


default search action
1st WIFS 2009: London, UK
- First IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, December 6-9, 2009. IEEE 2009, ISBN 978-1-4244-5279-8

Watermarking and Perceptual Models
- Rony Darazi, Pilar Callau Uson, Benoît Macq:

Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital Cinema. 1-5 - Antonis Mairgiotis, Nikolaos Galatsanos:

A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detection. 6-10 - Federica Battisti

, Marco Carli
, Alessandro Neri
:
QIM-DM watermarking optimization based on inter-frequency contrast masking in the DCT domain. 11-15
Forensics
- Steven J. Simske, Margaret Sturgill, Paul Everest, George Guillory:

A system for forensic analysis of large image sets. 16-20 - Matthias Kirchner, Thomas Gloe:

On resampling detection in re-compressed images. 21-25 - Aravind K. Mikkilineni, Deen King-Smith, Saul B. Gelfand, Edward J. Delp

:
Forensic characterization of RF devices. 26-30 - Johan Garcia, Thijs Holleboom:

Retention of micro-fragments in cluster slack - A first model. 31-35
Traitor Tracing
- José Moreira, Marcel Fernandez, Miguel Soriano

:
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes. 36-40 - Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik

:
Tardos fingerprinting codes in the combined digit model. 41-45 - Luis Pérez-Freire, Teddy Furon:

Blind decoder for binary probabilistic traitor tracing codes. 46-50 - Yen-Wei Huang, Pierre Moulin:

Capacity-achieving fingerprint decoding. 51-55 - Teddy Furon, Luis Pérez-Freire:

Worst case attacks against binary probabilistic traitor tracing codes. 56-60
Biometry
- Francesco Beritelli, Andrea Spadaccini:

Heart sounds quality analysis for automatic cardiac biometry applications. 61-65 - Takao Murakami, Kenta Takahashi:

Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test. 66-70 - Yige Wang, Shantanu Rane, Anthony Vetro:

Leveraging reliable bits: ECC design considerations for practical secure biometric systems. 71-75 - Fokko Beekhof, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Taras Holotyak:
Fast identification algorithms for forensic applications. 76-80 - Abhishek Nagar, Anil K. Jain:

On the security of non-invertible fingerprint template transforms. 81-85 - Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Taras Holotyak
, Fokko Beekhof:
Privacy enhancement of common randomness based authentication: Key rate maximized case. 86-90
Privacy and Anonymity
- Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti

, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
, Vladimir Kolesnikov:
Efficient privacy-preserving classification of ECG signals. 91-95 - Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:

Privacy-preserving user clustering in a social network. 96-100 - Fabio Dellutri, Luigi Laura

, Vittorio Ottaviani, Giuseppe F. Italiano
:
Extracting social networks from seized smartphones and web data. 101-105 - Michaël Sterckx, Benedikt Gierlichs, Bart Preneel

, Ingrid Verbauwhede
:
Efficient implementation of anonymous credentials on Java Card smart cards. 106-110
Content Fingerprinting
- Avinash L. Varna, Min Wu:

Modeling content fingerprints using markov random fields. 111-115 - Wei-Hong Chuang, Avinash L. Varna, Min Wu:

Modeling and analysis of ordinal ranking in content fingerprinting. 116-120 - Mehrdad Fatourechi, Xudong Lv, Z. Jane Wang, Rabab K. Ward:

Towards automated image hashing based on the Fast Johnson-Lindenstrauss Transform (FJLT). 121-125 - Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski:

Security of robust audio hashes. 126-130
Watermarking, Steganography and Information Hiding
- Tomás Filler, Jessica J. Fridrich:

Wet ZZW construction for steganography. 131-135 - Maria V. Ortiz Segovia, George T.-C. Chiu

, Jan P. Allebach:
Using forms for information hiding and coding in electrophotographic documents. 136-140 - Chuhong Fei, Raymond H. Kwong, Deepa Kundur:

Secure semi-fragilewatermarking for image authentication. 141-145 - Michele Scagliola

, Fernando Pérez-González
, Pietro Guccione:
An extended analysis of discrete fourier tranform - rational dither modulation for non-white hosts. 146-150 - Matthew Gaubatz, Steven J. Simske:

Printer-scanner identification via analysis of structured security deterrents. 151-155
Non-White Hosts
- Tian-Tsong Ng

, Mao-Pei Tsui
:
Camera response function signature for digital forensics - Part I: Theory and data selection. 156-160 - Tian-Tsong Ng

:
Camera response function signature for digital forensics - Part II: Signature extraction. 161-165 - Nitin Khanna

, Edward J. Delp
:
Source scanner identification for scanned documents. 166-170 - Gökhan Gül, Ismail Avcibas:

Source cell phone camera identification based on singular value decomposition. 171-175
Non-White Hosts
- Tiziano Bianchi

, Thijs Veugen, Alessandro Piva
, Mauro Barni:
Processing in the encrypted domain using a composite signal representation: Pros and cons. 176-180 - Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker

:
BitStalker: Accurately and efficiently monitoring bittorrent traffic. 181-185 - Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji:

RFID key establishment against active adversaries. 186-190 - Elke De Mulder, Benedikt Gierlichs, Bart Preneel

, Ingrid Verbauwhede
:
Practical DPA attacks on MDPL. 191-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














