournier and
                  Bruno Robisson and
                  Assia Tria},
  title        = {ElectroMagnetic analysis {(EMA)} of software {AES} on Java mobile
                  phones},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123131},
  doi          = {10.1109/WIFS.2011.6123131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AboulkassimiAFFRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AubryBCMF11,
  author       = {Augusto Aubry and
                  A. Bazzoni and
                  Vincenzo Carotenuto and
                  Antonio De Maio and
                  P. Failla},
  title        = {Cumulants-based Radar Specific Emitter Identification},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123155},
  doi          = {10.1109/WIFS.2011.6123155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AubryBCMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BalachandranE11,
  author       = {Vivek Balachandran and
                  Sabu Emmanuel},
  title        = {Software code obfuscation by hiding control flow information in stack},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123121},
  doi          = {10.1109/WIFS.2011.6123121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BalachandranE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeyeEL11,
  author       = {Michael Beye and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Efficient privacy preserving K-means clustering in a three-party setting},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123148},
  doi          = {10.1109/WIFS.2011.6123148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BeyeEL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiP11,
  author       = {Tiziano Bianchi and
                  Alessandro Piva},
  title        = {Analysis of non-aligned double {JPEG} artifacts for the localization
                  of image forgeries},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123159},
  doi          = {10.1109/WIFS.2011.6123159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BiswasBF11,
  author       = {Soma Biswas and
                  Kevin W. Bowyer and
                  Patrick J. Flynn},
  title        = {A study of face recognition of identical twins by humans},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123126},
  doi          = {10.1109/WIFS.2011.6123126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BiswasBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BoufounosR11,
  author       = {Petros Boufounos and
                  Shantanu Rane},
  title        = {Secure binary embeddings for privacy preserving nearest neighbors},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123149},
  doi          = {10.1109/WIFS.2011.6123149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BoufounosR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BourlaiJ11,
  author       = {Thirimachos Bourlai and
                  Zain Jafri},
  title        = {Eye detection in the Middle-Wave Infrared spectrum: Towards recognition
                  in the dark},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123120},
  doi          = {10.1109/WIFS.2011.6123120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BourlaiJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BourlaiWK11,
  author       = {Thirimachos Bourlai and
                  Cameron Whitelam and
                  Ioannis A. Kakadiaris},
  title        = {Pupil detection under lighting and pose variations in the visible
                  and active infrared bands},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123139},
  doi          = {10.1109/WIFS.2011.6123139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BourlaiWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CaldelliAN11,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Andrea Novi},
  title        = {An analysis on attacker actions in fingerprint-copy attack in source
                  camera identification},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123122},
  doi          = {10.1109/WIFS.2011.6123122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CaldelliAN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CampisiSBFCMF11,
  author       = {Patrizio Campisi and
                  Gaetano Scarano and
                  Fabio Babiloni and
                  Fabrizio de Vico Fallani and
                  Stefania Colonnese and
                  Emanuele Maiorana and
                  Laura Forastiere},
  title        = {Brain waves based user recognition using the "eyes closed resting
                  conditions" protocol},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123138},
  doi          = {10.1109/WIFS.2011.6123138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/CampisiSBFCMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger},
  title        = {"Re-synchronization by moments": An efficient solution to align Side-Channel
                  traces},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123143},
  doi          = {10.1109/WIFS.2011.6123143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DebandeSNGLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DiasRG11,
  author       = {Zanoni Dias and
                  Anderson Rocha and
                  Siome Goldenstein},
  title        = {Video Phylogeny: Recovering near-duplicate video relationships},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123127},
  doi          = {10.1109/WIFS.2011.6123127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DiasRG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DuboisPB11,
  author       = {Loic Dubois and
                  William Puech and
                  Jacques Blanc{-}Talon},
  title        = {Smart selective encryption of {CAVLC} for {H.264/AVC} video},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123130},
  doi          = {10.1109/WIFS.2011.6123130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DuboisPB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ElicesPT11,
  author       = {Juan A. Elices and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Carmela Troncoso},
  title        = {Fingerprinting Tor's hidden service log files using a timing channel},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123154},
  doi          = {10.1109/WIFS.2011.6123154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ElicesPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/EsmaeiliWF11,
  author       = {Mani Malek Esmaeili and
                  Rabab K. Ward and
                  Mehrdad Fatourechi},
  title        = {Fast matching for video/audio fingerprinting algorithms},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123134},
  doi          = {10.1109/WIFS.2011.6123134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/EsmaeiliWF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FontaniBRPB11,
  author       = {Marco Fontani and
                  Tiziano Bianchi and
                  Alessia De Rosa and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {A Dempster-Shafer framework for decision fusion in image forensics},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123156},
  doi          = {10.1109/WIFS.2011.6123156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FontaniBRPB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FrancoisWBSE11,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shaonan Wang and
                  Walter Bronzi and
                  Radu State and
                  Thomas Engel},
  title        = {BotCloud: Detecting botnets using MapReduce},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123125},
  doi          = {10.1109/WIFS.2011.6123125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FrancoisWBSE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HicsonmezSA11,
  author       = {Samet Hicsonmez and
                  Husrev T. Sencar and
                  Ismail Avcibas},
  title        = {Audio codec identification through payload sampling},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123128},
  doi          = {10.1109/WIFS.2011.6123128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HicsonmezSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HodgersBO11,
  author       = {Philip Hodgers and
                  Keanhong Boey and
                  M{\'{a}}ire O'Neill},
  title        = {Variable window power spectral density attack},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123145},
  doi          = {10.1109/WIFS.2011.6123145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/HodgersBO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/JeonCMH11,
  author       = {Hyoungsuk Jeon and
                  Jinho Choi and
                  Steven W. McLaughlin and
                  Jeongseok Ha},
  title        = {Channel aware encryption and decision fusion for wireless sensor networks},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123135},
  doi          = {10.1109/WIFS.2011.6123135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/JeonCMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LazzerettiB11,
  author       = {Riccardo Lazzeretti and
                  Mauro Barni},
  title        = {Division between encrypted integers by means of Garbled Circuits},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123132},
  doi          = {10.1109/WIFS.2011.6123132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LazzerettiB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiK11,
  author       = {Sheng Li and
                  Alex C. Kot},
  title        = {Attack using reconstructed fingerprint},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123151},
  doi          = {10.1109/WIFS.2011.6123151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LinLWWHL11,
  author       = {Tsung{-}Yi Lin and
                  Yen{-}Yu Lin and
                  Ming{-}Fang Weng and
                  Yu{-}Chiang Frank Wang and
                  Yu{-}Feng Hsu and
                  Hong{-}Yuan Mark Liao},
  title        = {Cross camera people counting with perspective estimation and occlusion
                  handling},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123137},
  doi          = {10.1109/WIFS.2011.6123137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/LinLWWHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MachemieMLC11,
  author       = {Jean{-}Baptiste Machemie and
                  Clement Mazin and
                  Jean{-}Louis Lanet and
                  Julien Cartigny},
  title        = {SmartCM a smart card fault injection simulator},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123124},
  doi          = {10.1109/WIFS.2011.6123124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MachemieMLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MairgiotisYK11,
  author       = {Antonis Mairgiotis and
                  Yongyi Yang and
                  Lisimachos P. Kondi},
  title        = {DWT-based additive image watermarking using the Student-t prior},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123147},
  doi          = {10.1109/WIFS.2011.6123147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MairgiotisYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MaoFH11,
  author       = {Ziqing Mao and
                  Dinei A. F. Flor{\^{e}}ncio and
                  Cormac Herley},
  title        = {Painless migration from passwords to two factor authentication},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123150},
  doi          = {10.1109/WIFS.2011.6123150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MaoFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MastiLSEP11,
  author       = {Ramya Jayaram Masti and
                  Vincent Lenders and
                  Mario Strasser and
                  Stefan Engel and
                  Bernhard Plattner},
  title        = {Holmes: {A} data theft forensic framework},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123144},
  doi          = {10.1109/WIFS.2011.6123144},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MastiLSEP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Mayer11,
  author       = {Joceli Mayer},
  title        = {Improved Spread Spectrum multibit watermarking},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123146},
  doi          = {10.1109/WIFS.2011.6123146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Mayer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MerkelDV11,
  author       = {Ronny Merkel and
                  Jana Dittmann and
                  Claus Vielhauer},
  title        = {How contact pressure, contact time, smearing and oil/skin lotion influence
                  the aging of latent fingerprint traces: First results for the binary
                  pixel feature using a {CWL} sensor},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123153},
  doi          = {10.1109/WIFS.2011.6123153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MerkelDV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoreiraKF11,
  author       = {Jos{\'{e}} Moreira and
                  Grigory Kabatiansky and
                  Marcel Fernandez},
  title        = {Lower bounds on almost-separating binary codes},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123141},
  doi          = {10.1109/WIFS.2011.6123141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MoreiraKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/OthmanR11,
  author       = {Asem A. Othman and
                  Arun Ross},
  title        = {Mixing fingerprints for generating virtual identities},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123152},
  doi          = {10.1109/WIFS.2011.6123152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/OthmanR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PaoneF11,
  author       = {Jeffrey R. Paone and
                  Patrick J. Flynn},
  title        = {On the consistency of the biometric menagerie for irises and iris
                  matchers},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123158},
  doi          = {10.1109/WIFS.2011.6123158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PaoneF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PintoB11,
  author       = {Breno Silva Pinto and
                  Ryan Barnett},
  title        = {A novel algorithm for obfuscated code analysis},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123157},
  doi          = {10.1109/WIFS.2011.6123157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/PintoB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SaoY11,
  author       = {Anil Kumar Sao and
                  B. Yegnanarayana},
  title        = {Laplacian of smoothed image as representation for face recognition},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123140},
  doi          = {10.1109/WIFS.2011.6123140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SaoY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Tomas-BuliartGFS11,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Ana Gomez{-}Muro and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {Use of turbo codes with low-rate convolutional constituent codes in
                  fingerprinting scenarios},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123142},
  doi          = {10.1109/WIFS.2011.6123142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Tomas-BuliartGFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TrabelsiZ11,
  author       = {Zouheir Trabelsi and
                  Safaa Zeidan},
  title        = {Splay trees based early packet rejection mechanism against DoS traffic
                  targeting firewall default security rule},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123123},
  doi          = {10.1109/WIFS.2011.6123123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/TrabelsiZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Vazquez-PadinP11,
  author       = {David Vazquez{-}Padin and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Prefilter design for forensic resampling estimation},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123133},
  doi          = {10.1109/WIFS.2011.6123133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Vazquez-PadinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangDT11,
  author       = {Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  title        = {Exploring {DCT} coefficient quantization effect for image tampering
                  localization},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123129},
  doi          = {10.1109/WIFS.2011.6123129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/WangDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZengH11,
  author       = {Yi{-}Chong Zeng and
                  Chiou{-}Ting Hsu},
  title        = {Context intra-coding scheme for securing surveillance videos and its
                  applications},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123136},
  doi          = {10.1109/WIFS.2011.6123136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/ZengH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2011,
  title        = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6112284/proceeding},
  isbn         = {978-1-4577-1017-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/0001TS10,
  author       = {Peter A. Johnson and
                  Bozhao Tan and
                  Stephanie Schuckers},
  title        = {Multimodal fusion vulnerability to non-zero effort (spoof) imposters},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711469},
  doi          = {10.1109/WIFS.2010.5711469},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/0001TS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AdityaCSMG10,
  author       = {Telidevara Aditya and
                  Venkatachalam Chandrasekaran and
                  Avinash Srinivasan and
                  Ravi Mukkamala and
                  Sandeep Gampa},
  title        = {Similarity coefficient generators for network forensics},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711462},
  doi          = {10.1109/WIFS.2010.5711462},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AdityaCSMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AdjerohCPR10,
  author       = {Donald A. Adjeroh and
                  Deng Cao and
                  Marco Piccirilli and
                  Arun Ross},
  title        = {Predictability and correlation in human metrology},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711470},
  doi          = {10.1109/WIFS.2010.5711470},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AdjerohCPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AndaloTG10,
  author       = {Fernanda A. Andal{\'{o}} and
                  Gabriel Taubin and
                  Siome Goldenstein},
  title        = {Detecting vanishing points by segment clustering on the projective
                  plane for single-view photogrammetry},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711453},
  doi          = {10.1109/WIFS.2010.5711453},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AndaloTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniGL10,
  author       = {Mauro Barni and
                  Jorge Guajardo and
                  Riccardo Lazzeretti},
  title        = {Privacy preserving evaluation of signal quality with application to
                  {ECG} analysis},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711460},
