Journal: IEEE Transactions on Information Forensics and Security

Volume 2, Issue 4

645 -- 654Wei Liu, Lina Dong, Wenjun Zeng. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking
655 -- 663Xiangyang Wang, Jun Wu, Panpan Niu. A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks
664 -- 682Husrev T. Sencar, Nasir D. Memon. Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks
683 -- 696Serap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser. Decode-Time Forensic Watermarking of AAC Bitstreams
697 -- 709Shan He, Min Wu. Collusion-Resistant Video Fingerprinting for Large User Group
710 -- 720Thanh-Ha Le, Jessy Clédière, Christine Servière, Jean-Louis Lacoume. Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant
721 -- 733Xuefeng Liang, Arijit Bishnu, Tetsuo Asano. A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles
734 -- 743Fernando Alonso-Fernandez, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Hartwig Fronthaler, Klaus Kollreider, Josef Bigün. A Comparative Study of Fingerprint Image-Quality Estimation Methods
744 -- 757Karthik Nandakumar, Anil K. Jain, Sharath Pankanti. Fingerprint-Based Fuzzy Vault: Implementation and Performance
758 -- 768Gang Zheng, Chia-Jiu Wang, Terrence E. Boult. Application of Projective Invariants in Hand Geometry Biometrics
769 -- 780Daniel González-Jiménez, José Luis Alba-Castro. Shape-Driven Gabor Jets for Face Description and Authentication
781 -- 792Jian Yang, Chengjun Liu. Horizontal and Vertical 2DPCA-Based Discriminant Analysis for Face Verification on a Large-Scale Database
793 -- 808Qing Li, Wade Trappe. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
809 -- 809Maneli Noorkami, Russell M. Mersereau. Correction to A Framework for Robust Watermarking of H.264 Encoded Video With Controllable Detection Performance

Volume 2, Issue 3-2

489 -- 490Bir Bhanu, Nalini K. Ratha, B. V. K. Vijaya Kumar, Rama Chellappa, Josef Bigün. Guest Editorial: Special Issue on Human Detection and Recognition
491 -- 502Davrondzhon Gafurov, Einar Snekkenes, Patrick A. H. Bours. Spoof Attacks on Gait Authentication System
503 -- 512Yagiz Sutcu, Qiming Li, Nasir D. Memon. Protecting Biometric Templates With Sketch: Theory and Practice
513 -- 528Le Zou, Samuel Cheng, Zixiang Xiong, Mi Lu, Kenneth R. Castleman. 3-D Face Recognition Based on Warped Example Faces
529 -- 536Jamie Cook, Vinod Chandran, Sridha Sridharan. Multiscale Representation for 3-D Face Recognition
537 -- 547Iordanis Mpiperis, Sotiris Malassiotis, Michael G. Strintzis. 3-D Face Recognition With the Geodesic Polar Representation
548 -- 558Klaus Kollreider, Hartwig Fronthaler, Maycel Isaac Faraj, Josef Bigün. Real-Time Face Detection and Motion Analysis With Application in Liveness Assessment
559 -- 569Lutz Goldmann, Ullrich J. Mönich, Thomas Sikora. Components and Their Topology for Robust Face Detection in the Presence of Partial Occlusions
570 -- 587Georgios Goudelis, Stefanos Zafeiriou, Anastasios Tefas, Ioannis Pitas. Class-Specific Kernel-Discriminant Analysis for Face Verification
588 -- 595Irene Kotsia, Stefanos Zafeiriou, Ioannis Pitas. A Novel Discriminant Non-Negative Matrix Factorization Algorithm With Applications to Facial Image Characterization Problems
596 -- 604Francesco Beritelli, Salvatore Serrano. Biometric Identification Based on Frequency Analysis of Cardiac Sounds
605 -- 612Soumyadip Rakshit, Donald M. Monro. An Evaluation of Image Sampling and Compression for Human Iris Recognition
613 -- 622Pablo H. Hennings-Yeomans, B. V. K. Vijaya Kumar, Marios Savvides. Palmprint Classification Using Multiple Advanced Correlation Filters and Palm-Specific Segmentation
623 -- 630Dimosthenis Ioannidis, Dimitrios Tzovaras, Ioannis G. Damousis, Savvas Argyropoulos, Konstantinos Moustakas. Gait Recognition Using Compact Feature Extraction Transforms and Depth Information
630 -- 636Hazim Kemal Ekenel, Hua Gao, Rainer Stiefelhagen. 3-D Face Recognition Using Local Appearance-Based Models
636 -- 641Anil Kumar Sao, B. Yegnanarayana. Face Verification Using Template Matching

