default search action
IEEE Transactions on Information Forensics and Security, Volume 8
Volume 8, Number 1, January 2013
- Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. 5-15 - Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:
User Authentication Through Mouse Dynamics. 16-30 - Alessandra A. Paulino, Jianjiang Feng, Anil K. Jain:
Latent Fingerprint Matching Using Descriptor-Based Hough Transform. 31-45 - Luís Filipe da Cruz Nassif, Eduardo R. Hruschka:
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. 46-54 - Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. 55-63 - Yazhuo Gong, David Zhang, Pengfei Shi, Jingqi Yan:
An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition. 64-75 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. 76-88 - Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa:
Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm. 89-100 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Heap Graph Based Software Theft Detection. 101-110 - Gouenou Coatrieux, Wei Pan, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. 111-120 - Stefanos Zafeiriou, Gary A. Atkinson, Mark F. Hansen, William A. P. Smith, Vasileios Argyriou, Maria Petrou, Melvyn L. Smith, Lyndon N. Smith:
Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation. 121-135 - Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. 136-148 - Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun:
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. 149-162 - Roberto Di Pietro, Gabriele Oligeri:
COKE Crypto-Less Over-the-Air Key Establishment. 163-173 - Neil J. Grabham, Matthew A. Swabey, Paul Chambers, Mark E. Lutman, Neil M. White, John E. Chad, Stephen P. Beeby:
An Evaluation of Otoacoustic Emissions as a Biometric. 174-183 - Ke Cui, Jian Wang, Hong-Fei Zhang, Chun-Li Luo, Ge Jin, Teng-Yun Chen:
A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System. 184-190 - Hu Han, Brendan Klare, Kathryn Bonnen, Anil K. Jain:
Matching Composite Sketches to Face Photos: A Component-Based Approach. 191-204 - Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour:
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes. 205-215 - Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. 216-228 - Hang Long, Wei Xiang, Yueying Zhang, Yuanan Liu, Wenbo Wang:
Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems. 229-238 - Kathryn Bonnen, Brendan Klare, Anil K. Jain:
Component-Based Representation in Automated Face Recognition. 239-253 - Nan (Jonas) Yang, Himal A. Suraweera, Iain B. Collings, Chau Yuen:
Physical Layer Security of TAS/MRC With Antenna Correlation. 254-259 - Asem A. Othman, Arun Ross:
On Mixing Fingerprints. 260-267
Volume 8, Number 2, February 2013
- Hong Zhao, Yun-Qing Shi:
Detecting Covert Channels in Computer Networks Based on Chaos Theory. 273-282 - Andrew Chi-Chih Yao, Yunlei Zhao:
Online/Offline Signatures for Low-Power Devices. 283-294 - Ngoc-Son Vu:
Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition. 295-304 - Qian Tao, Raymond N. J. Veldhuis:
Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics. 305-313 - Cristina Comaniciu, H. Vincent Poor:
On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels. 314-323 - Rafael F. Wyrembelski, Moritz Wiese, Holger Boche:
Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages. 324-334 - Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro:
Revealing the Traces of JPEG Compression Anti-Forensics. 335-349 - Sheng Li, Alex C. Kot:
Fingerprint Combination for Privacy Protection. 350-360 - Jessica J. Fridrich:
Effect of Cover Quantization on Steganographic Fisher Information. 361-373 - Stefano Berretti, Alberto Del Bimbo, Pietro Pala:
Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts. 374-389 - Robin Doss, Wanlei Zhou, Shui Yu:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. 390-401 - Larry A. Dunning, Ray Kresman:
Privacy Preserving Data Sharing With Anonymous ID Assignment. 402-413 - Shih-Chun Lin, Pin-Hsun Lin:
On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT. 414-419
Volume 8, Number 3, March 2013
- Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. 429-439 - Kun Xie, Wen Chen, Lili Wei:
Increasing Security Degree of Freedom in Multiuser and Multieve Systems. 440-449 - Mauro Barni, Benedetta Tondi:
The Source Identification Game: An Information-Theoretic Perspective. 450-463 - Rémi Cogranne, Florent Retraint:
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection. 464-476 - Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues:
A Timing Channel Spyware for the CSMA/CA Protocol. 477-487 - Juan E. Tapia, Claudio A. Perez:
Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of LBP, Intensity, and Shape. 488-499 - Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. 500-509 - Jiwen Lu, Yap-Peng Tan:
Cost-Sensitive Subspace Analysis and Extensions for Face Recognition. 510-519 - Deng Wang, Duoqian Miao, Gunnar Blohm:
A New Method for EEG-Based Concealed Information Test. 520-527 - Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. 528-541 - Xiaobei Liu, Soo Ngee Koh, Chee-Cheon Chui, Xin-Wen Wu:
A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder. 542-552 - Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li:
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. 553-562 - Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. 563-577 - Gökhan Gül, Fatih Kurugollu:
JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques. 578-587
Volume 8, Number 4, April 2013
- Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni:
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence. 593-607 - Jiayuan Fan, Hong Cao, Alex C. Kot:
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection. 608-618 - Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. 619-625 - Quanxue Gao, Jingjing Liu, Hailin Zhang, Xinbo Gao, Kui Li:
Joint Global and Local Structure Discriminant Analysis. 626-635 - Shuangqing Wei, Jian Wang, Ruming Yin, Jian Yuan:
Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts. 636-645 - Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map. 646-656 - Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen:
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. 657-668 - Vivek Balachandran, Sabu Emmanuel:
Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code. 669-681 - Yupeng Liu, Jiangyuan Li, Athina P. Petropulu:
Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security. 682-694
Volume 8, Number 5, May 2013
- Mohammad Hashem Haghighat, Mehdi Tavakoli, Mehdi Kharrazi:
Payload Attribution via Character Dependent Multi-Bloom Filters. 705-716 - Siavash Bayat, Raymond H. Y. Louie, Zhu Han, Branka Vucetic, Yonghui Li:
Physical-Layer Security in Distributed Wireless Networks Using Matching Theory. 717-732 - Shyong Jian Shyu, Hung-Wei Jiang:
General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes. 733-743 - Dima Bykhovsky, Asaf Cohen:
Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model. 744-753 - Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. 754-768 - Feng Yue, Bin Li, Ming Yu, Jiaqiang Wang:
Hashing Based Fast Palmprint Identification for Large-Scale Databases. 769-778 - Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. 779-788 - Nese Alyüz, Berk Gökberk, Lale Akarun:
3-D Face Recognition Under Occlusion Using Masked Projection. 789-802 - Lin Ding, Jie Guan:
Related Key Chosen IV Attack on Grain-128a Stream Cipher. 803-809 - Alessandro Cilardo, Nicola Mazzocca:
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware. 810-820 - Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. 821-828
Volume 8, Number 6, June 2013
- Sen-ching Samson Cheung, Yan Sun, Karl Aberer, Jayant R. Haritsa, Bill G. Horne, Kai Hwang:
Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems. 835-837 - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:
Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. 838-852 - David Sánchez, Montserrat Batet, Alexandre Viejo:
Automatic General-Purpose Sanitization of Textual Documents. 853-862 - I-Ting Lien, Yu-Hsun Lin, Jyh-Ren Shieh, Ja-Ling Wu:
A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search. 863-873 - Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun:
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. 874-887 - Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. 888-900 - Agusti Solanas, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health. 901-910 - Ivan Ivanov, Peter Vajda, Pavel Korshunov, Touradj Ebrahimi:
Comparative Study of Trust Modeling for Automatic Landmark Tagging. 911-923 - Xiaoyong Li, Feng Zhou, Junping Du:
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks. 924-935 - Yuhong Liu, Yan Sun, Siyuan Liu, Alex C. Kot:
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis. 936-948 - Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang:
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. 949-962 - Justin L. Rice, Vir V. Phoha, Philip Robinson:
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. 963-972 - Imad M. Abbadi, Anbang Ruan:
Towards Trustworthy Resource Scheduling in Clouds. 973-984 - Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang:
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. 985-997 - Arfika Nurhudatiana, Adams Wai-Kin Kong, Keyan Matinpour, Deborah Chon, Lisa Altieri, Siu-Yeung Cho, Noah Craft:
The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns. 998-1012 - Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu:
Fine-Grained Refinement on TPM-Based Protocol Applications. 1013-1026 - Earlence Fernandes, Bruno Crispo, Mauro Conti:
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. 1027-1037 - Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Impacts of Watermarking Security on Tardos-Based Fingerprinting. 1038-1050 - Jinyu Zuo, Natalia A. Schmid:
Adaptive Quality-Based Performance Prediction and Boosting for Iris Authentication: Methodology and Its Illustration. 1051-1060 - Muhammad Kamran, Muddassar Farooq:
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. 1061-1072
Volume 8, Number 7, July 2013
- Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Uncoordinated Cooperative Jamming for Secret Communications. 1081-1090 - Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. 1091-1100 - Juan Ramón Troncoso-Pastoriza, Daniel González-Jiménez, Fernando Pérez-González:
Fully Private Noninteractive Face Verification. 1101-1114 - Luis Cardoso, André F. S. Barbosa, Frutuoso G. M. Silva, António M. G. Pinheiro, Hugo Proença:
Iris Biometrics: Synthesis of Degraded Ocular Images. 1115-1125 - Meng-Hsi Chen, Shih-Chun Lin, Yao-Win Peter Hong, Xiangyun Zhou:
On Cooperative and Malicious Behaviors in Multirelay Fading Channels. 1126-1139 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols. 1140-1151 - Yahya Sowti Khiabani, Shuangqing Wei:
ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels. 1152-1161 - Sadaf Salehkalaibar, Mahtab Mirmohseni, Mohammad Reza Aref:
One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets. 1162-1172 - Ling Fu, Penn N. Markham, Richard W. Conners, Yilu Liu:
An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction. 1173-1181 - Tiago Jose de Carvalho, Christian Riess, Elli Angelopoulou, Hélio Pedrini, Anderson de Rezende Rocha:
Exposing Digital Image Forgeries by Illumination Color Classification. 1182-1194 - Ly-Minh-Duy Le, Kah Chan Teh, Kwok Hung Li:
Jamming Rejection Using FFH/MFSK ML Receiver Over Fading Channels With the Presence of Timing and Frequency Offsets. 1195-1200 - Ming Li, Michel Kulhandjian, Dimitrios A. Pados, Stella N. Batalama, Michael J. Medley:
Extracting Spread-Spectrum Hidden Data From Digital Media. 1201-1210 - Britton Quist, Michael A. Jensen:
Optimal Channel Estimation in Beamformed Systems for Common-Randomness-Based Secret Key Establishment. 1211-1220 - Gerson de Souza Faria, Hae Yong Kim:
Identification of Pressed Keys From Mechanical Vibrations. 1221-1229 - Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima:
Monitoring Integrity Using Limited Local Memory. 1230-1242 - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
Multiaccess Channel With Partially Cooperating Encoders and Security Constraints. 1243-1254
Volume 8, Number 8, August 2013
- Jiangyang Zhang, Rongjie Lai, C.-C. Jay Kuo:
Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation. 1261-1273 - Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann:
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. 1274-1279 - Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. 1280-1293 - Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. 1294-1305 - Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. 1306-1317 - Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. 1318-1330 - Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye:
A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior Modeling. 1331-1342 - Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng:
Attribute-Based Encryption With Verifiable Outsourced Decryption. 1343-1354 - Seung-Jin Ryu, Matthias Kirchner, Min-Jeong Lee, Heung-Kyu Lee:
Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. 1355-1370 - Sian-Jheng Lin, Wei-Ho Chung:
An Efficient (n, k) Information Dispersal Algorithm Based on Fermat Number Transforms. 1371-1383