Journal: IEEE Transactions on Information Forensics and Security

Volume 10, Issue 9

1801 -- 1811Yanzhen Ren, Tingting Cai, Ming Tang, Lina Wang. AMR Steganalysis Based on the Probability of Same Pulse Position
1812 -- 1823Pu Zhao, Meng Zhang, Hui Yu, Hanwen Luo, Wen Chen 0001. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks
1824 -- 1834Enping Li, Scott Craver, Jun Yu. Capacity Limits of Pseudorandom Channels in Deception Problems
1835 -- 1849Bin Dai, Zheng Ma. Multiple-Access Relay Wiretap Channel
1850 -- 1861Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing. Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection
1862 -- 1874Ashkan Kalantari, Gan Zheng, Zhen Gao, Zhu Han, Björn E. Ottersten. Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications
1875 -- 1890Jonathon M. Smereka, Vishnu Naresh Boddeti, B. V. K. Vijaya Kumar. Probabilistic Deformation Models for Challenging Periocular Image Verification
1891 -- 1904Vincent Y. F. Tan, Matthieu R. Bloch. Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels
1905 -- 1917Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang. A Strategy of Clustering Modification Directions in Spatial Image Steganography
1918 -- 1926Ke Li, Weiming Zhang, Ce Yang, Nenghai Yu. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search
1927 -- 1938Honghai Yu, Pierre Moulin. SNR Maximization Hashing
1939 -- 1952Javier Franco-Contreras, Gouenou Coatrieux. Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control
1953 -- 1966Vanga Odelu, Ashok Kumar Das, Adrijit Goswami. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
1967 -- 1980Thijs Laarhoven. Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities
1981 -- 1992Kaitai Liang, Willy Susilo. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage
1993 -- 2006Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin. Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
2007 -- 2015Shaoquan Jiang. On the Size of Source Space in a Secure MAC
2016 -- 2027Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang. Efficient Reversible Data Hiding Based on Multiple Histograms Modification

Volume 10, Issue 8

1549 -- 1563Erkam Uzun, Husrev Taha Sencar. Carving Orphaned JPEG File Fragments
1564 -- 1577Seunghwan Park, Kwangsu Lee, Dong-Hoon Lee. New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
1578 -- 1589Kaitai Liang, Willy Susilo, Joseph K. Liu. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
1590 -- 1602Nadia Othman, Bernadette Dorizzi. Impact of Quality-Based Fusion Techniques for Video-Based Iris Recognition at a Distance
1603 -- 1616Yi Wang, Lipeng Wang, Yiu-ming Cheung, Pong C. Yuen. Learning Compact Binary Codes for Hash-Based Fingerprint Indexing
1617 -- 1629Jun Xiong, Yanqun Tang, Dongtang Ma, Pei Xiao, Kai-Kit Wong. Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback
1630 -- 1642Le Zhang, Xuanyao Fong, Chip-Hong Chang, Zhi-Hui Kong, Kaushik Roy. Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable Function With Multi-Response-Bits Per Cell
1643 -- 1655Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kâafar, Josef Pieprzyk. On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
1656 -- 1665Emin Islam Tatli. Cracking More Password Hashes With Patterns
1666 -- 1677Zhenxin Zhan, Maochao Xu, Shouhuai Xu. Predicting Cyber Attack Rates With Extreme Values
1678 -- 1691Tao Xiong, Wei Lou, Jin Zhang, Hailun Tan. MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation
1692 -- 1704Xiaojun Zhai, Kofi Appiah, Shoaib Ehsan, W. Gareth J. Howells, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier. A Method for Detecting Abnormal Program Behavior on Embedded Devices
1705 -- 1716Chi-Man Pun, Xiaochen Yuan, Xiu-Li Bi. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching
1717 -- 1726Jiawei Yuan, Shucheng Yu. Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification
1727 -- 1738Mu Li, Vishal Monga. Twofold Video Hashing With Automatic Synchronization
1739 -- 1751Huu-Tuan Nguyen, Alice Caplier. Local Patterns of Gradients for Face Recognition
1752 -- 1763Duc-Tien Dang-Nguyen, Giulia Boato, Francesco G. B. De Natale. 3D-Model-Based Video Analysis for Computer Generated Faces Identification
1764 -- 1775M. F. Haroun, T. Aaron Gulliver. Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels
1776 -- 1791Shiva Houshmand, Sudhir Aggarwal, R. Flood. Next Gen PCFG Password Cracking

Volume 10, Issue 7

1325 -- 1335Kyle Guan, Antonia Maria Tulino, Peter J. Winzer, Emina Soljanin. Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems
1336 -- 1349Xiaofeng Wang, Kemu Pang, Xiaorui Zhou, Yang Zhou, Lu Li, Jianru Xue. A Visual Model-Based Perceptual Image Hash for Content Authentication
1350 -- 1358Sandra Zancajo-Blazquez, Susana Laguela-Lopez, Diego González-Aguilera, Joaquin Martinez-Sanchez. Segmentation of Indoor Mapping Point Clouds Applied to Crime Scenes Reconstruction
1359 -- 1370Kevin Lin, Shen-Chi Chen, Chu-Song Chen, Daw-Tung Lin, Yi-Ping Hung. Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance
1371 -- 1383Jiwen Lu, Venice Erin Liong, Gang Wang, Pierre Moulin. Joint Feature Learning for Face Recognition
1384 -- 1393Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
1394 -- 1401Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki. t-ary RSA Precomputation Reveals the Secret Exponent
1402 -- 1415Xiaoyong Li 0003, Huadong Ma, Feng Zhou, Wenbin Yao. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
1416 -- 1431Xiaoyu Chu, Matthew Christopher Stamm, K. J. Ray Liu. Compressive Sensing Forensics
1432 -- 1441Lingyun Wen, Xin Li, Guodong Guo, Yu Zhu. Automated Depression Diagnosis Based on Facial Dynamic Analysis and Sparse Coding
1442 -- 1455Hu Xiong, Zhiguang Qin. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

Volume 10, Issue 6

1109 -- 1124Jung Yeon Hwang, Liqun Chen, Hyun-Sook Cho, DaeHun Nyang. Short Dynamic Group Signature Scheme Supporting Controllable Linkability
1125 -- 1136Adi Hajj-Ahmad, Ravi Garg, Min Wu 0001. ENF-Based Region-of-Recording Identification for Media Signals
1137 -- 1150Jiliang Zhang, Yaping Lin, Yongqiang Lyu, Gang Qu. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing
1151 -- 1166Amir Sonee, Ghosheh Abed Hodtani. On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information
1167 -- 1179Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan. Enabling Cloud Storage Auditing With Key-Exposure Resistance
1180 -- 1192Donald R. Reising, Michael A. Temple, Julie Ann Jackson. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints
1193 -- 1206Cai Li, Jiankun Hu, Josef Pieprzyk, Willy Susilo. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
1207 -- 1220Amanda Sgroi, Patrick J. Flynn, Kevin W. Bowyer, P. Jonathon Phillips. Strong, Neutral, or Weak: Exploring the Impostor Score Distribution
1221 -- 1233Boris Skoric. Tally-Based Simple Decoders for Traitor Tracing and Group Testing
1234 -- 1249Farshad Naghibi, Somayeh Salimi, Mikael Skoglund. The CEO Problem With Secrecy Constraints
1250 -- 1261Shaoquan Jiang. On the Optimality of Keyless Authentication in a Noisy Model
1262 -- 1273Johannes Richter, Christian Scheunert, Sabrina Engelmann, Eduard A. Jorswieck. Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward
1274 -- 1288Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
1289 -- 1298Tarique Anwar, Muhammad Abulaish. Ranking Radically Influential Web Forum Users
1299 -- 1314Jun Zhou, Xiaolei Dong, Zhenfu Cao, Athanasios V. Vasilakos. Secure and privacy preserving protocol for cloud-based vehicular DTNs
1315 -- 1317Jia-An Hong, Kaiping Xue, Wei Li. Comments on "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems" / Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems

Volume 10, Issue 5

889 -- 899Fuyou Miao, Yan Xiong, Xingfu Wang, Moaman Badawy. Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing
900 -- 915Emanuele Maiorana, Gabriel Emile Hine, Patrizio Campisi. Hill-Climbing Attacks on Multibiometrics Recognition Systems
916 -- 931Arfika Nurhudatiana, Adams Wai-Kin Kong. On Criminal Identification in Color Skin Images Using Skin Marks (RPPVSM) and Fusion With Inferred Vein Patterns
932 -- 940Qi Xiong, Ying-Chang Liang, Kwok Hung Li, Yi Gong. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
941 -- 952Augusto Ferrante, Nicola Laurenti, Chiara Masiero, Michele Pavon, Stefano Tomasin. On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading
953 -- 968Thirapiroon Thongkamwitoon, Hani Muammar, Pier Luigi Dragotti. An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
969 -- 984Ali Moeini, Hossein Moeini. Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix
985 -- 998Benjamin Tams, Preda Mihailescu, Axel Munk. Security Considerations in Minutiae-Based Fuzzy Vaults
999 -- 1009Khosro Bahrami, Alex ChiChung Kot, Leida Li, Haoliang Li. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency
1010 -- 1024Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He. Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid
1025 -- 1038Allan da Silva Pinto, William Robson Schwartz, Hélio Pedrini, Anderson de Rezende Rocha. Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks
1039 -- 1051R. Weaver. Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity
1052 -- 1063Jung Hee Cheon, Jinsu Kim. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1064 -- 1075Andrey Garnaev, Wade Trappe. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious
1076 -- 1091Wei Fan, Kai Wang, François Cayre, Zhang Xiong. Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
1092 -- 1103Xiaokui Shu, Danfeng Yao, Elisa Bertino. Privacy-Preserving Detection of Sensitive Data Exposure

Volume 10, Issue 4

699 -- 702Nichola Evans, Stan Z. Li, Sébastien Marcel, Arun Ross. Guest Editorial Special Issue on Biometric Spoofing and Countermeasures
703 -- 715R. Raghavendra, Christoph Busch. Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features
716 -- 725Oleg V. Komogortsev, Alexey Karpov, Corey D. Holland. Attack of Mechanical Replicas: Liveness Detection With Eye Movements
726 -- 735Adam Czajka. Pupil Dynamics for Iris Liveness Detection
736 -- 745Daniel F. Smith, Arnold Wiliem, Brian C. Lovell. Face Recognition on Consumer Devices: Reflections on Replay Attacks
746 -- 761Di Wen, Hu Han, Anil K. Jain. Face Spoof Detection With Image Distortion Analysis
762 -- 777Santosh Tirunagari, Norman Poh, David Windridge, Aamo Iorliam, Nik Suki, Anthony T. S. Ho. Detection of Face Spoofing Using Visual Dynamics
778 -- 786Diogo C. Garcia, Ricardo L. de Queiroz. Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis
787 -- 796Ivana Chingovska, André Rabello dos Anjos. On the Use of Client Identity Information for Face Antispoofing
797 -- 809Jianwei Yang, Zhen Lei, Dong Yi, Stan Z. Li. Person-Specific Face Antispoofing With Subject Domain Adaptation
810 -- 820Jon Sánchez, Ibon Saratxaga, Inma Hernáez, Eva Navas, Daniel Erro, Tuomo Raitio. Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information
821 -- 832Aleksandr Sizov, Elie el Khoury, Tomi Kinnunen, Zhizheng Wu, Sébastien Marcel. Joint Speaker Verification and Antispoofing in the i-Vector Space
833 -- 848Mario Hildebrandt, Jana Dittmann. StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection
849 -- 863Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva. An Investigation of Local Descriptors for Biometric Spoofing Detection
864 -- 879David Menotti, Giovani Chiachia, Allan da Silva Pinto, William Robson Schwartz, Hélio Pedrini, Alexandre Xavier Falcão, Anderson Rocha. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

Volume 10, Issue 3

445 -- 457Thijs Veugen, Robbert de Haan, Ronald Cramer, Frank Muller. A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
458 -- 470Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
471 -- 484Guang Yao, Jun Bi, Athanasios V. Vasilakos. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
485 -- 497Ayad F. Barsoum, M. Anwar Hasan. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
498 -- 506Thijs Veugen. Linear Round Bit-Decomposition of Secret-Shared Values
507 -- 518Jian Li, Xiaolong Li, Bin Yang, Xingming Sun. Segmentation-Based Image Copy-Move Forgery Detection Scheme
519 -- 528Mostafa M. I. Taha, Patrick Schaumont. Key Updating for Leakage Resiliency With Application to AES Modes of Operation
529 -- 542Sotirios Karachontzitis, Stelios Timotheou, Ioannis Krikidis, Kostas Berberidis. Security-Aware Max-Min Resource Allocation in Multiuser OFDMA Downlink
543 -- 557Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li. Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential
558 -- 573Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
574 -- 583Gaojie Chen, Yu Gong, Pei Xiao, Jonathon A. Chambers. Physical Layer Network Security in the Full-Duplex Relay System
584 -- 596Mario Cagalj, Toni Perkovic, Marin Bugaric. Timing Attacks on Cognitive Authentication Schemes
597 -- 612Sevinc Bayram, Husrev Taha Sencar, Nasir D. Memon. Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing
613 -- 625Peng Zhou, Siwei Jiang, Athirai Aravazhi Irissappane, Jie Zhang, Jianying Zhou, Joseph Chee Ming Teo. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
626 -- 639Hsin-Wen Kung, Yi-Han Tu, Chiou-Ting Hsu. Dual Subspace Nonnegative Graph Embedding for Identity-Independent Expression Recognition
640 -- 652Yi Jin, Jiwen Lu, Qiuqi Ruan. Coupled Discriminative Feature Learning for Heterogeneous Face Recognition
653 -- 664Xiaocheng Hu, Weiming Zhang, Xiaolong Li, Nenghai Yu. Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding
665 -- 678Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
679 -- 693Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry. Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

Volume 10, Issue 2

219 -- 228Vojtech Holub, Jessica J. Fridrich. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
229 -- 242Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou. Correlated Differential Privacy: Hiding Information in Non-IID Data Set
243 -- 255Bingwen Feng, Wei Lu, Wei Sun 0007. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture
256 -- 265Massoud Masoumi, Mohammad Hadi Rezayati. Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis
266 -- 277Honorio Martín, Thomas Korak, Enrique San Millán, Michael Hutter. Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness
278 -- 292Taekyoung Kwon, Jin Hong 0001. Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks
293 -- 307Hao Deng, Huiming Wang, Wei Guo, Wenjie Wang. Secrecy Transmission With a Helper: To Relay or to Jam
308 -- 320Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
321 -- 332Hugo Proença. Iris Recognition: What Is Beyond Bit Fragility?
333 -- 345Joseph Roth, Xiaoming Liu, Arun Ross, Dimitris N. Metaxas. Investigating the Discriminative Power of Keystroke Sound
346 -- 354Y. Liang, X. Ding, J. Xue. Advanced Joint Bayesian Method for Face Verification
355 -- 370Avik Sengupta, Ravi Tandon, T. Charles Clancy. Fundamental Limits of Caching With Secure Delivery
371 -- 383Seung-Hyun Seo, Jongho Won, Salmin Sultana, Elisa Bertino. Effective Key Management in Dynamic Wireless Sensor Networks
384 -- 396Jaroslav Sedenka, Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani. Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones
397 -- 408Y. Ma, L. Zhang, H. Wang. Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise
409 -- 422Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy. A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability
423 -- 435Sayan Maity, Mohamed Abdel-Mottaleb. 3D Ear Segmentation and Classification Through Indexing