  doi          = {10.1109/WIFS.2010.5711460},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BendaleB10,
  author       = {Abhijit Bendale and
                  Terrance E. Boult},
  title        = {id-Privacy in large scale biometric systems},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711439},
  doi          = {10.1109/WIFS.2010.5711439},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BendaleB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BuhanGK10,
  author       = {Ileana Buhan and
                  Jorge Guajardo and
                  Emile Kelkboom},
  title        = {Efficient strategies to play the indistinguishability game for fuzzy
                  sketches},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711473},
  doi          = {10.1109/WIFS.2010.5711473},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BuhanGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CaldelliAPI10,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni and
                  Matteo Innocenti},
  title        = {Fast image clustering of unknown source images},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711454},
  doi          = {10.1109/WIFS.2010.5711454},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CaldelliAPI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChristleinRA10,
  author       = {Vincent Christlein and
                  Christian Riess and
                  Elli Angelopoulou},
  title        = {On rotation invariance in copy-move forgery detection},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711472},
  doi          = {10.1109/WIFS.2010.5711472},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChristleinRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Chuang010,
  author       = {Wei{-}Hong Chuang and
                  Min Wu},
  title        = {Semi non-intrusive training for cell-phone camera model linkage},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711468},
  doi          = {10.1109/WIFS.2010.5711468},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Chuang010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DiasRG10,
  author       = {Zanoni Dias and
                  Anderson Rocha and
                  Siome Goldenstein},
  title        = {First steps toward image phylogeny},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711452},
  doi          = {10.1109/WIFS.2010.5711452},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DiasRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FillerF10,
  author       = {Tom{\'{a}}s Filler and
                  Jessica J. Fridrich},
  title        = {Minimizing additive distortion functions with non-binary embedding
                  operation in steganography},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711444},
  doi          = {10.1109/WIFS.2010.5711444},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FillerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FlorencioH10,
  author       = {Dinei Flor{\^{e}}ncio and
                  Cormac Herley},
  title        = {Phishing and money mules},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711465},
  doi          = {10.1109/WIFS.2010.5711465},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FlorencioH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FrancoisSEF10,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Radu State and
                  Thomas Engel and
                  Olivier Festor},
  title        = {Digital forensics in VoIP networks},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711450},
  doi          = {10.1109/WIFS.2010.5711450},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FrancoisSEF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FranzDHJ0S10,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711458},
  doi          = {10.1109/WIFS.2010.5711458},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FranzDHJ0S10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaddeAR10,
  author       = {Ravindra B. Gadde and
                  Donald A. Adjeroh and
                  Arun Ross},
  title        = {Indexing iris images using the Burrows-Wheeler Transform},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711467},
  doi          = {10.1109/WIFS.2010.5711467},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaddeAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaubatzS10,
  author       = {Matthew Gaubatz and
                  Steven J. Simske},
  title        = {Towards a feature set for robust printing-imaging cycle device identification
                  using structured printed markings},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711463},
  doi          = {10.1109/WIFS.2010.5711463},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaubatzS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HsiehLL10,
  author       = {Pei{-}Lun Hsieh and
                  Yu{-}Ming Liang and
                  Hong{-}Yuan Mark Liao},
  title        = {Recognition of blurred license plate images},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711447},
  doi          = {10.1109/WIFS.2010.5711447},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HsiehLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangM10,
  author       = {Yen{-}Wei Huang and
                  Pierre Moulin},
  title        = {Maximin optimality of the arcsine fingerprinting distribution and
                  the interleaving attack for large coalitions},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711451},
  doi          = {10.1109/WIFS.2010.5711451},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KarakoyunluS10,
  author       = {Deniz Karakoyunlu and
                  Berk Sunar},
  title        = {Differential template attacks on {PUF} enabled cryptographic devices},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711445},
  doi          = {10.1109/WIFS.2010.5711445},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KarakoyunluS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KarthikH10,
  author       = {Kannan Karthik and
                  Dimitrios Hatzinakos},
  title        = {{MIX-SPLIT:} Controlled mixing of secrets and traceable pseudonym
                  generation using codebooks},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711443},
  doi          = {10.1109/WIFS.2010.5711443},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KarthikH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KeeF10,
  author       = {Eric Kee and
                  Hany Farid},
  title        = {Exposing digital forgeries from 3-D lighting environments},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711437},
  doi          = {10.1109/WIFS.2010.5711437},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KeeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuLHC10,
  author       = {Bei{-}Bei Liu and
                  Heung{-}Kyu Lee and
                  Yongjian Hu and
                  Chang{-}Hee Choi},
  title        = {On classification of source cameras: {A} graph based approach},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711446},
  doi          = {10.1109/WIFS.2010.5711446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuLHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MairgiotisG10,
  author       = {Antonis Mairgiotis and
                  Nikolaos Galatsanos},
  title        = {Bayesian watermark detection and new perceptual mask based on a spatially
                  weighted Total Variation image prior},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711464},
  doi          = {10.1109/WIFS.2010.5711464},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MairgiotisG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MajzoobiKD10,
  author       = {Mehrdad Majzoobi and
                  Farinaz Koushanfar and
                  Srinivas Devadas},
  title        = {{FPGA} {PUF} using programmable delay lines},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711471},
  doi          = {10.1109/WIFS.2010.5711471},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MajzoobiKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MathonBCM10,
  author       = {Benjamin Mathon and
                  Patrick Bas and
                  Fran{\c{c}}ois Cayre and
                  Beno{\^{\i}}t Macq},
  title        = {Security and robustness constraints for spread-spectrum Tardos fingerprinting},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711457},
  doi          = {10.1109/WIFS.2010.5711457},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MathonBCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Nandakumar10,
  author       = {Karthik Nandakumar},
  title        = {A fingerprint cryptosystem based on minutiae phase spectrum},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711456},
  doi          = {10.1109/WIFS.2010.5711456},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Nandakumar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/OdinakaLKOSKSR10,
  author       = {Ikenna Odinaka and
                  Po{-}Hsiang Lai and
                  Alan David Kaplan and
                  Joseph A. O'Sullivan and
                  Erik J. Sirevaag and
                  Sean D. Kristjansson and
                  Amanda K. Sheffield and
                  John W. Rohrbaugh},
  title        = {{ECG} biometrics: {A} robust short-time frequency analysis},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711466},
  doi          = {10.1109/WIFS.2010.5711466},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/OdinakaLKOSKSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PollardSA10,
  author       = {Stephen B. Pollard and
                  Steven J. Simske and
                  Guy B. Adams},
  title        = {Model based print signature profile extraction for forensic analysis
                  of individual text glyphs},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711442},
  doi          = {10.1109/WIFS.2010.5711442},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PollardSA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Rane010,
  author       = {Shantanu Rane and
                  Wei Sun},
  title        = {Privacy preserving string comparisons based on Levenshtein distance},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711449},
  doi          = {10.1109/WIFS.2010.5711449},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Rane010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SadasivamMM10,
  author       = {Shankar Sadasivam and
                  Pierre Moulin and
                  Sean P. Meyn},
  title        = {A universal divergence-rate estimator for steganalysis in timing channels},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711459},
  doi          = {10.1109/WIFS.2010.5711459},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SadasivamMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SalmaniTP10,
  author       = {Hassan Salmani and
                  Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A layout-aware approach for improving localized switching to detect
                  hardware Trojans in integrated circuits},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711438},
  doi          = {10.1109/WIFS.2010.5711438},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SalmaniTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ScheirerBB10,
  author       = {Walter J. Scheirer and
                  William Bishop and
                  Terrance E. Boult},
  title        = {Beyond {PKI:} The Biocryptographic Key Infrastructure},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711435},
  doi          = {10.1109/WIFS.2010.5711435},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ScheirerBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TanLYS10,
  author       = {Bozhao Tan and
                  Aaron Lewicke and
                  David Yambay and
                  Stephanie Schuckers},
  title        = {The effect of environmental conditions and novel spoofing methods
                  on fingerprint anti-spoofing algorithms},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711436},
  doi          = {10.1109/WIFS.2010.5711436},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TanLYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Veugen10,
  author       = {Thijs Veugen},
  title        = {Encrypted integer division},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711448},
  doi          = {10.1109/WIFS.2010.5711448},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Veugen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK10,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak and
                  Fokko Beekhof and
                  Farzad Farhadzadeh},
  title        = {Privacy amplification of content identification systems based on fingerprint
                  bit reliability},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711461},
