default search action
IEEE Transactions on Information Forensics and Security, Volume 4
Volume 4, Number 1, March 2009
- Nasir D. Memon:
Editorial. 1 - Luis Pérez-Freire, Fernando Pérez-González:
Spread-spectrum watermarking security. 2-24 - Pietro Guccione, Michele Scagliola:
Hyperbolic RDM for nonlinear valumetric distortions. 25-35 - Parag Agarwal, Balakrishnan Prabhakaran:
Robust blind watermarking of point-sampled geometry. 36-48 - Vinod Pankajakshan, Gwenaël J. Doërr, Prabin Kumar Bora:
Detection of motion-incoherent components in video streams. 49-58 - Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal:
Fingerprinting with minimum distance decoding. 59-69 - Abdellatif Zaidi, Luc Vandendorpe:
Coding schemes for relay-assisted information embedding. 70-85 - Tiziano Bianchi, Alessandro Piva, Mauro Barni:
On the implementation of the discrete Fourier transform in the encrypted domain. 86-97 - Ajay Kumar, Ch. Ravikanth:
Personal authentication using finger knuckle surface. 98-110 - Hong Chang, Yi Yao, Andreas F. Koschan, Besma R. Abidi, Mongi A. Abidi:
Improving face recognition via narrowband spectral range selection using Jeffrey divergence. 111-122 - Nitin Khanna, Aravind K. Mikkilineni, Edward J. Delp:
Scanner identification using feature-based processing and analysis. 123-139 - Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. 140-150 - Jessica J. Fridrich:
Asymptotic behavior of the ZZW embedding construction. 151-154 - Hany Farid:
Exposing digital forgeries from JPEG ghosts. 154-160
Volume 4, Number 2, 2009
- Lin Chen, Jean Leneutre:
A game theoretical framework on intrusion detection in heterogeneous networks. 165-178 - Chuhong Fei, Raymond H. Kwong, Deepa Kundur:
A hypothesis testing approach to semifragile watermark-based authentication. 179-192 - Chun-Hsiang Huang, Shang-Chih Chuang, Yen-Lin Huang, Ja-Ling Wu:
Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents. 193-206 - Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:
Watermarking robustness evaluation based on perceptual quality via genetic algorithms. 207-216 - Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Jun Liu:
Face recognition under occlusions and variant expressions with partial similarity. 217-230 - Michael E. Schuckers:
A parametric correlation framework for the statistical evaluation and estimation of biometric-based classification performance in a single environment. 231-241 - Petar Popovski, Osvaldo Simeone:
Wireless secrecy in cellular systems with infrastructure-aided cooperation. 242-256 - Hsin-Yi Tsai, Yu-Lun Huang, David A. Wagner:
A graph approach to quantitative analysis of control-flow obfuscating transformations. 257-267
Volume 4, Number 3, 2009
- Maha El Choubassi, Pierre Moulin:
On reliability and security of randomized detectors against sensitivity analysis attacks. 273-283 - Shankar Sadasivam, Pierre Moulin:
On estimation accuracy of desynchronization attack channel parameters. 284-292 - Negar Kiyavash, Pierre Moulin:
Performance of orthogonal fingerprinting codes under worst-case noise. 293-301 - Byung-Ho Cha, C.-C. Jay Kuo:
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. 302-317 - Negar Kiyavash, Pierre Moulin, Ton Kalker:
Regular simplex fingerprints and their optimality properties. 318-329 - Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu:
Fingerprinting compressed multimedia signals. 330-345 - Giacomo Cancelli, Mauro Barni:
MPSteg-color: data hiding through redundant basis decomposition. 346-358 - Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. 359-368 - Bin Li, Jiwu Huang, Yun-Qing Shi:
Steganalysis of YASS. 369-382 - Zhongmin Wang, Gonzalo R. Arce, Giovanni Di Crescenzo:
Halftone visual cryptography via error diffusion. 383-396 - Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, Berk Gökberk:
Fingerprint verification using spectral minutiae representations. 397-409 - Vladan Velisavljevic:
Low-complexity iris coding and recognition based on directionlets. 410-417 - Wenming Zheng, Xiaoou Tang:
Fast algorithm for updating the discriminant vectors of dual-space LDA. 418-427 - Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthenis Ioannidis, Michael G. Strintzis:
A channel coding approach for human authentication from gait sequences. 428-440 - Yanwei Pang, Xuelong Li, Yuan Yuan, Dacheng Tao, Jing Pan:
Fast Haar transform based feature extraction for face representation and recognition. 441-450 - Marcello Ferro, Giovanni Pioggia, Alessandro Tognetti, Nicola Carbonaro, Danilo De Rossi:
A sensing seat for human authentication. 451-459 - W. Sabrina Lin, Steven K. Tjoa, H. Vicky Zhao, K. J. Ray Liu:
Digital image source coder forensics via intrinsic fingerprints. 460-475 - Hongmei Gou, Ashwin Swaminathan, Min Wu:
Intrinsic sensor noise features for forensic analysis on scanners and scanned images. 476-491 - Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based detection of Sybil attacks in wireless networks. 492-503 - Ritendra Datta, Jia Li, James Ze Wang:
Exploiting the human-machine gap in image recognition for designing CAPTCHAs. 504-518 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical model for low-rate DoS attacks against application servers. 519-529 - Zesheng Chen, Chuanyi Ji:
An information-theoretic view of network-aware malware attacks. 530-541 - Ciza Thomas, N. Balakrishnan:
Improvement in intrusion detection with advances in sensor fusion. 542-551 - Vivek K. Singh, Mohan S. Kankanhalli:
Adversary aware surveillance systems. 552-563 - Weiming Zhang, Xin Wang:
Generalization of the ZZW embedding construction for steganography. 564-569 - Gabriel Domínguez-Conde, Pedro Comesaña, Fernando Pérez-González:
Performance analysis of Fridrich-Goljan self-embedding authentication method. 570-577 - Craig Belcher, Yingzi Du:
Corrections to "A selective feature information approach for iris image-quality measure". 578
Volume 4, Number 4, 2009
- Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora:
Guest editorial: special issue on electronic voting. 593-596 - Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman:
State-wide elections, optical scan voting systems, and the pursuit of integrity. 597-610 - David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. 611-627 - Russell A. Fink, Alan T. Sherman, Richard Carback:
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. 628-637 - Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Detecting code alteration by creating a temporary memory bottleneck. 638-650 - Adolfo Villafiorita, Komminist Weldemariam, Roberto Tiella:
Development, formal verification, and evaluation of an E-voting system with VVPAT. 651-661 - Peter Y. A. Ryan, David Bismark, James Heather, Steve A. Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. 662-673 - Jeroen van de Graaf:
Voting with unconditional privacy by merging Prêt à voter and PunchScan. 674-684 - Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague:
Shuffle-sum: coercion-resistant verifiable tallying for STV voting. 685-698 - Kevin J. Henry, Douglas R. Stinson, Jiayuan Sui:
The effectiveness of receipt-based attacks on ThreeBallot. 699-707 - Philip B. Stark:
CAST: Canvass audits by sampling and testing. 708-717 - Bryan A. Campbell, Michael D. Byrne:
Straight-party voting: what do voters think? 718-728 - Guido Schryen, Eliot Rich:
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland. 729-744 - Jens-Matthias Bohli, Christian Henrich, Carmen Kempka, Jörn Müller-Quade, Stefan Röhrich:
Enhancing electronic voting machines on the example of Bingo voting. 745-750 - Ali H. Sayed:
Free electronic access to SP publications. 757 - Tony Thomas, Sabu Emmanuel, A. Venkata Subramanyam, Mohan S. Kankanhalli:
Joint watermarking scheme for multiparty multilevel DRM architecture. 758-767 - Jean-François Jourdas, Pierre Moulin:
High-rate random-like spherical fingerprinting codes with linear decoding complexity. 768-780 - Hung-Min Sun, King-Hang Wang, Wei-Chih Ting:
On the security of the secure arithmetic code. 781-789 - Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
Self-verifying visual secret sharing using error diffusion and interpolation techniques. 790-801 - Carsten Gottschlich, Preda Mihailescu, Axel Munk:
Robust orientation field estimation and extrapolation using semilocal line sensors. 802-811 - Ryan N. Rakvic, Bradley J. Ulis, Randy P. Broussard, Robert W. Ives, Neil Steiner:
Parallelizing iris recognition. 812-823 - Samir Shah, Arun Ross:
Iris segmentation using geodesic active contours. 824-836 - Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, Patrick J. Flynn:
Iris recognition using signal-level fusion of frames from video. 837-848 - Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Fiérrez-Aguilar, Harald Ganster, Javier Ortega-Garcia, Donald E. Maurer, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer:
Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms. 849-866 - Bo Fu, Simon X. Yang, Jianping Li, Dekun Hu:
Multibiometric cryptosystem: model structure and performance analysis. 867-882 - Yafei Yang, Yan Sun, Steven Kay, Qing Yang:
Securing rating aggregation systems using statistical detectors and trust. 883-898 - Hong Cao, Alex C. Kot:
Accurate detection of demosaicing regularity for digital image forensics. 899-910 - W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Behavior forensics with side information for multimedia fingerprinting social networks. 911-927 - Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang:
A study on the randomness measure of image hashing. 928-932 - Chun-I Fan, Yi-Hui Lin:
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. 933-945 - Nitesh Saxena, Jeong Hyun Yi:
Noninteractive self-certification for long-lived mobile ad hoc networks. 946-955 - Tanya Ignatenko, Frans M. J. Willems:
Biometric systems: privacy and secrecy aspects. 956-973 - Luke Miratrix, Philip B. Stark:
Election audits using a trinomial bound. 974-981 - Minho Jin, Chang Dong Yoo:
Quantum hashing for multimedia. 982-994 - Dalwon Jang, Chang Dong Yoo, Sunil Lee, Sungwoong Kim, Ton Kalker:
Pairwise boosted audio fingerprint. 995-1004 - Philip B. Stark:
Risk-limiting postelection audits: conservative P-values from common probability inequalities. 1005-1014
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.