- Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing:
Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection. IEEE Trans. Inf. Forensics Secur. 10(9): 1850-1861 (2015) - Sheng Huang, Ahmed M. Elgammal, Jiwen Lu, Dan Yang:
Cross-Speed Gait Recognition Using Speed-Invariant Gait Templates and Globality-Locality Preserving Projections. IEEE Trans. Inf. Forensics Secur. 10(10): 2071-2083 (2015) - Yonggang Huang, Jun Zhang, Heyan Huang:
Camera Model Identification With Unknown Models. IEEE Trans. Inf. Forensics Secur. 10(12): 2692-2704 (2015) - Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks. IEEE Trans. Inf. Forensics Secur. 10(12): 2562-2577 (2015) - Shaoquan Jiang:
On the Optimality of Keyless Authentication in a Noisy Model. IEEE Trans. Inf. Forensics Secur. 10(6): 1250-1261 (2015) - Shaoquan Jiang:
On the Size of Source Space in a Secure MAC. IEEE Trans. Inf. Forensics Secur. 10(9): 2007-2015 (2015) - Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - Yi Jin, Jiwen Lu, Qiuqi Ruan:
Coupled Discriminative Feature Learning for Heterogeneous Face Recognition. IEEE Trans. Inf. Forensics Secur. 10(3): 640-652 (2015) - Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability. IEEE Trans. Inf. Forensics Secur. 10(2): 409-422 (2015) - Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(1): 190-199 (2015) - Ashkan Kalantari, Gan Zheng, Zhen Gao, Zhu Han, Björn E. Ottersten:
Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Trans. Inf. Forensics Secur. 10(9): 1862-1874 (2015) - Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki:
Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent. IEEE Trans. Inf. Forensics Secur. 10(7): 1394-1401 (2015) - Sotirios Karachontzitis, Stelios Timotheou, Ioannis Krikidis, Kostas Berberidis:
Security-Aware Max-Min Resource Allocation in Multiuser OFDMA Downlink. IEEE Trans. Inf. Forensics Secur. 10(3): 529-542 (2015) - Muhammad R. A. Khandaker, Kai-Kit Wong:
Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 10(1): 40-54 (2015) - Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. IEEE Trans. Inf. Forensics Secur. 10(3): 679-693 (2015) - Oleg V. Komogortsev, Alexey Karpov, Corey D. Holland:
Attack of Mechanical Replicas: Liveness Detection With Eye Movements. IEEE Trans. Inf. Forensics Secur. 10(4): 716-725 (2015) - Hsin-Wen Kung, Yi-Han Tu, Chiou-Ting Hsu:
Dual Subspace Nonnegative Graph Embedding for Identity-Independent Expression Recognition. IEEE Trans. Inf. Forensics Secur. 10(3): 626-639 (2015) - Taekyoung Kwon, Jin Hong:
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE Trans. Inf. Forensics Secur. 10(2): 278-292 (2015) - Thijs Laarhoven:
Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities. IEEE Trans. Inf. Forensics Secur. 10(9): 1967-1980 (2015) - Enping Li, Scott Craver, Jun Yu:
Capacity Limits of Pseudorandom Channels in Deception Problems. IEEE Trans. Inf. Forensics Secur. 10(9): 1824-1834 (2015) - Cai Li, Jiankun Hu, Josef Pieprzyk, Willy Susilo:
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. IEEE Trans. Inf. Forensics Secur. 10(6): 1193-1206 (2015) - Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. IEEE Trans. Inf. Forensics Secur. 10(3): 507-518 (2015) - Mu Li, Vishal Monga:
Twofold Video Hashing With Automatic Synchronization. IEEE Trans. Inf. Forensics Secur. 10(8): 1727-1738 (2015) - Xiaoyong Li, Huadong Ma, Feng Zhou, Wenbin Yao:
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services. IEEE Trans. Inf. Forensics Secur. 10(7): 1402-1415 (2015) - Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis. IEEE Trans. Inf. Forensics Secur. 10(3): 558-573 (2015) - Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang:
A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 10(9): 1905-1917 (2015) - Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans. Inf. Forensics Secur. 10(9): 2016-2027 (2015) - Ke Li, Weiming Zhang, Ce Yang, Nenghai Yu:
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1918-1926 (2015) - Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015)