Journal: IEEE Transactions on Information Forensics and Security

Volume 8, Issue 2

273 -- 282Hong Zhao, Yun-Qing Shi. Detecting Covert Channels in Computer Networks Based on Chaos Theory
283 -- 294Andrew Chi-Chih Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices
295 -- 304Ngoc-Son Vu. Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition
305 -- 313Qian Tao, Raymond N. J. Veldhuis. Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics
314 -- 323Cristina Comaniciu, H. Vincent Poor. On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels
324 -- 334Rafael F. Wyrembelski, Moritz Wiese, Holger Boche. Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages
335 -- 349Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro. Revealing the Traces of JPEG Compression Anti-Forensics
350 -- 360Sheng Li, Alex C. Kot. Fingerprint Combination for Privacy Protection
361 -- 373Jessica J. Fridrich. Effect of Cover Quantization on Steganographic Fisher Information
374 -- 389Stefano Berretti, Alberto Del Bimbo, Pietro Pala. Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts
390 -- 401Robin Doss, Wanlei Zhou, Shui Yu. Secure RFID Tag Ownership Transfer Based on Quadratic Residues
402 -- 413Larry A. Dunning, Ray Kresman. Privacy Preserving Data Sharing With Anonymous ID Assignment
414 -- 419Shih-Chun Lin, Pin-Hsun Lin. On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT