


default search action
IEEE Transactions on Information Forensics and Security, Volume 1
Volume 1, Number 1, March 2006
- Petar S. Aleksic, Aggelos K. Katsaggelos

:
Automatic facial expression recognition using facial animation parameters and multistream HMMs. 3-11 - Sotiris Malassiotis, Niki Aifanti, Michael G. Strintzis:

Personal authentication using 3-D finger geometry. 12-21 - Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto:

A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification. 22-34 - Charles G. Boncelet Jr.:

The NTMAC for authentication of noisy messages. 35-42 - Chuhong Fei, Deepa Kundur, Raymond H. Kwong:

Analysis and design of secure watermark-based authentication systems. 43-55 - Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo:

Approximate Message Authentication Codes for N-ary Alphabets. 56-67 - Vishal Monga, Arindam Banerjee, Brian L. Evans:

A clustering based approach to perceptual image hashing. 68-79 - Luis Pérez-Freire, Fernando Pérez-González

, Sviatoslav Voloshynovskiy
:
An accurate analysis of scalar quantization-based data hiding. 80-86 - Damien Delannay, Benoît Macq:

Watermarking relying on cover signal content to hide synchronization marks. 87-101 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:

Wet paper codes with improved embedding efficiency. 102-110 - Siwei Lyu, Hany Farid:

Steganalysis using higher-order image statistics. 111-119
Volume 1, Number 2, June 2006
- Anil K. Jain, Arun Ross, Sharath Pankanti:

Biometrics: a tool for information security. 125-143 - Daniel Schonberg, Darko Kirovski:

EyeCerts. 144-153 - Natalia A. Schmid, Manasi V. Ketkar, Harshinder Singh, Bojan Cukic

:
Performance analysis of iris-based identification system at the matching score level. 154-168 - Xinjian Chen

, Jie Tian, Xin Yang, Yangyang Zhang:
An algorithm for distorted fingerprint matching based on local triangle feature set. 169-177 - Eyad Haj-Said, Diaa Eldin M. Nassar, Gamal Fahmy, Hany H. Ammar:

Teeth segmentation in digitized dental X-ray films using mathematical morphology. 178-189 - Qing Li, Wade Trappe:

Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. 190-204 - Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:

Digital camera identification from sensor pattern noise. 205-214 - Ashwin Swaminathan, Yinian Mao, Min Wu

:
Robust and secure image hashing. 215-230 - Shan He, Min Wu

:
Joint coding and embedding techniques for MultimediaFingerprinting. 231-247 - Hans Georg Schaathun:

The Boneh-Shaw fingerprinting scheme is better than we thought. 248-255 - Irene G. Karybali, Kostas Berberidis:

Efficient spatial image watermarking via new perceptual masking and blind detection schemes. 256-274 - Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath:

Steganalysis for Markov cover data with applications to images. 275-287
Volume 1, Number 3, September 2006
- Pierre Moulin, Anil Kumar Goteti:

Block QIM watermarking games. 293-310 - H. Vicky Zhao, K. J. Ray Liu:

Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. 311-329 - Wen-Nung Lie, Guo-Shiang Lin, Sheng-Lung Cheng:

Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. 330-341 - E. P. Vivek, N. Sudha:

Gray Hausdorff distance measure for comparing face images. 342-349 - Sinjini Mitra, Marios Savvides, B. V. K. Vijaya Kumar

:
Face identification using novel frequency-domain representation of facial asymmetry. 350-359 - Athos Antonelli, Raffaele Cappelli

, Dario Maio, Davide Maltoni:
Fake finger detection by skin distortion analysis. 360-373 - Derek Justice, Alfred O. Hero III:

Estimation of message source and destination from network intercepts. 374-385 - Bin Yan

, Zhe-Ming Lu, Sheng-He Sun:
Security of autoregressive speech watermarking model under guessing attack. 386-390 - Jessica J. Fridrich, David Soukal:

Matrix embedding for large payloads. 390-395 - Jean-Camille Birget, Dawei Hong, Nasir D. Memon

:
Graphical passwords based on robust discretization. 395-399
Volume 1, Number 4, December 2006
- Renato Villán, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Thierry Pun:
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management. 405-420 - Luis Pérez-Freire, Fernando Pérez-González

, Teddy Furon, Pedro Comesaña
:
Security of Lattice-Based Data Hiding Against the Known Message Attack. 421-439 - H. Vicky Zhao, K. J. Ray Liu:

Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. 440-456 - Arunan Ramalingam, Sridhar Krishnan

:
Gaussian Mixture Modeling of Short-Time Fourier Transform Features for Audio Fingerprinting. 457-463 - Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran, Ibrahim El-Khalil:

'Print and Scan' Resilient Data Hiding in Images. 464-478 - Oktay Altun

, Gaurav Sharma, Mehmet Utku Celik
, Mark F. Bocko
:
A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection. 479-492 - Chin-Chen Chang, Chih-Yang Lin

:
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. 493-501 - Udit Budhia, Deepa Kundur, Takis Zourntos:

Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. 502-516 - Yu Liu, Charles G. Boncelet Jr.:

The CRC-NTMAC for Noisy Message Authentication. 517-523 - Adam L. Young, Moti Yung:

On Fundamental Limitations of Proving Data Theft. 524-531 - Xudong Jiang

, Manhua Liu, Alex ChiChung Kot:
Fingerprint Retrieval for Identification. 532-542 - Soo-Chang Pei, Yi-Chong Zeng:

A Novel Image Recovery Algorithm for Visible Watermarked Images. 543-550

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