Volume 10, Issue 12

2477 -- 2491Kanoksak Wattanachote, Timothy K. Shih, Wen-Lung Chang, Hon-Hang Chang. Tamper Detection of JPEG Image Due to Seam Modifications
2492 -- 2501Adam C. Polak, Dennis L. Goeckel. Wireless Device Identification Based on RF Oscillator Imperfections
2502 -- 2514Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao. AAC-OT: Accountable Oblivious Transfer With Access Control
2515 -- 2530Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu. TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
2531 -- 2546Holger Boche, Rafael F. Schaefer, H. Vincent Poor. On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels
2547 -- 2561He Sun, Kun Sun, Yuewu Wang, Jiwu Jing. Reliable and Trustworthy Memory Acquisition on Smartphones
2562 -- 2577Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan. An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks
2578 -- 2590Liang Xiao 0003, Jinliang Liu, Qiangda Li, Narayan B. Mandayam, H. Vincent Poor. User-Centric View of Jamming Games in Cognitive Radio Networks
2591 -- 2604Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti. Employing Program Semantics for Malware Detection
2605 -- 2615Roneel V. Sharan, Tom J. Moir. Subband Time-Frequency Image Texture Features for Robust Audio Surveillance
2616 -- 2626Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou. K-Center: An Approach on the Multi-Source Identification of Information Diffusion
2627 -- 2642Rémi Cogranne, Jessica J. Fridrich. Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory
2643 -- 2652Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo. BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication
2653 -- 2668Iluminada Baturone, Miguel A. Prada-Delgado, Susana Eiroa. Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs
2669 -- 2680Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, Yun-Qing Shi. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited
2681 -- 2691Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
2692 -- 2704Yonggang Huang, Jun Zhang, Heyan Huang. Camera Model Identification With Unknown Models

Volume 10, Issue 11

2257 -- 2269Valentina Conotter, Pedro Comesaña Alfaro, Fernando Pérez-González. Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
2270 -- 2283Babins Shrestha, Di Ma, Yan Zhu 0001, Haoyu Li, Nitesh Saxena. Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware
2284 -- 2297Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva. Efficient Dense-Field Copy-Move Forgery Detection
2298 -- 2313Aijiao Cui, Gang Qu, Yan Zhang. Ultra-Low Overhead Dynamic Watermarking on Scan Design for Hard IP Protection
2314 -- 2324Stefano Tomasin, Alberto Dall'Arche. Resource Allocation for Secret Key Agreement Over Parallel Channels With Full and Partial Eavesdropper CSI
2325 -- 2339Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay Jha. Interdependent Security Risk Analysis of Hosts and Flows
2340 -- 2351Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer. TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids
2352 -- 2364Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
2365 -- 2380Xiao-chun Yun, Shuhao Li, Yongzheng Zhang 0002. SMS Worm Propagation Over Contact Social Networks: Modeling and Validation
2381 -- 2395Lan Zhou, Vijay Varadharajan, Michael Hitchens. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
2396 -- 2407Shervin Rahimzadeh Arashloo, Josef Kittler, William J. Christmas. Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features
2408 -- 2423Kuan-Hsien Liu, Shuicheng Yan, C. C. Jay Kuo. Age Estimation via Grouping and Decision Fusion
2424 -- 2434Kan Chen, Balasubramaniam Natarajan, Steve Shattil. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks
2435 -- 2446Jianwei Hu, Yueming Cai, Nan Yang, Weiwei Yang. A New Secure Transmission Scheme With Outdated Antenna Selection
2447 -- 2460Ajita Rattani, Walter J. Scheirer, Arun Ross. Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials
2461 -- 2470Jacob R. Scanlon, Matthew S. Gerber. Forecasting Violent Extremist Cyber Recruitment

Volume 10, Issue 10

2033 -- 2047Slava Voloshynovskiy, Taras Holotyak, Fokko Beekhof. Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition
2048 -- 2056Kiran B. Raja, R. Raghavendra, Christoph Busch. Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information
2057 -- 2070B. Rosario Campomanes Álvarez, Óscar Ibáñez, Carmen Campomanes-Alvarez, Sergio Damas, Oscar Cordón. Modeling Facial Soft Tissue Thickness for Automatic Skull-Face Overlay
2071 -- 2083Sheng Huang, Ahmed Elgammal, Jiwen Lu, Dan Yang. Cross-Speed Gait Recognition Using Speed-Invariant Gait Templates and Globality-Locality Preserving Projections
2084 -- 2094Edoardo Ardizzone, Alessandro Bruno, Giuseppe Mazzola. Copy-Move Forgery Detection by Matching Triangles of Keypoints
2095 -- 2107Saeedeh Parsaeefard, Tho Le-Ngoc. Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols
2108 -- 2118Shenghua Gao, Yuting Zhang, Kui Jia, Jiwen Lu, Yingying Zhang. Single Sample Face Recognition via Learning Deep Supervised Autoencoders
2119 -- 2130Shili Lin, Rong Zhang, Hui-Ping Ma, Meng Wang. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
2131 -- 2142Ahmed Alahmadi, Zhaoxi Fang, Tianlong Song, Tongtong Li. Subband PUEA Detection and Mitigation in OFDM-Based Cognitive Radio Networks
2143 -- 2157Haris B. C., Rohit Sinha. Robust Speaker Verification With Joint Sparse Coding Over Learned Dictionaries
2158 -- 2170Hamid Alipour, Youssif B. Al-Nashif, Pratik Satam, Salim Hariri. Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis
2171 -- 2181Norman Poh, Chi-Ho Chan. Generalizing DET Curves Across Application Scenarios
2182 -- 2195Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti. On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis
2196 -- 2211Mohammed Alzaabi, Kamal Taha, Thomas Anthony Martin. CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications
2212 -- 2224SaiDhiraj Amuru, R. Michael Buehrer. Optimal Jamming Against Digital Modulation
2225 -- 2235Kapil M. Borle, Biao Chen, Wenliang Du. Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
2236 -- 2249Seungwon Shin, Haopei Wang, Guofei Gu. A First Step Toward Network Security Virtualization: From Concept To Prototype

Volume 10, Issue 1

6 -- 15Manhua Liu, Xiaoying Chen, Xiaoduan Wang. Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation
16 -- 27Ikenna Odinaka, Joseph A. O'Sullivan, Erik J. Sirevaag, John W. Rohrbaugh. Cardiovascular Biometrics: Combining Mechanical and Electrical Signals
28 -- 39Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra. Live Video Forensics: Source Identification in Lossy Wireless Networks
40 -- 54Muhammad R. A. Khandaker, Kai-Kit Wong. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
55 -- 68Zhen Liu, Zhenfu Cao, Duncan S. Wong. Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
69 -- 78Xiaofeng Chen 0001, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
79 -- 89Jiwen Lu, Gang Wang, Weihong Deng, Kui Jia. Reconstruction-Based Metric Learning for Unconstrained Face Verification
90 -- 103Lifeng Wang, Kyeong Jin Kim, Trung Q. Duong, Maged Elkashlan, H. Vincent Poor. Security Enhancement of Cooperative Single Carrier Systems
104 -- 117Kai Cao 0001, Anil K. Jain. Learning Fingerprint Reconstruction: From Minutiae to Image
118 -- 131Chunsheng Zhu, Hasen Nicanfar, Victor C. M. Leung, Laurence T. Yang. An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
132 -- 141Jesús Gómez-Vilardebó, Deniz Gündüz. Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source
142 -- 151Gaurav Bansod, Nishchal Raval, Narayan Pisharoty. Implementation of a New Lightweight Encryption Design for Embedded Security
152 -- 167Li Weng, Laurent Amsaleg, April Morton, Stéphane Marchand-Maillet. A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
168 -- 177Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng. Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
178 -- 189Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou. Time-Bound Anonymous Authentication for Roaming Networks
190 -- 199Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
200 -- 212Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank. What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications