


default search action
WIFS 2011: Iguacu Falls, Brazil
- 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1017-9

- Thirimachos Bourlai

, Zain Jafri:
Eye detection in the Middle-Wave Infrared spectrum: Towards recognition in the dark. 1-6 - Vivek Balachandran, Sabu Emmanuel:

Software code obfuscation by hiding control flow information in stack. 1-6 - Roberto Caldelli

, Irene Amerini
, Andrea Novi:
An analysis on attacker actions in fingerprint-copy attack in source camera identification. 1-6 - Zouheir Trabelsi, Safaa Zeidan:

Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule. 1-6 - Jean-Baptiste Machemie, Clement Mazin, Jean-Louis Lanet, Julien Cartigny:

SmartCM a smart card fault injection simulator. 1-6 - Jérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel:

BotCloud: Detecting botnets using MapReduce. 1-6 - Soma Biswas, Kevin W. Bowyer

, Patrick J. Flynn:
A study of face recognition of identical twins by humans. 1-6 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:

Video Phylogeny: Recovering near-duplicate video relationships. 1-6 - Samet Hicsonmez, Husrev T. Sencar, Ismail Avcibas:

Audio codec identification through payload sampling. 1-6 - Wei Wang

, Jing Dong, Tieniu Tan:
Exploring DCT coefficient quantization effect for image tampering localization. 1-6 - Loic Dubois, William Puech, Jacques Blanc-Talon:

Smart selective encryption of CAVLC for H.264/AVC video. 1-6 - Driss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:

ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. 1-6 - Riccardo Lazzeretti

, Mauro Barni:
Division between encrypted integers by means of Garbled Circuits. 1-6 - David Vazquez-Padin, Fernando Pérez-González

:
Prefilter design for forensic resampling estimation. 1-6 - Mani Malek Esmaeili, Rabab K. Ward, Mehrdad Fatourechi:

Fast matching for video/audio fingerprinting algorithms. 1-6 - Hyoungsuk Jeon, Jinho Choi

, Steven W. McLaughlin, Jeongseok Ha:
Channel aware encryption and decision fusion for wireless sensor networks. 1-6 - Yi-Chong Zeng, Chiou-Ting Hsu:

Context intra-coding scheme for securing surveillance videos and its applications. 1-6 - Tsung-Yi Lin, Yen-Yu Lin

, Ming-Fang Weng, Yu-Chiang Frank Wang, Yu-Feng Hsu, Hong-Yuan Mark Liao:
Cross camera people counting with perspective estimation and occlusion handling. 1-6 - Patrizio Campisi, Gaetano Scarano

, Fabio Babiloni
, Fabrizio de Vico Fallani, Stefania Colonnese
, Emanuele Maiorana
, Laura Forastiere:
Brain waves based user recognition using the "eyes closed resting conditions" protocol. 1-6 - Thirimachos Bourlai

, Cameron Whitelam, Ioannis A. Kakadiaris
:
Pupil detection under lighting and pose variations in the visible and active infrared bands. 1-6 - Anil Kumar Sao, B. Yegnanarayana:

Laplacian of smoothed image as representation for face recognition. 1-6 - José Moreira, Grigory Kabatiansky, Marcel Fernandez:

Lower bounds on almost-separating binary codes. 1-6 - Joan Tomàs-Buliart, Ana Gomez-Muro, Marcel Fernandez, Miguel Soriano

:
Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios. 1-6 - Nicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley, Thanh-Ha Le, Jean-Luc Danger:

"Re-synchronization by moments": An efficient solution to align Side-Channel traces. 1-6 - Ramya Jayaram Masti, Vincent Lenders

, Mario Strasser, Stefan Engel, Bernhard Plattner:
Holmes: A data theft forensic framework. 1-6 - Philip Hodgers, Keanhong Boey, Máire O'Neill:

Variable window power spectral density attack. 1-6 - Joceli Mayer:

Improved Spread Spectrum multibit watermarking. 1-6 - Antonis Mairgiotis, Yongyi Yang, Lisimachos P. Kondi:

DWT-based additive image watermarking using the Student-t prior. 1-6 - Michael Beye, Zekeriya Erkin, Reginald L. Lagendijk:

Efficient privacy preserving K-means clustering in a three-party setting. 1-6 - Petros Boufounos

, Shantanu Rane:
Secure binary embeddings for privacy preserving nearest neighbors. 1-6 - Ziqing Mao, Dinei A. F. Florêncio, Cormac Herley:

Painless migration from passwords to two factor authentication. 1-6 - Sheng Li, Alex C. Kot:

Attack using reconstructed fingerprint. 1-6 - Asem A. Othman

, Arun Ross:
Mixing fingerprints for generating virtual identities. 1-6 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:

How contact pressure, contact time, smearing and oil/skin lotion influence the aging of latent fingerprint traces: First results for the binary pixel feature using a CWL sensor. 1-6 - Juan A. Elices, Fernando Pérez-González

, Carmela Troncoso
:
Fingerprinting Tor's hidden service log files using a timing channel. 1-6 - Augusto Aubry

, A. Bazzoni, Vincenzo Carotenuto, Antonio De Maio
, P. Failla:
Cumulants-based Radar Specific Emitter Identification. 1-6 - Marco Fontani, Tiziano Bianchi

, Alessia De Rosa, Alessandro Piva
, Mauro Barni:
A Dempster-Shafer framework for decision fusion in image forensics. 1-6 - Breno Silva Pinto, Ryan Barnett:

A novel algorithm for obfuscated code analysis. 1-5 - Jeffrey R. Paone, Patrick J. Flynn:

On the consistency of the biometric menagerie for irises and iris matchers. 1-6 - Tiziano Bianchi

, Alessandro Piva
:
Analysis of non-aligned double JPEG artifacts for the localization of image forgeries. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














