


default search action
IEEE Transactions on Information Forensics and Security, Volume 2
Volume 2, Number 1, March 2007
- Xingliang Huang, Bo Zhang:

Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks. 1-13 - Maneli Noorkami, Russell M. Mersereau:

A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance. 14-23 - Tsung-Yuan Liu, Wen-Hsiang Tsai:

A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. 24-30 - Ying Wang, Pierre Moulin:

Optimized Feature Extraction for Learning-Based Image Steganalysis. 31-45 - Andrew D. Ker:

Steganalysis of Embedding in Two Least-Significant Bits. 46-54 - Stefanos Zafeiriou, Anastasios Tefas

, Ioannis Pitas:
Learning Discriminant Person-Specific Facial Models Using Expandable Graphs. 55-68 - Shuicheng Yan

, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang:
A Parameter-Free Framework for General Supervised Subspace Learning. 69-76 - Jinyu Zuo, Natalia A. Schmid

, Xiaohan Chen:
On Generation and Analysis of Synthetic Iris Images. 77-90 - Ashwin Swaminathan, Min Wu

, K. J. Ray Liu:
Nonintrusive Component Forensics of Visual Sensors Using Output Images. 91-106
Volume 2, Number 2, June 2007
- Maha El Choubassi, Pierre Moulin:

Noniterative Algorithms for Sensitivity Analysis Attacks. 113-126 - Qiao Li, Ingemar J. Cox

:
Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking. 127-139 - Andrew D. Ker:

Derivation of Error Distribution in Least Squares Steganalysis. 140-148 - Teddy Furon:

A Constructive and Unifying Framework for Zero-Bit Watermarking. 149-163 - Sheng Huang, Jian Kang Wu:

Optical Watermarking for Printed Document Authentication. 164-173 - Zhifeng Li, Xiaoou Tang:

Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition. 174-180 - Ajay Kumar

, David Zhang
:
Hand-Geometry Recognition Using Entropy-Based Discretization. 181-187 - Omaima Nomir, Mohamed Abdel-Mottaleb

:
Human Identification From Dental X-Ray Images Based on the Shape and Appearance of the Teeth. 188-197 - Yinian Mao, Min Wu

:
Tracing Malicious Relays in Cooperative Wireless Communications. 198-212 - Yan Lindsay Sun, K. J. Ray Liu:

Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes. 213-226 - Wei Yu, K. J. Ray Liu:

Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. 227-239 - Wei Yu, Zhu Ji, K. J. Ray Liu:

Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. 240-253 - Félix Balado, Neil J. Hurley

, Elizabeth P. McCarthy, Guenole C. M. Silvestre:
Performance Analysis of Robust Audio Hashing. 254-266 - Shen-Zheng Wang, Hsi-Jian Lee:

A Cascade Framework for a Real-Time Statistical Plate Recognition System. 267-282 - Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon:

Performance Analysis of Scalar DC-QIM for Zero-Bit Watermarking. 283-289
Volume 2, Number 3-1, September 2007
- Jidong Zhong, Shangteng Huang:

Double-Sided Watermark Embedding and Detection. 297-310 - Xiao Tong Wang, Cheng Yong Shao, X. G. Xu, Xiamu Niu:

Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion. 311-320 - Sunil Lee, Chang Dong Yoo, Ton Kalker:

Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform. 321-330 - Nigel M. Allinson

, Jeevandra Sivarajah, Ian Gledhill, Michael Carling, L. J. Allinson:
Robust Wireless Transmission of Compressed Latent Fingerprint Images. 331-340 - Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin

:
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. 341-349 - Franco Frattolillo

:
Watermarking Protocol for Web Context. 350-363 - Robert D. Wilson, David Tse, Robert A. Scholtz:

Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels. 364-375 - Vishal Monga, Mehmet Kivanç Mihçak:

Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. 376-390 - Yongfang Zhu, Sarat C. Dass

, Anil K. Jain:
Statistical Models for Assessing the Individuality of Fingerprints. 391-401 - Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi

:
A Memetic Fingerprint Matching Algorithm. 402-412 - Daniel González-Jiménez, José Luis Alba-Castro:

Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry. 413-429 - Gady Agam, Suneel Suresh:

Warping-Based Offline Signature Recognition. 430-437 - Weihong Wang, Hany Farid:

Exposing Digital Forgeries in Interlaced and Deinterlaced Video. 438-449 - Micah K. Johnson, Hany Farid:

Exposing Digital Forgeries in Complex Lighting Environments. 450-461 - Yinian Mao, Min Wu

:
Unicity Distance of Robust Image Hashing. 462-467 - Jianjun Chen, Zoltan Safar, John Aasted Sørensen

:
Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure. 468-484
Volume 2, Number 3-2, September 2007
- Bir Bhanu

, Nalini K. Ratha
, B. V. K. Vijaya Kumar, Rama Chellappa, Josef Bigün
:
Guest Editorial: Special Issue on Human Detection and Recognition. 489-490 - Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:

Spoof Attacks on Gait Authentication System. 491-502 - Yagiz Sutcu, Qiming Li, Nasir D. Memon

:
Protecting Biometric Templates With Sketch: Theory and Practice. 503-512 - Le Zou, Samuel Cheng, Zixiang Xiong, Mi Lu, Kenneth R. Castleman:

3-D Face Recognition Based on Warped Example Faces. 513-528 - Jamie Cook, Vinod Chandran

, Sridha Sridharan:
Multiscale Representation for 3-D Face Recognition. 529-536 - Iordanis Mpiperis, Sotiris Malassiotis, Michael G. Strintzis:

3-D Face Recognition With the Geodesic Polar Representation. 537-547 - Klaus Kollreider, Hartwig Fronthaler, Maycel Isaac Faraj, Josef Bigün

:
Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment. 548-558 - Lutz Goldmann, Ullrich J. Mönich, Thomas Sikora:

Components and Their Topology for Robust Face Detection in the Presence of Partial Occlusions. 559-569 - Georgios Goudelis, Stefanos Zafeiriou, Anastasios Tefas

, Ioannis Pitas:
Class-Specific Kernel-Discriminant Analysis for Face Verification. 570-587 - Irene Kotsia, Stefanos Zafeiriou, Ioannis Pitas:

A Novel Discriminant Non-Negative Matrix Factorization Algorithm With Applications to Facial Image Characterization Problems. 588-595 - Francesco Beritelli, Salvatore Serrano

:
Biometric Identification Based on Frequency Analysis of Cardiac Sounds. 596-604 - Soumyadip Rakshit, Donald M. Monro:

An Evaluation of Image Sampling and Compression for Human Iris Recognition. 605-612 - Pablo H. Hennings-Yeomans, B. V. K. Vijaya Kumar

, Marios Savvides:
Palmprint Classification Using Multiple Advanced Correlation Filters and Palm-Specific Segmentation. 613-622 - Dimosthenis Ioannidis

, Dimitrios Tzovaras
, Ioannis G. Damousis, Savvas Argyropoulos, Konstantinos Moustakas:
Gait Recognition Using Compact Feature Extraction Transforms and Depth Information. 623-630 - Hazim Kemal Ekenel

, Hua Gao, Rainer Stiefelhagen:
3-D Face Recognition Using Local Appearance-Based Models. 630-636 - Anil Kumar Sao, B. Yegnanarayana:

Face Verification Using Template Matching. 636-641
Volume 2, Number 4, December 2007
- Wei Liu, Lina Dong, Wenjun Zeng

:
Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking. 645-654 - Xiangyang Wang, Jun Wu, Panpan Niu:

A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks. 655-663 - Husrev T. Sencar, Nasir D. Memon

:
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. 664-682 - Serap Kirbiz

, Aweke N. Lemma, Mehmet Utku Celik
, Stefan Katzenbeisser:
Decode-Time Forensic Watermarking of AAC Bitstreams. 683-696 - Shan He, Min Wu

:
Collusion-Resistant Video Fingerprinting for Large User Group. 697-709 - Thanh-Ha Le, Jessy Clédière

, Christine Servière, Jean-Louis Lacoume:
Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant. 710-720 - Xuefeng Liang, Arijit Bishnu, Tetsuo Asano:

A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles. 721-733 - Fernando Alonso-Fernandez

, Julian Fiérrez-Aguilar
, Javier Ortega-Garcia
, Joaquin Gonzalez-Rodriguez
, Hartwig Fronthaler, Klaus Kollreider, Josef Bigün
:
A Comparative Study of Fingerprint Image-Quality Estimation Methods. 734-743 - Karthik Nandakumar, Anil K. Jain, Sharath Pankanti:

Fingerprint-Based Fuzzy Vault: Implementation and Performance. 744-757 - Gang Zheng, Chia-Jiu Wang, Terrance E. Boult:

Application of Projective Invariants in Hand Geometry Biometrics. 758-768 - Daniel González-Jiménez, José Luis Alba-Castro:

Shape-Driven Gabor Jets for Face Description and Authentication. 769-780 - Jian Yang, Chengjun Liu:

Horizontal and Vertical 2DPCA-Based Discriminant Analysis for Face Verification on a Large-Scale Database. 781-792 - Qing Li, Wade Trappe:

Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. 793-808 - Maneli Noorkami, Russell M. Mersereau:

Correction to "A Framework for Robust Watermarking of H.264 Encoded Video With Controllable Detection Performance". 809-809

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