  doi          = {10.1109/WIFS.2010.5711461},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WillemsI10,
  author       = {Frans M. J. Willems and
                  Tanya Ignatenko},
  title        = {Identification and secret-key binding in binary-symmetric template-protected
                  biometric systems},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711455},
  doi          = {10.1109/WIFS.2010.5711455},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WillemsI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhaoS10,
  author       = {Hong Zhao and
                  Yun Q. Shi},
  title        = {A phase-space reconstruction approach to detect covert channels in
                  {TCP/IP} protocols},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711441},
  doi          = {10.1109/WIFS.2010.5711441},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhaoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Zhou10,
  author       = {Yuhan Zhou},
  title        = {Joint robust watermarking and image compression},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711440},
  doi          = {10.1109/WIFS.2010.5711440},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Zhou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2010,
  title        = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5707112/proceeding},
  isbn         = {978-1-4244-9078-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniFLPS0K09,
  author       = {Mauro Barni and
                  Pierluigi Failla and
                  Riccardo Lazzeretti and
                  Annika Paus and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Vladimir Kolesnikov},
  title        = {Efficient privacy-preserving classification of {ECG} signals},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386475},
  doi          = {10.1109/WIFS.2009.5386475},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniFLPS0K09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BattistiCN09,
  author       = {Federica Battisti and
                  Marco Carli and
                  Alessandro Neri},
  title        = {{QIM-DM} watermarking optimization based on inter-frequency contrast
                  masking in the {DCT} domain},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {11--15},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386491},
  doi          = {10.1109/WIFS.2009.5386491},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BattistiCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauerMGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {BitStalker: Accurately and efficiently monitoring bittorrent traffic},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386457},
  doi          = {10.1109/WIFS.2009.5386457},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeekhofVKH09,
  author       = {Fokko Beekhof and
                  Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak},
  title        = {Fast identification algorithms for forensic applications},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {76--80},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386480},
  doi          = {10.1109/WIFS.2009.5386480},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BeekhofVKH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeritelliS09,
  author       = {Francesco Beritelli and
                  Andrea Spadaccini},
  title        = {Heart sounds quality analysis for automatic cardiac biometry applications},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {61--65},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386481},
  doi          = {10.1109/WIFS.2009.5386481},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BeritelliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BianchiVPB09,
  author       = {Tiziano Bianchi and
                  Thijs Veugen and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Processing in the encrypted domain using a composite signal representation:
                  Pros and cons},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {176--180},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386460},
  doi          = {10.1109/WIFS.2009.5386460},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BianchiVPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCCK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  title        = {{RFID} key establishment against active adversaries},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {186--190},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386458},
  doi          = {10.1109/WIFS.2009.5386458},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BringerCCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChuangV009,
  author       = {Wei{-}Hong Chuang and
                  Avinash L. Varna and
                  Min Wu},
  title        = {Modeling and analysis of ordinal ranking in content fingerprinting},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {116--120},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386472},
  doi          = {10.1109/WIFS.2009.5386472},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChuangV009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DaraziUM09,
  author       = {Rony Darazi and
                  Pilar Callau Uson and
                  Beno{\^{\i}}t Macq},
  title        = {Secure and HVS-adaptive exhibition Spread Transform Dither Modulation
                  watermarking for Digital Cinema},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386493},
  doi          = {10.1109/WIFS.2009.5386493},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/DaraziUM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DellutriLOI09,
  author       = {Fabio Dellutri and
                  Luigi Laura and
                  Vittorio Ottaviani and
                  Giuseppe F. Italiano},
  title        = {Extracting social networks from seized smartphones and web data},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {101--105},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386473},
  doi          = {10.1109/WIFS.2009.5386473},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DellutriLOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVTL09,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving user clustering in a social network},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386476},
  doi          = {10.1109/WIFS.2009.5386476},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FatourechiLWW09,
  author       = {Mehrdad Fatourechi and
                  Xudong Lv and
                  Z. Jane Wang and
                  Rabab K. Ward},
  title        = {Towards automated image hashing based on the Fast Johnson-Lindenstrauss
                  Transform {(FJLT)}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {121--125},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386469},
  doi          = {10.1109/WIFS.2009.5386469},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FatourechiLWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiKK09,
  author       = {Chuhong Fei and
                  Raymond H. Kwong and
                  Deepa Kundur},
  title        = {Secure semi-fragilewatermarking for image authentication},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {141--145},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386465},
  doi          = {10.1109/WIFS.2009.5386465},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FillerF09,
  author       = {Tom{\'{a}}s Filler and
                  Jessica J. Fridrich},
  title        = {Wet {ZZW} construction for steganography},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {131--135},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386467},
  doi          = {10.1109/WIFS.2009.5386467},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FillerF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FuronP09,
  author       = {Teddy Furon and
                  Luis P{\'{e}}rez{-}Freire},
  title        = {Worst case attacks against binary probabilistic traitor tracing codes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {56--60},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386484},
  doi          = {10.1109/WIFS.2009.5386484},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FuronP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GarciaH09,
  author       = {Johan Garcia and
                  Thijs Holleboom},
  title        = {Retention of micro-fragments in cluster slack - {A} first model},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {31--35},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386487},
  doi          = {10.1109/WIFS.2009.5386487},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/GarciaH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaubatzS09,
  author       = {Matthew Gaubatz and
                  Steven J. Simske},
  title        = {Printer-scanner identification via analysis of structured security
                  deterrents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {151--155},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386463},
  doi          = {10.1109/WIFS.2009.5386463},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaubatzS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GulA09,
  author       = {G{\"{o}}khan G{\"{u}}l and
                  Ismail Avcibas},
  title        = {Source cell phone camera identification based on singular value decomposition},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386459},
  doi          = {10.1109/WIFS.2009.5386459},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GulA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangM09,
  author       = {Yen{-}Wei Huang and
                  Pierre Moulin},
  title        = {Capacity-achieving fingerprint decoding},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {51--55},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386483},
  doi          = {10.1109/WIFS.2009.5386483},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KhannaD09,
  author       = {Nitin Khanna and
                  Edward J. Delp},
  title        = {Source scanner identification for scanned documents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {166--170},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386462},
  doi          = {10.1109/WIFS.2009.5386462},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KhannaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KirchnerG09,
  author       = {Matthias Kirchner and
                  Thomas Gloe},
  title        = {On resampling detection in re-compressed images},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {21--25},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386489},
  doi          = {10.1109/WIFS.2009.5386489},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KirchnerG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MairgiotisG09,
  author       = {Antonis Mairgiotis and
                  Nikolaos Galatsanos},
  title        = {A hierarchical spatially adaptive image model for perceptual mask
                  design and multiplicative watermark detection},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {6--10},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386494},
  doi          = {10.1109/WIFS.2009.5386494},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MairgiotisG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MikkilineniKGD09,
  author       = {Aravind K. Mikkilineni and
                  Deen King{-}Smith and
                  Saul B. Gelfand and
                  Edward J. Delp},
  title        = {Forensic characterization of {RF} devices},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {26--30},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386490},
  doi          = {10.1109/WIFS.2009.5386490},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MikkilineniKGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoreiraFS09,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {A note on the equivalence of the traceability properties of Reed-Solomon
                  codes for certain coalition sizes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386488},
  doi          = {10.1109/WIFS.2009.5386488},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MoreiraFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} attacks on {MDPL}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386455},
  doi          = {10.1109/WIFS.2009.5386455},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MurakamiT09,
  author       = {Takao Murakami and
                  Kenta Takahashi},
  title        = {Accuracy improvement with high convenience in biometric identification
                  using multihypothesis sequential probability ratio test},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {66--70},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386482},
  doi          = {10.1109/WIFS.2009.5386482},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MurakamiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NagarJ09,
  author       = {Abhishek Nagar and
                  Anil K. Jain},
  title        = {On the security of non-invertible fingerprint template transforms},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {81--85},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386477},
  doi          = {10.1109/WIFS.2009.5386477},
  timestamp    = {Fri, 27 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NagarJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Ng09,
  author       = {Tian{-}Tsong Ng},
  title        = {Camera response function signature for digital forensics - Part {II:}
                  Signature extraction},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {161--165},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386461},
  doi          = {10.1109/WIFS.2009.5386461},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Ng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NgT09,
  author       = {Tian{-}Tsong Ng and
                  Mao{-}Pei Tsui},
  title        = {Camera response function signature for digital forensics - Part {I:}
                  Theory and data selection},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386464},
  doi          = {10.1109/WIFS.2009.5386464},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NgT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Perez-FreireF09,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Teddy Furon},
  title        = {Blind decoder for binary probabilistic traitor tracing codes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {46--50},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386486},
  doi          = {10.1109/WIFS.2009.5386486},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Perez-FreireF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ScagliolaPG09,
  author       = {Michele Scagliola and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pietro Guccione},
  title        = {An extended analysis of discrete fourier tranform - rational dither
                  modulation for non-white hosts},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {146--150},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386466},
  doi          = {10.1109/WIFS.2009.5386466},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ScagliolaPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SegoviaCA09,
  author       = {Maria V. {Ortiz Segovia} and
                  George T.{-}C. Chiu and
                  Jan P. Allebach},
  title        = {Using forms for information hiding and coding in electrophotographic
                  documents},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {136--140},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386468},
  doi          = {10.1109/WIFS.2009.5386468},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SegoviaCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SimskeSEG09,
  author       = {Steven J. Simske and
                  Margaret Sturgill and
                  Paul Everest and
                  George Guillory},
  title        = {A system for forensic analysis of large image sets},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {16--20},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386492},
  doi          = {10.1109/WIFS.2009.5386492},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SimskeSEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Skoric0SC09,
  author       = {Boris Skoric and
                  Stefan Katzenbeisser and
                  Hans Georg Schaathun and
                  Mehmet Utku Celik},
  title        = {Tardos fingerprinting codes in the combined digit model},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {41--45},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386485},
  doi          = {10.1109/WIFS.2009.5386485},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Skoric0SC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SterckxGPV09,
  author       = {Micha{\"{e}}l Sterckx and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Efficient implementation of anonymous credentials on Java Card smart
                  cards},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386474},
  doi          = {10.1109/WIFS.2009.5386474},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ThiemertNSZ09,
  author       = {Stefan Thiemert and
                  Stefan N{\"{u}}rnberger and
                  Martin Steinebach and
                  Sascha Zmudzinski},
  title        = {Security of robust audio hashes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {126--130},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386470},
  doi          = {10.1109/WIFS.2009.5386470},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ThiemertNSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Varna009,
  author       = {Avinash L. Varna and
                  Min Wu},
  title        = {Modeling content fingerprints using markov random fields},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {111--115},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386471},
  doi          = {10.1109/WIFS.2009.5386471},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Varna009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK09,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak and
                  Fokko Beekhof},
  title        = {Privacy enhancement of common randomness based authentication: Key
                  rate maximized case},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {86--90},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386478},
  doi          = {10.1109/WIFS.2009.5386478},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WangRV09,
  author       = {Yige Wang and
                  Shantanu Rane and
                  Anthony Vetro},
  title        = {Leveraging reliable bits: {ECC} design considerations for practical
                  secure biometric systems},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {71--75},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386479},
  doi          = {10.1109/WIFS.2009.5386479},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WangRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2009,
  title        = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5377995/proceeding},
  isbn         = {978-1-4244-5279-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics