Search dblp for Publications

export results for "toc:db/conf/wifs/wifs2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wifs/0001TS10,
  author       = {Peter A. Johnson and
                  Bozhao Tan and
                  Stephanie Schuckers},
  title        = {Multimodal fusion vulnerability to non-zero effort (spoof) imposters},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711469},
  doi          = {10.1109/WIFS.2010.5711469},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/0001TS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AdityaCSMG10,
  author       = {Telidevara Aditya and
                  Venkatachalam Chandrasekaran and
                  Avinash Srinivasan and
                  Ravi Mukkamala and
                  Sandeep Gampa},
  title        = {Similarity coefficient generators for network forensics},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711462},
  doi          = {10.1109/WIFS.2010.5711462},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AdityaCSMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AdjerohCPR10,
  author       = {Donald A. Adjeroh and
                  Deng Cao and
                  Marco Piccirilli and
                  Arun Ross},
  title        = {Predictability and correlation in human metrology},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711470},
  doi          = {10.1109/WIFS.2010.5711470},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AdjerohCPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AndaloTG10,
  author       = {Fernanda A. Andal{\'{o}} and
                  Gabriel Taubin and
                  Siome Goldenstein},
  title        = {Detecting vanishing points by segment clustering on the projective
                  plane for single-view photogrammetry},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711453},
  doi          = {10.1109/WIFS.2010.5711453},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/AndaloTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniGL10,
  author       = {Mauro Barni and
                  Jorge Guajardo and
                  Riccardo Lazzeretti},
  title        = {Privacy preserving evaluation of signal quality with application to
                  {ECG} analysis},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711460},
  doi          = {10.1109/WIFS.2010.5711460},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BendaleB10,
  author       = {Abhijit Bendale and
                  Terrance E. Boult},
  title        = {id-Privacy in large scale biometric systems},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711439},
  doi          = {10.1109/WIFS.2010.5711439},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BendaleB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BuhanGK10,
  author       = {Ileana Buhan and
                  Jorge Guajardo and
                  Emile Kelkboom},
  title        = {Efficient strategies to play the indistinguishability game for fuzzy
                  sketches},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711473},
  doi          = {10.1109/WIFS.2010.5711473},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BuhanGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/CaldelliAPI10,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni and
                  Matteo Innocenti},
  title        = {Fast image clustering of unknown source images},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711454},
  doi          = {10.1109/WIFS.2010.5711454},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/CaldelliAPI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ChristleinRA10,
  author       = {Vincent Christlein and
                  Christian Riess and
                  Elli Angelopoulou},
  title        = {On rotation invariance in copy-move forgery detection},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711472},
  doi          = {10.1109/WIFS.2010.5711472},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ChristleinRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Chuang010,
  author       = {Wei{-}Hong Chuang and
                  Min Wu},
  title        = {Semi non-intrusive training for cell-phone camera model linkage},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711468},
  doi          = {10.1109/WIFS.2010.5711468},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Chuang010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DiasRG10,
  author       = {Zanoni Dias and
                  Anderson Rocha and
                  Siome Goldenstein},
  title        = {First steps toward image phylogeny},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711452},
  doi          = {10.1109/WIFS.2010.5711452},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DiasRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FillerF10,
  author       = {Tom{\'{a}}s Filler and
                  Jessica J. Fridrich},
  title        = {Minimizing additive distortion functions with non-binary embedding
                  operation in steganography},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711444},
  doi          = {10.1109/WIFS.2010.5711444},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FillerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FlorencioH10,
  author       = {Dinei Flor{\^{e}}ncio and
                  Cormac Herley},
  title        = {Phishing and money mules},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711465},
  doi          = {10.1109/WIFS.2010.5711465},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FlorencioH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FrancoisSEF10,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Radu State and
                  Thomas Engel and
                  Olivier Festor},
  title        = {Digital forensics in VoIP networks},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711450},
  doi          = {10.1109/WIFS.2010.5711450},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FrancoisSEF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FranzDHJ0S10,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711458},
  doi          = {10.1109/WIFS.2010.5711458},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FranzDHJ0S10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaddeAR10,
  author       = {Ravindra B. Gadde and
                  Donald A. Adjeroh and
                  Arun Ross},
  title        = {Indexing iris images using the Burrows-Wheeler Transform},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711467},
  doi          = {10.1109/WIFS.2010.5711467},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaddeAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GaubatzS10,
  author       = {Matthew Gaubatz and
                  Steven J. Simske},
  title        = {Towards a feature set for robust printing-imaging cycle device identification
                  using structured printed markings},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711463},
  doi          = {10.1109/WIFS.2010.5711463},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/GaubatzS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HsiehLL10,
  author       = {Pei{-}Lun Hsieh and
                  Yu{-}Ming Liang and
                  Hong{-}Yuan Mark Liao},
  title        = {Recognition of blurred license plate images},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711447},
  doi          = {10.1109/WIFS.2010.5711447},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HsiehLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HuangM10,
  author       = {Yen{-}Wei Huang and
                  Pierre Moulin},
  title        = {Maximin optimality of the arcsine fingerprinting distribution and
                  the interleaving attack for large coalitions},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711451},
  doi          = {10.1109/WIFS.2010.5711451},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HuangM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KarakoyunluS10,
  author       = {Deniz Karakoyunlu and
                  Berk Sunar},
  title        = {Differential template attacks on {PUF} enabled cryptographic devices},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711445},
  doi          = {10.1109/WIFS.2010.5711445},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KarakoyunluS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KarthikH10,
  author       = {Kannan Karthik and
                  Dimitrios Hatzinakos},
  title        = {{MIX-SPLIT:} Controlled mixing of secrets and traceable pseudonym
                  generation using codebooks},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711443},
  doi          = {10.1109/WIFS.2010.5711443},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KarthikH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KeeF10,
  author       = {Eric Kee and
                  Hany Farid},
  title        = {Exposing digital forgeries from 3-D lighting environments},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711437},
  doi          = {10.1109/WIFS.2010.5711437},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KeeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiuLHC10,
  author       = {Bei{-}Bei Liu and
                  Heung{-}Kyu Lee and
                  Yongjian Hu and
                  Chang{-}Hee Choi},
  title        = {On classification of source cameras: {A} graph based approach},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711446},
  doi          = {10.1109/WIFS.2010.5711446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiuLHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MairgiotisG10,
  author       = {Antonis Mairgiotis and
                  Nikolaos Galatsanos},
  title        = {Bayesian watermark detection and new perceptual mask based on a spatially
                  weighted Total Variation image prior},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711464},
  doi          = {10.1109/WIFS.2010.5711464},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MairgiotisG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MajzoobiKD10,
  author       = {Mehrdad Majzoobi and
                  Farinaz Koushanfar and
                  Srinivas Devadas},
  title        = {{FPGA} {PUF} using programmable delay lines},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711471},
  doi          = {10.1109/WIFS.2010.5711471},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MajzoobiKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MathonBCM10,
  author       = {Benjamin Mathon and
                  Patrick Bas and
                  Fran{\c{c}}ois Cayre and
                  Beno{\^{\i}}t Macq},
  title        = {Security and robustness constraints for spread-spectrum Tardos fingerprinting},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711457},
  doi          = {10.1109/WIFS.2010.5711457},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MathonBCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Nandakumar10,
  author       = {Karthik Nandakumar},
  title        = {A fingerprint cryptosystem based on minutiae phase spectrum},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711456},
  doi          = {10.1109/WIFS.2010.5711456},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Nandakumar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/OdinakaLKOSKSR10,
  author       = {Ikenna Odinaka and
                  Po{-}Hsiang Lai and
                  Alan David Kaplan and
                  Joseph A. O'Sullivan and
                  Erik J. Sirevaag and
                  Sean D. Kristjansson and
                  Amanda K. Sheffield and
                  John W. Rohrbaugh},
  title        = {{ECG} biometrics: {A} robust short-time frequency analysis},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711466},
  doi          = {10.1109/WIFS.2010.5711466},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/OdinakaLKOSKSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PollardSA10,
  author       = {Stephen B. Pollard and
                  Steven J. Simske and
                  Guy B. Adams},
  title        = {Model based print signature profile extraction for forensic analysis
                  of individual text glyphs},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711442},
  doi          = {10.1109/WIFS.2010.5711442},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/PollardSA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Rane010,
  author       = {Shantanu Rane and
                  Wei Sun},
  title        = {Privacy preserving string comparisons based on Levenshtein distance},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711449},
  doi          = {10.1109/WIFS.2010.5711449},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Rane010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SadasivamMM10,
  author       = {Shankar Sadasivam and
                  Pierre Moulin and
                  Sean P. Meyn},
  title        = {A universal divergence-rate estimator for steganalysis in timing channels},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711459},
  doi          = {10.1109/WIFS.2010.5711459},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SadasivamMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SalmaniTP10,
  author       = {Hassan Salmani and
                  Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A layout-aware approach for improving localized switching to detect
                  hardware Trojans in integrated circuits},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711438},
  doi          = {10.1109/WIFS.2010.5711438},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/SalmaniTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ScheirerBB10,
  author       = {Walter J. Scheirer and
                  William Bishop and
                  Terrance E. Boult},
  title        = {Beyond {PKI:} The Biocryptographic Key Infrastructure},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711435},
  doi          = {10.1109/WIFS.2010.5711435},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ScheirerBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/TanLYS10,
  author       = {Bozhao Tan and
                  Aaron Lewicke and
                  David Yambay and
                  Stephanie Schuckers},
  title        = {The effect of environmental conditions and novel spoofing methods
                  on fingerprint anti-spoofing algorithms},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711436},
  doi          = {10.1109/WIFS.2010.5711436},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/TanLYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Veugen10,
  author       = {Thijs Veugen},
  title        = {Encrypted integer division},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711448},
  doi          = {10.1109/WIFS.2010.5711448},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Veugen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK10,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Taras Holotyak and
                  Fokko Beekhof and
                  Farzad Farhadzadeh},
  title        = {Privacy amplification of content identification systems based on fingerprint
                  bit reliability},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711461},
  doi          = {10.1109/WIFS.2010.5711461},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/WillemsI10,
  author       = {Frans M. J. Willems and
                  Tanya Ignatenko},
  title        = {Identification and secret-key binding in binary-symmetric template-protected
                  biometric systems},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711455},
  doi          = {10.1109/WIFS.2010.5711455},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/WillemsI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZhaoS10,
  author       = {Hong Zhao and
                  Yun Q. Shi},
  title        = {A phase-space reconstruction approach to detect covert channels in
                  {TCP/IP} protocols},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711441},
  doi          = {10.1109/WIFS.2010.5711441},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZhaoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Zhou10,
  author       = {Yuhan Zhou},
  title        = {Joint robust watermarking and image compression},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711440},
  doi          = {10.1109/WIFS.2010.5711440},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Zhou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2010,
  title        = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5707112/proceeding},
  isbn         = {978-1-4244-9078-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics