


default search action
IEEE Transactions on Information Forensics and Security, Volume 4
Volume 4, Number 1, March 2009
- Nasir D. Memon

:
Editorial. 1 - Luis Pérez-Freire, Fernando Pérez-González

:
Spread-spectrum watermarking security. 2-24 - Pietro Guccione, Michele Scagliola

:
Hyperbolic RDM for nonlinear valumetric distortions. 25-35 - Parag Agarwal, Balakrishnan Prabhakaran:

Robust blind watermarking of point-sampled geometry. 36-48 - Vinod Pankajakshan, Gwenaël J. Doërr

, Prabin Kumar Bora:
Detection of motion-incoherent components in video streams. 49-58 - Shih-Chun Lin

, Mohammad Shahmohammadi, Hesham El Gamal:
Fingerprinting with minimum distance decoding. 59-69 - Abdellatif Zaidi, Luc Vandendorpe:

Coding schemes for relay-assisted information embedding. 70-85 - Tiziano Bianchi

, Alessandro Piva
, Mauro Barni:
On the implementation of the discrete Fourier transform in the encrypted domain. 86-97 - Ajay Kumar

, Ch. Ravikanth:
Personal authentication using finger knuckle surface. 98-110 - Hong Chang, Yi Yao, Andreas F. Koschan, Besma R. Abidi, Mongi A. Abidi:

Improving face recognition via narrowband spectral range selection using Jeffrey divergence. 111-122 - Nitin Khanna

, Aravind K. Mikkilineni, Edward J. Delp
:
Scanner identification using feature-based processing and analysis. 123-139 - Wenbo He

, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. 140-150 - Jessica J. Fridrich:

Asymptotic behavior of the ZZW embedding construction. 151-154 - Hany Farid:

Exposing digital forgeries from JPEG ghosts. 154-160
Volume 4, Number 2, 2009
- Lin Chen, Jean Leneutre:

A game theoretical framework on intrusion detection in heterogeneous networks. 165-178 - Chuhong Fei, Raymond H. Kwong, Deepa Kundur:

A hypothesis testing approach to semifragile watermark-based authentication. 179-192 - Chun-Hsiang Huang, Shang-Chih Chuang

, Yen-Lin Huang, Ja-Ling Wu
:
Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents. 193-206 - Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:

Watermarking robustness evaluation based on perceptual quality via genetic algorithms. 207-216 - Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Jun Liu:

Face recognition under occlusions and variant expressions with partial similarity. 217-230 - Michael E. Schuckers:

A parametric correlation framework for the statistical evaluation and estimation of biometric-based classification performance in a single environment. 231-241 - Petar Popovski

, Osvaldo Simeone
:
Wireless secrecy in cellular systems with infrastructure-aided cooperation. 242-256 - Hsin-Yi Tsai, Yu-Lun Huang, David A. Wagner:

A graph approach to quantitative analysis of control-flow obfuscating transformations. 257-267
Volume 4, Number 3, 2009
- Maha El Choubassi, Pierre Moulin:

On reliability and security of randomized detectors against sensitivity analysis attacks. 273-283 - Shankar Sadasivam, Pierre Moulin:

On estimation accuracy of desynchronization attack channel parameters. 284-292 - Negar Kiyavash, Pierre Moulin:

Performance of orthogonal fingerprinting codes under worst-case noise. 293-301 - Byung-Ho Cha, C.-C. Jay Kuo

:
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. 302-317 - Negar Kiyavash, Pierre Moulin, Ton Kalker:

Regular simplex fingerprints and their optimality properties. 318-329 - Avinash L. Varna, Shan He, Ashwin Swaminathan, Min Wu

:
Fingerprinting compressed multimedia signals. 330-345 - Giacomo Cancelli, Mauro Barni:

MPSteg-color: data hiding through redundant basis decomposition. 346-358 - Qingzhong Liu

, Andrew H. Sung
, Mengyu Qiao:
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. 359-368 - Bin Li, Jiwu Huang, Yun-Qing Shi:

Steganalysis of YASS. 369-382 - Zhongmin Wang, Gonzalo R. Arce, Giovanni Di Crescenzo:

Halftone visual cryptography via error diffusion. 383-396 - Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, Berk Gökberk

:
Fingerprint verification using spectral minutiae representations. 397-409 - Vladan Velisavljevic

:
Low-complexity iris coding and recognition based on directionlets. 410-417 - Wenming Zheng, Xiaoou Tang:

Fast algorithm for updating the discriminant vectors of dual-space LDA. 418-427 - Savvas Argyropoulos, Dimitrios Tzovaras

, Dimosthenis Ioannidis
, Michael G. Strintzis:
A channel coding approach for human authentication from gait sequences. 428-440 - Yanwei Pang, Xuelong Li

, Yuan Yuan, Dacheng Tao, Jing Pan:
Fast Haar transform based feature extraction for face representation and recognition. 441-450 - Marcello Ferro

, Giovanni Pioggia
, Alessandro Tognetti
, Nicola Carbonaro
, Danilo De Rossi:
A sensing seat for human authentication. 451-459 - W. Sabrina Lin, Steven K. Tjoa, H. Vicky Zhao, K. J. Ray Liu:

Digital image source coder forensics via intrinsic fingerprints. 460-475 - Hongmei Gou, Ashwin Swaminathan, Min Wu

:
Intrinsic sensor noise features for forensic analysis on scanners and scanned images. 476-491 - Liang Xiao

, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based detection of Sybil attacks in wireless networks. 492-503 - Ritendra Datta, Jia Li, James Ze Wang

