![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
7th WIFS 2015: Roma, Italy
- 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015, Roma, Italy, November 16-19, 2015. IEEE 2015, ISBN 978-1-4673-6802-5
- Onur Günlü
, Onurcan Iscan
, Gerhard Kramer
:
Reliable secret key generation from physical unclonable functions under varying environmental conditions. 1-6 - Tomás Pevný
, Ivan Nikolaev:
Optimizing pooling function for pooled steganalysis. 1-6 - Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Forensics of high-quality JPEG images with color subsampling. 1-6 - Ram P. Krish, Julian Fiérrez, Daniel Ramos:
Integrating rare minutiae in generic fingerprint matchers for forensics. 1-6 - Marcel Fernandez, Elena Egorova, Grigory Kabatiansky:
Binary fingerprinting codes - can we prove that someone is guilty?! 1-4 - Tuan Phan Vuong, George Loukas
, Diane Gan, Anatolij Bezemskij:
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. 1-6 - Andrea Grigorescu, Holger Boche, Rafael F. Schaefer:
Robust PUF based authentication. 1-6 - Lucilla Pronti
, Pasquale Ferrara
, Francesca Uccheddu, Anna Pelagotti
, Alessandro Piva:
Identification of pictorial materials by means of optimized multispectral reflectance image processing. 1-6 - Hasan Sheikh Faridul, Gwenaël J. Doërr
:
A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence. 1-6 - Ning Jia, Victor Sanchez, Chang-Tsun Li
, Hassan Mansour:
The influence of segmentation on individual gait recognition. 1-6 - Andrey Garnaev, Wade Trappe:
Impact of incomplete knowledge on scanning strategy. 1-6 - Davide Cozzolino
, Giovanni Poggi, Luisa Verdoliva:
Splicebuster: A new blind image splicing detector. 1-6 - Hasan Sajid, Sen-Ching Samson Cheung:
VSig: Hand-gestured signature recognition and authentication with wearable camera. 1-6 - Abelino Jimenez, Bhiksha Raj, José Portelo, Isabel Trancoso
:
Secure Modular Hashing. 1-6 - Julien Bringer, Hervé Chabanne, Firas Kraiem, Roch Lescuyer, Eduardo Soria-Vazquez
:
Some applications of verifiable computation to biometric verification. 1-6 - Allen Sarkisyan, Ryan Debbiny, Ani Nahapetian:
WristSnoop: Smartphone PINs prediction using smartwatch motion sensors. 1-6 - Susan El-Naggar, Arun Ross:
Which dataset is this iris image from? 1-6 - Tan N. Nguyen, Rémi Cogranne
, Guillaume Doyen, Florent Retraint:
Detection of interest flooding attacks in Named Data Networking using hypothesis testing. 1-6 - Félix Balado:
Optimum reversible data hiding and permutation coding. 1-4 - Chen Chen, Matthew C. Stamm:
Camera model identification framework using an ensemble of demosaicing features. 1-6 - Ta-Yuan Liu, Shih-Chun Lin, Yao-Win Peter Hong
:
Multicasting with untrusted relays: A noncoherent secure network coding approach. 1-6 - Benedetta Tondi, Mauro Barni, Neri Merhav:
Detection games with a fully active attacker. 1-6 - Benedetta Tondi, Pedro Comesaña Alfaro
, Fernando Pérez-González
, Mauro Barni:
On the effectiveness of meta-detection for countering oracle attacks in watermarking. 1-6 - Anne Wolf, Eduard A. Jorswieck
, Carsten Rudolf Janda:
Worst-case secrecy rates in MIMOME systems under input and state constraints. 1-6 - Matthias Kirchner, Sujoy Chakraborty:
A second look at first significant digit histogram restoration. 1-6 - Chau-Wai Wong
, Min Wu:
Counterfeit detection using paper PUF and mobile cameras. 1-6 - Erwin Quiring, Matthias Kirchner:
Fragile sensor fingerprint camera identification. 1-6 - Abhishek Kumar Gangwar, Akanksha Joshi:
