


default search action
IEEE Transactions on Information Forensics and Security, Volume 6
Volume 6, Number 1, March 2011
- Ronald William Smith, George Scott Knight:

Predictable Three-Parameter Design of Network Covert Communication Systems. 1-13 - Hussein A. Aly

:
Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error. 14-18 - Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi:

On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. 19-27 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan

:
Secure Device Pairing Based on a Visual Channel: Design and Usability Study. 28-38 - Shouhuai Xu, Xiaohu Li

, Timothy Paul Parker, Xueping Wang:
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data. 39-52 - Xinpeng Zhang:

Lossy Compression and Iterative Reconstruction for Encrypted Image. 53-58 - Ka-Chung Leung, Cheung Hoi Leung:

Improvement of Fingerprint Retrieval by a Statistical Classifier. 59-69 - Arun Ross, Asem A. Othman

:
Visual Cryptography for Biometric Privacy. 70-81 - Hugo Proença

:
Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength. 82-95 - Unsang Park, Raghavender R. Jillela, Arun Ross, Anil K. Jain:

Periocular Biometrics in the Visible Spectrum. 96-106 - Emile J. C. Kelkboom, Jeroen Breebaart, Tom A. M. Kevenaar, Ileana Buhan, Raymond N. J. Veldhuis:

Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. 107-121 - Lifeng Lai, Siu-Wai Ho

, H. Vincent Poor
:
Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case. 122-139 - Lifeng Lai, Siu-Wai Ho

, H. Vincent Poor
:
Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case. 140-151 - Chi-Yuan Chen, Kai-Di Chang, Han-Chieh Chao

:
Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem. 152-161 - Farinaz Koushanfar

, Azalia Mirhoseini:
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection. 162-174 - Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:

Towards Situational Awareness of Large-Scale Botnet Probing Events. 175-188 - Xuhua Ding

, Yanjiang Yang, Robert H. Deng
:
Database Access Pattern Protection Without Full-Shuffles. 189-201 - Alfredo Rial, Josep Balasch

, Bart Preneel
:
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer. 202-212 - Mani Malek Esmaeili, Mehrdad Fatourechi, Rabab Kreidieh Ward:

A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting. 213-226 - Miroslav Goljan, Jessica J. Fridrich, Mo Chen:

Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification. 227-236
Volume 6, Number 2, June 2011
- Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo

:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. 241-255 - João P. Vilela, Matthieu R. Bloch, João Barros

, Steven W. McLaughlin:
Wireless Secrecy Regions With Friendly Jamming. 256-266 - Amir Valizadeh, Z. Jane Wang:

Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding. 267-282 - Fabrizio Guerrini, Masahiro Okuda, Nicola Adami

, Riccardo Leonardi
:
High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators. 283-295 - Yongfeng Huang, Shanyu Tang, Jian Yuan:

Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec. 296-306 - Feng Liu, Chuankun Wu:

Embedded Extended Visual Cryptography Schemes. 307-322 - D. Wang, L. Dong, X. Li:

Towards Shift Tolerant Visual Secret Sharing Schemes. 323-337 - H. Choi, K. Choi, J. Kim:

Fingerprint Matching Incorporating Ridge Features With Minutiae. 338-345 - Fanglin Chen

, Jianjiang Feng, Anil K. Jain, Jie Zhou, Jin Zhang:
Separating Overlapped Fingerprints. 346-359 - Zhan-Li Sun, Kin-Man Lam

:
Depth Estimation of Face Images Based on the Constrained ICA Model. 360-370 - Thirimachos Bourlai

, Arun Ross, Anil K. Jain:
Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed, and Scanned Photos. 371-384 - Shreyas Venugopalan, Marios Savvides:

How to Generate Spoofed Irises From an Iris Code Template. 385-395 - Y.-L. Chen, C.-T. Hsu:

Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection. 396-406 - Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo

:
Constrained Function-Based Message Authentication for Sensor Networks. 407-425 - Yang Xiang

, Ke Li, Wanlei Zhou
:
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. 426-437 - Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:

Speculative Parallel Pattern Matching. 438-451 - Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti

, Ahmad-Reza Sadeghi, Thomas Schneider
:
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks. 452-468 - Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González

:
Secure Adaptive Filtering. 469-485 - Y. Zhu, Ying Tan

:
A Local-Concentration-Based Feature Extraction Approach for Spam Filtering. 486-497 - Xinyi Huang, Yi Mu, Willy Susilo

, Wei Wu, Jianying Zhou
, Robert H. Deng
:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. 498-512 - Miroslav Goljan, Jessica J. Fridrich, Mo Chen:

Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236]. 513
Volume 6, Number 3-1, September 2011
- Wade Trappe, H. Vincent Poor

, Hisato Iwai, Aylin Yener, Paul R. Prucnal, João Barros
:
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems. 521-522 - Motohiko Isaka, Seiya Kawata:

Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels. 523-531 - Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin, João Barros