:
Exploiting the human-machine gap in image recognition for designing CAPTCHAs. 504-518 - Gabriel Maciá-Fernández

, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical model for low-rate DoS attacks against application servers. 519-529 - Zesheng Chen, Chuanyi Ji:

An information-theoretic view of network-aware malware attacks. 530-541 - Ciza Thomas, N. Balakrishnan:

Improvement in intrusion detection with advances in sensor fusion. 542-551 - Vivek K. Singh, Mohan S. Kankanhalli

:
Adversary aware surveillance systems. 552-563 - Weiming Zhang, Xin Wang:

Generalization of the ZZW embedding construction for steganography. 564-569 - Gabriel Domínguez-Conde, Pedro Comesaña

, Fernando Pérez-González
:
Performance analysis of Fridrich-Goljan self-embedding authentication method. 570-577 - Craig Belcher, Yingzi Du:

Corrections to "A selective feature information approach for iris image-quality measure". 578
Volume 4, Number 4, 2009
- Ronald L. Rivest, David Chaum, Bart Preneel

, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora:
Guest editorial: special issue on electronic voting. 593-596 - Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell

, Alexander A. Shvartsman
:
State-wide elections, optical scan voting systems, and the pursuit of integrity. 597-610 - David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex

, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan
, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. 611-627 - Russell A. Fink, Alan T. Sherman, Richard Carback:

TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. 628-637 - Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:

Detecting code alteration by creating a temporary memory bottleneck. 638-650 - Adolfo Villafiorita

, Komminist Weldemariam, Roberto Tiella:
Development, formal verification, and evaluation of an E-voting system with VVPAT. 651-661 - Peter Y. A. Ryan

, David Bismark, James Heather, Steve A. Schneider
, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. 662-673 - Jeroen van de Graaf:

Voting with unconditional privacy by merging Prêt à voter and PunchScan. 674-684 - Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague:

Shuffle-sum: coercion-resistant verifiable tallying for STV voting. 685-698 - Kevin J. Henry, Douglas R. Stinson, Jiayuan Sui:

The effectiveness of receipt-based attacks on ThreeBallot. 699-707 - Philip B. Stark

:
CAST: Canvass audits by sampling and testing. 708-717 - Bryan A. Campbell, Michael D. Byrne:

Straight-party voting: what do voters think? 718-728 - Guido Schryen, Eliot Rich:

Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland. 729-744 - Jens-Matthias Bohli, Christian Henrich, Carmen Kempka, Jörn Müller-Quade, Stefan Röhrich:

Enhancing electronic voting machines on the example of Bingo voting. 745-750 - Ali H. Sayed:

Free electronic access to SP publications. 757 - Tony Thomas

, Sabu Emmanuel, A. Venkata Subramanyam, Mohan S. Kankanhalli
:
Joint watermarking scheme for multiparty multilevel DRM architecture. 758-767 - Jean-François Jourdas, Pierre Moulin:

High-rate random-like spherical fingerprinting codes with linear decoding complexity. 768-780 - Hung-Min Sun, King-Hang Wang

, Wei-Chih Ting:
On the security of the secure arithmetic code. 781-789 - Chin-Chen Chang, Chia-Chen Lin

, T. Hoang Ngan Le
, Hoai Bac Le:
Self-verifying visual secret sharing using error diffusion and interpolation techniques. 790-801 - Carsten Gottschlich

, Preda Mihailescu, Axel Munk:
Robust orientation field estimation and extrapolation using semilocal line sensors. 802-811 - Ryan N. Rakvic, Bradley J. Ulis, Randy P. Broussard, Robert W. Ives, Neil Steiner:

Parallelizing iris recognition. 812-823 - Samir Shah, Arun Ross:

Iris segmentation using geodesic active contours. 824-836 - Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer

, Patrick J. Flynn:
Iris recognition using signal-level fusion of frames from video. 837-848 - Norman Poh, Thirimachos Bourlai

, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez
, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Fiérrez-Aguilar
, Harald Ganster, Javier Ortega-Garcia
, Donald E. Maurer, Albert Ali Salah
, Tobias Scheidat, Claus Vielhauer:
Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms. 849-866 - Bo Fu, Simon X. Yang

, Jianping Li, Dekun Hu:
Multibiometric cryptosystem: model structure and performance analysis. 867-882 - Yafei Yang

, Yan Sun, Steven Kay, Qing Yang:
Securing rating aggregation systems using statistical detectors and trust. 883-898 - Hong Cao, Alex C. Kot:

Accurate detection of demosaicing regularity for digital image forensics. 899-910 - W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:

Behavior forensics with side information for multimedia fingerprinting social networks. 911-927 - Guopu Zhu

, Jiwu Huang, Sam Kwong
, Jianquan Yang:
A study on the randomness measure of image hashing. 928-932 - Chun-I Fan, Yi-Hui Lin:

Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. 933-945 - Nitesh Saxena, Jeong Hyun Yi

:
Noninteractive self-certification for long-lived mobile ad hoc networks. 946-955 - Tanya Ignatenko, Frans M. J. Willems:

Biometric systems: privacy and secrecy aspects. 956-973 - Luke Miratrix

, Philip B. Stark
:
Election audits using a trinomial bound. 974-981 - Minho Jin, Chang Dong Yoo:

Quantum hashing for multimedia. 982-994 - Dalwon Jang, Chang Dong Yoo, Sunil Lee, Sungwoong Kim, Ton Kalker:

Pairwise boosted audio fingerprint. 995-1004 - Philip B. Stark

:
Risk-limiting postelection audits: conservative P-values from common probability inequalities. 1005-1014

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