Volume 2, Issue 3-1

297 -- 310Jidong Zhong, Shangteng Huang. Double-Sided Watermark Embedding and Detection
311 -- 320Xiao Tong Wang, Cheng Yong Shao, X. G. Xu, Xia Mu Niu. Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion
321 -- 330Sunil Lee, Chang D. Yoo, Ton Kalker. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
331 -- 340Nigel M. Allinson, Jeevandra Sivarajah, Ian Gledhill, Michael Carling, L. J. Allinson. Robust Wireless Transmission of Compressed Latent Fingerprint Images
341 -- 349Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin. Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes
350 -- 363Franco Frattolillo. Watermarking Protocol for Web Context
364 -- 375Robert Wilson, David Tse, Robert A. Scholtz. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
376 -- 390Vishal Monga, Mehmet Kivanç Mihçak. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
391 -- 401Yongfang Zhu, Sarat C. Dass, Anil K. Jain. Statistical Models for Assessing the Individuality of Fingerprints
402 -- 412Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi. A Memetic Fingerprint Matching Algorithm
413 -- 429Daniel González-Jiménez, José Luis Alba-Castro. Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry
430 -- 437Gady Agam, Suneel Suresh. Warping-Based Offline Signature Recognition
438 -- 449Weihong Wang, Hany Farid. Exposing Digital Forgeries in Interlaced and Deinterlaced Video
450 -- 461Micah K. Johnson, Hany Farid. Exposing Digital Forgeries in Complex Lighting Environments
462 -- 467Yinian Mao, Min Wu. Unicity Distance of Robust Image Hashing
468 -- 484Jianjun Chen, Zoltan Safar, John Aasted Sorensen. Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure

Volume 2, Issue 2

113 -- 126Maha El Choubassi, Pierre Moulin. Noniterative Algorithms for Sensitivity Analysis Attacks
127 -- 139Qiao Li, Ingemar J. Cox. Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking
140 -- 148Andrew D. Ker. Derivation of Error Distribution in Least Squares Steganalysis
149 -- 163Teddy Furon. A Constructive and Unifying Framework for Zero-Bit Watermarking
164 -- 173S. Huang, J. K. Wu. Optical Watermarking for Printed Document Authentication
174 -- 180Zhifeng Li, Xiaoou Tang. Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition
181 -- 187Ajay Kumar, David Zhang. Hand-Geometry Recognition Using Entropy-Based Discretization
188 -- 197Omaima Nomir, Mohamed Abdel-Mottaleb. Human Identification From Dental X-Ray Images Based on the Shape and Appearance of the Teeth
198 -- 212Yinian Mao, Min Wu. Tracing Malicious Relays in Cooperative Wireless Communications
213 -- 226Yan Lindsay Sun, K. J. Ray Liu. Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes
227 -- 239Wei Yu, K. J. Ray Liu. Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks
240 -- 253Wei Yu, Zhu Ji, K. J. Ray Liu. Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis
254 -- 266Félix Balado, Neil J. Hurley, Elizabeth P. McCarthy, Guenole C. M. Silvestre. Performance Analysis of Robust Audio Hashing
267 -- 282Shen-Zheng Wang, Hsi-Jian Lee. A Cascade Framework for a Real-Time Statistical Plate Recognition System
283 -- 289Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon. Performance Analysis of Scalar DC-QIM for Zero-Bit Watermarking

Volume 2, Issue 1

1 -- 13Xingliang Huang, Bo Zhang. Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks
14 -- 23Maneli Noorkami, Russell M. Mersereau. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance
24 -- 30Tsung-Yuan Liu, Wen-Hsiang Tsai. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique
31 -- 45Ying Wang, Pierre Moulin. Optimized Feature Extraction for Learning-Based Image Steganalysis
46 -- 54Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits
55 -- 68Stefanos Zafeiriou, Anastasios Tefas, Ioannis Pitas. Learning Discriminant Person-Specific Facial Models Using Expandable Graphs
69 -- 76Shuicheng Yan, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang. A Parameter-Free Framework for General Supervised Subspace Learning
77 -- 90Jinyu Zuo, Natalia A. Schmid, Xiaohan Chen. On Generation and Analysis of Synthetic Iris Images
91 -- 106Ashwin Swaminathan, Min Wu, K. J. Ray Liu. Nonintrusive Component Forensics of Visual Sensors Using Output Images