, Byung-Jae Kwak:
LDPC Codes for the Gaussian Wiretap Channel. 532-540 - Shun Watanabe

, Yasutada Oohama:
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication. 541-550 - Chan Wong Wong, Tan F. Wong, John M. Shea

:
Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel. 551-564 - Anurag Agrawal

, Zouheir Rezki
, Ashish Khisti, Mohamed-Slim Alouini
:
Noncoherent Capacity of Secret-Key Agreement With Public Discussion. 565-574 - Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros

:
Coding for Cryptographic Security Enhancement Using Stopping Sets. 575-584 - Arunkumar Subramanian, Andrew Thangaraj

, Matthieu R. Bloch, Steven W. McLaughlin:
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes. 585-594 - Alexandre J. Pierrot

, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. 595-605 - Paul L. Yu, Brian M. Sadler

:
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer. 606-615 - João P. Vilela, Pedro C. Pinto, João Barros

:
Position-Based Jamming for Enhanced Wireless Secrecy. 616-627 - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints. 628-639 - S. Ali A. Fakoorian, A. Lee Swindlehurst

:
MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design. 640-649 - Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka:

Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems. 650-660 - Lei Jiang, Zhu Han, Maria Angeles Vázquez-Castro

, Are Hjørungnes:
Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints. 661-671 - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell

:
Secret-Key Agreement With Channel State Information at the Transmitter. 672-681 - Yingbin Liang, H. Vincent Poor

, Lei Ying
:
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization. 682-692 - Xiaowei Wang, Meixia Tao, Jianhua Mo

, Youyun Xu:
Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks. 693-702 - Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai

:
On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels. 703-711 - Satashu Goel, Vaneet Aggarwal

, Aylin Yener, A. Robert Calderbank:
The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach. 712-724 - Mable P. Fok

, Zhenxing Wang, Zhexing Deng, Paul R. Prucnal:
Optical Layer Security in Fiber-Optic Networks. 725-736 - Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef

, Ahmed K. Sultan
, Hesham El Gamal:
Keys Through ARQ: Theory and Practice. 737-751 - Suhas Mathur, Wade Trappe:

BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams. 752-762 - Hyoungsuk Jeon, Daesung Hwang, Jinho Choi

, Hyuckjae Lee, Jeongseok Ha:
Secure Type-Based Multiple Access. 763-774 - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic:

Key Agreement Over Multiple Access Channel. 775-790 - Neal Patwari, Joey Wilson:

Spatial Models for Human Motion-Induced Signal Strength Variance on Static Links. 791-802 - Ehsan Vahedi, Vahid Shah-Mansouri, Vincent W. S. Wong

, Ian F. Blake, Rabab K. Ward:
Probabilistic Analysis of Blocking Attack in RFID Systems. 803-817 - Melda Yuksel

, Xi Liu, Elza Erkip
:
A Secure Communication Game With a Relay Helping the Eavesdropper. 818-830 - Yongle Wu, K. J. Ray Liu:

An Information Secrecy Game in Cognitive Radio Networks. 831-842 - Saurabh U. Pawar, John F. Doherty:

Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy. 843-852 - Vinay Uday Prabhu, Miguel R. D. Rodrigues:

On Wireless Channels With varepsilon-Outage Secrecy Capacity. 853-860 - Jiangyuan Li, Athina P. Petropulu:

Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading. 861-867
Volume 6, Number 3-2, September 2011
- Dinu Coltuc

:
Improved Embedding for Prediction-Based Reversible Watermarking. 873-882 - Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Craig T. Jin

:
Blind Image Watermarking Using a Sample Projection Approach. 883-893 - Shankar Sadasivam, Pierre Moulin, Todd P. Coleman

:
A Message-Passing Approach to Combating Desynchronization Attacks. 894-905 - Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik

:
Tardos Fingerprinting Codes in the Combined Digit Model. 906-919 - Tomás Filler, Jan Judas, Jessica J. Fridrich:

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. 920-935 - I-Jen Lai, Wen-Hsiang Tsai:

Secret-Fragment-Visible Mosaic Image-A New Computer Art and Its Application to Information Hiding. 936-945 - Pei-Ju Chiang, Jan P. Allebach, George T.-C. Chiu

:
Extrinsic Signature Embedding and Detection in Electrophotographic Halftoned Images Through Exposure Modulation. 946-959 - Shyong Jian Shyu

, Ming Chiang Chen:
Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes. 960-969 - Robert Biddle, Mohammad Mannan, Paul C. van Oorschot

, Tara Whalen:
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects. 970-979 - Jing Liu, Bo Yang:

Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees. 980-991 - Pei-Ling Chiu, Kai-Hui Lee:

A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes. 992-1001 - Francesco Turroni, Davide Maltoni, Raffaele Cappelli

, Dario Maio
:
Improving Fingerprint Orientation Extraction. 1002-1013 - Vivek Kanhangad, Ajay Kumar

, David Zhang
:
A Unified Framework for Contactless Hand Verification. 1014-1027 - Zhifeng Li, Unsang Park, Anil K. Jain:

A Discriminative Model for Age Invariant Face Recognition. 1028-1037 - Chaoying Tang, Adams Wai-Kin Kong, Noah Craft:

Using a Knowledge-Based Approach to Remove Blocking Artifacts in Skin Images for Forensic Analysis. 1038-1049 - Matthew C. Stamm, K. J. Ray Liu:

Anti-Forensics of Digital Image Compression. 1050-1065 - Eric Kee, Micah K. Johnson, Hany Farid:

Digital Image Authentication From JPEG Headers. 1066-1075 - Ming-Wei Liu, John F. Doherty:

Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels. 1076-1085 - Pinghui Wang, Xiaohong Guan, Tao Qin, Qiuzhen Huang:

A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links. 1086-1098 - Irene Amerini

, Lamberto Ballan
, Roberto Caldelli
, Alberto Del Bimbo
, Giuseppe Serra
:
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery. 1099-1110 - Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo:

Identifying Image Composites Through Shadow Matte Consistency. 1111-1122 - Mehrdad Majzoobi, Farinaz Koushanfar

:
Time-Bounded Authentication of FPGAs. 1123-1135 - Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:

Malicious Circuitry Detection Using Thermal Conditioning. 1136-1145 - Avinash L. Varna, Min Wu

:
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. 1146-1159 - Raffaele Cappelli

, Matteo Ferrara
, Dario Maio:
Candidate List Reduction Based on the Analysis of Fingerprint Indexing Scores. 1160-1164 - Carsten Gottschlich

, Thomas Hotz, Robert Lorenz, Stefanie Bernhardt, Michael Hantschel, Axel Munk:
Modeling the Growth of Fingerprints Improves Matching for Adolescents. 1165-1169 - Charles Lamech, Reza M. Rad, Mohammad Tehranipoor, Jim Plusquellic:

An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities. 1170-1179 - Koichiro Niinuma, Unsang Park, Anil K. Jain:

Erratum to "Soft Biometric Traits for Continuous User Authentication". 1180
Volume 6, Number 4, 2011
- Mohammad Sayad Haghighi

, Kamal Mohamedpour, Vijay Varadharajan
, Barry G. Quinn
:
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. 1185-1199 - Ehsan Nezhadarya, Z. Jane Wang, Rabab Kreidieh Ward:

Robust Image Watermarking Based on Multiscale Gradient Direction Quantization. 1200-1213 - Tu-Thach Quach:

Optimal Cover Estimation Methods and Steganographic Payload Location. 1214-1222 - Xinpeng Zhang, Zhenxing Qian

, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. 1223-1232 - Qiong Huang, Duncan S. Wong, Willy Susilo

:
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. 1233-1247 - Kien Nguyen Thanh

, Clinton Fookes
, Sridha Sridharan, Simon Denman:
Quality-Driven Super-Resolution for Less Constrained Iris Recognition at a Distance and on the Move. 1248-1258 - Yingbo Zhou, Ajay Kumar

:
Human Identification Using Palm-Vein Images. 1259-1274 - Hae Jong Seo, Peyman Milanfar:

Face Verification Using the LARK Representation. 1275-1286 - Sina Jahanbin, Hyohoon Choi, Alan C. Bovik

:
Passive Multimodal 2-D+3-D Face Recognition Using Gabor Features and Landmark Distances. 1287-1304 - Miguel A. Ferrer

, Aythami Morales
:
Hand-Shape Biometrics Combining the Visible and Short-Wave Infrared Bands. 1305-1314 - Sairul Izwan Safie

, John J. Soraghan, Lykourgos Petropoulakis:
Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR). 1315-1322 - Shengzhi Zhang

, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. 1323-1334 - Hai-Dong Yuan:

Blind Forensics of Median Filtering in Digital Images. 1335-1345 - Yan Shi, Michael A. Jensen:

Improved Radiometric Identification of Wireless Devices Using MIMO Transmission. 1346-1354 - Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:

Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding. 1355-1369 - Wenjun Gu, Sriram Chellappan, Xiaole Bai, Honggang Wang

:
Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks. 1370-1381 - Qian Wang, Zesheng Chen, Chao Chen:

Darknet-Based Inference of Internet Worm Temporal Characteristics. 1382-1393 - Bogdan Carbunar, Radu Sion

:
Write-Once Read-Many Oblivious RAM. 1394-1403 - Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:

Comprehensive and Efficient Protection of Kernel Control Data. 1404-1417 - Levent Özparlak, Ismail Avcibas:

Differentiating Between Images Using Wavelet-Based Transforms: A Comparative Study. 1418-1431 - Daw-Tung Lin, Kai-Yung Huang:

Collaborative Pedestrian Tracking and Data Fusion With Multiple Cameras. 1432-1444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