Local Gabor Rank Pattern (LGRP): A novel descriptor for face representation and recognition. 1-6 - Kannan Karthik:
Key search and adaptation based on association rules for backward secrecy. 1-6 - Ruben Tolosana
, Rubén Vera-Rodríguez
, Javier Ortega-Garcia
, Julian Fiérrez:
Update strategies for HMM-based dynamic signature biometric systems. 1-6 - Zekeriya Erkin
:
Private data aggregation with groups for smart grids in a dynamic setting using CRT. 1-6 - Paulo A. A. Esquef
, José Antonio Apolinário
, Luiz W. P. Biscainho:
Improved edit detection in speech via ENF patterns. 1-6 - Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. 1-6 - Bo Peng, Wei Wang
, Jing Dong, Tieniu Tan:
Improved 3D lighting environment estimation for image forgery detection. 1-6 - Tomás Denemark, Jessica J. Fridrich:
Side-informed steganography with additive distortion. 1-6 - Binh Van Nguyen
, Kiseon Kim:
Single relay selection for secure communication in a cooperative system with multiple full-duplex decode-and-forward relays. 1-6 - Soumik Mondal, Patrick Bours:
Continuous authentication and identification for mobile devices: Combining security and forensics. 1-6 - Roger L. Easton Jr., Kevin Sacca, Gregory Heyworth, Kenneth Boydston, Chet Van Duzer, Michael Phelps:
Rediscovering text in the Yale Martellus map. 1-6 - Stéphane G. Roux, Nicolas Tremblay, Pierre Borgnat
, Patrice Abry
, Herwig Wendt
, Paul Messier:
Multiscale anisotropic texture unsupervised clustering for photographic paper. 1-6 - Takayuki Hirayama, Kentaroh Toyoda
, Iwao Sasase:
Fast target link flooding attack detection scheme by analyzing traceroute packets flow. 1-6 - Shuichiro Haruta, Kentaroh Toyoda
, Iwao Sasase:
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS. 1-6 - Rémi Cogranne
:
A sequential method for online steganalysis. 1-6 - Rémi Cogranne
, Vahid Sedighi, Jessica J. Fridrich, Tomás Pevný
:
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? 1-6 - Massimo Iuliani, Giovanni Fabbri, Alessandro Piva:
Image splicing detection based on general perspective constraints. 1-6 - Santosh Tirunagari
, Norman Poh, Miroslaw Bober
, David Windridge
:
Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. 1-6 - Fernando Alonso-Fernandez
, Reuben A. Farrugia
, Josef Bigün
:
Reconstruction of smartphone images for low resolution iris recognition. 1-6 - Philipp Wachter, Michael Gruhn:
Practicability study of android volatile memory forensic research. 1-6 - Hendrik Vogt, Aydin Sezgin
:
Full-duplex vs. half-duplex secret-key generation. 1-6 - Suah Kim
, Rolf Lussi, Xiaochao Qu, Hyoung Joong Kim:
Automatic contrast enhancement using reversible data hiding. 1-5 - Xiao Yang
, Jianjiang Feng, Jie Zhou, Shutao Xia:
Detection and segmentation of latent fingerprints. 1-6 - Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy
:
Information-theoretical limits of active content fingerprinting in content-based identification systems. 1-6 - Wei Fan, Kai Wang, François Cayre:
General-purpose image forensics using patch likelihood under image statistical models. 1-6 - Mauro Conti
, Vittoria Cozza
, Marinella Petrocchi, Angelo Spognardi
:
TRAP: Using Targeted ads to unveil Google personal profiles. 1-6 - Shantanu Rane, Julien Freudiger, Alejandro E. Brito, Ersin Uzun:
Privacy, efficiency & fault tolerance in aggregate computations on massive star networks. 1-6
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.