


default search action
WIFS 2012: Costa Adeje, Tenerife, Spain
- 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012. IEEE 2012, ISBN 978-1-4673-2285-0

- Xuanbin Si, Jianjiang Feng, Jie Zhou:

Detecting fingerprint distortion from a single image. 1-6 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:

Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensors. 7-12 - Chengwei Huang

, Boris A. Efraty, Uday Kurkure, Manos Papadakis, Shishir K. Shah
, Ioannis A. Kakadiaris
:
Facial landmark configuration for improved detection. 13-18 - Jürgen Metzler:

Two-stage appearance-based re-identification of humans in low-resolution videos. 19-24 - Emanuele Maiorana

, Daniele Blasi, Patrizio Campisi:
Biometric template protection using turbo codes and modulation constellations. 25-30 - Brian DeCann, Arun Ross:

Can a "poor" verification system be a "good" identification system? A preliminary study. 31-36 - Gabriel Hospodar, Roel Maes

, Ingrid Verbauwhede
:
Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. 37-42 - Sviatoslav Voloshynovskiy

, Maurits Diephuis, Fokko Beekhof, Oleksiy J. Koval, Bruno Keel:
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS). 43-48 - Thijs Veugen:

Improving the DGK comparison protocol. 49-54 - Tommaso Pignata, Riccardo Lazzeretti

, Mauro Barni:
General function evaluation in a STPC setting via piecewise linear approximation. 55-60 - Bing-Rong Lin, Ye Wang, Shantanu Rane:

A framework for privacy preserving statistical analysis on distributed databases. 61-66 - Ravi Garg, Avinash L. Varna, Min Wu:

Modeling and analysis of Electric Network Frequency signal for timestamp verification. 67-72 - Yannis Panagakis

, Constantine Kotropoulos:
Telephone handset identification by feature selection and sparse representations. 73-78 - Andreas Peter, Thomas Hartmann, Sascha Müller, Stefan Katzenbeisser:

Privacy-preserving architecture for forensic image recognition. 79-84 - Maik Schott, Ronny Merkel, Jana Dittmann:

Sequence detection of overlapping latent fingerprints using a short-term aging feature. 85-90 - Samuel Marchal

, Jérôme François
, Radu State, Thomas Engel:
Semantic based DNS forensics. 91-96 - Juan A. Elices, Fernando Pérez-González

:
Fingerprinting a flow of messages to an anonymous server. 97-102 - Tomás Pevný

, Martin Rehák, Martin Grill:
Detecting anomalous network hosts by means of PCA. 103-108 - Panagiotis Andriotis

, George C. Oikonomou
, Theo Tryfonas
:
Forensic analysis of wireless networking evidence of Android smartphones. 109-114 - Fernando Pérez-González

, Carmela Troncoso:
A Least Squares approach to user profiling in pool mix-based anonymous communication systems. 115-120 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:

Mapping evidence graphs to attack graphs. 121-126 - Tiziano Bianchi

, Alessandro Piva
:
Reverse engineering of double JPEG compression in the presence of image resizing. 127-132 - Fokko Beekhof, Sviatoslav Voloshynovskiy

, Farzad Farhadzadeh:
Content authentication and identification under informed attacks. 133-138 - Thomas Gloe:

Forensic analysis of ordered data structures on the example of JPEG files. 139-144 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:

Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices. 145-150 - David Vazquez-Padin, Marco Fontani, Tiziano Bianchi

, Pedro Comesaña
, Alessandro Piva
, Mauro Barni:
Detection of video double encoding with GOP size estimation. 151-156 - Miguel Masciopinto, Pedro Comesaña

:
IPTV streaming source classification. 157-162 - Jessica J. Fridrich:

Effect of cover quantization on steganographic fisher information. 163-168 - Linjie Guo, Jiangqun Ni, Yun-Qing Shi:

An efficient JPEG steganographic scheme using uniform embedding. 169-174 - Sviatoslav Voloshynovskiy

, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak
:
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting. 175-180 - Xiao-Ming Chen, Michael Arnold, Peter G. Baum, Gwenaël J. Doërr

:
AC-3 bit stream watermarking. 181-186 - Teddy Furon, Arnaud Guyader, Frédéric Cérou:

Decoding fingerprints using the Markov Chain Monte Carlo method. 187-192 - Pascal Schöttle, Stefan Korff, Rainer Böhme:

Weighted stego-image steganalysis for naive content-adaptive embedding. 193-198 - Mauro Barni, Benedetta Tondi:

Optimum forensic and counter-forensic strategies for source identification with training data. 199-204 - David Vazquez-Padin, Pedro Comesaña

:
ML estimation of the resampling factor. 205-210 - Pedro Comesaña

:
Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains. 211-216 - Sergio Bravo-Solorio, Chang-Tsun Li

, Asoke K. Nandi:
Watermarking method with exact self-propagating restoration capabilities. 217-222 - Ion Caciula

, Dinu Coltuc
:
Capacity control of reversible watermarking by two-thresholds embedding. 223-227 - Pham Hai Dang Le, Matthias O. Franz

:
How to find relevant training data: A paired bootstrapping approach to blind steganalysis. 228-233 - Vojtech Holub, Jessica J. Fridrich:

Designing steganographic distortion using directional filters. 234-239 - Thijs Laarhoven

, Jan-Jaap Oosterwijk, Jeroen Doumen:
Dynamic traitor tracing for arbitrary alphabets: Divide and conquer. 240-245 - Hajer Fradi

, Jean-Luc Dugelay
:
Low level crowd analysis using frame-wise normalized feature for people counting. 246-251 - Duc-Tien Dang-Nguyen

, Giulia Boato, Francesco G. B. De Natale:
Identify computer generated characters by analysing facial expressions variation. 252-257 - Sabrina Gerbracht, Eduard A. Jorswieck

, Gan Zheng, Björn E. Ottersten:
Non-regenerative two-hop wiretap channels using interference neutralization. 258-263 - Romeo Giuliano

, Alessandro Neri
, Damiano Valletta:
End-to-end secure connection in heterogeneous networks for critical scenarios. 264-269 - Holger Boche, Rafael F. Wyrembelski:

Comparison of different attack classes in arbitrarily varying wiretap channels. 270-275 - Jiangyuan Li, Athina P. Petropulu:

Optimality of beamforming for secrecy capacity of MIMO wiretap channels. 276-281 - Yupeng Liu, Athina P. Petropulu:

Destination assisted cooperative jamming for wireless physical layer security. 282-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














