Journal: IEEE Transactions on Information Forensics and Security

Volume 3, Issue 4

582 -- 592Matthias Kirchner, Rainer Böhme. Hiding Traces of Resampling in Digital Images
593 -- 610Luis Pérez-Freire, Fernando Pérez-González. Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
611 -- 619Chune Zhang, L. L. Cheng, ZhengDing Qiu, Lee-Ming Cheng. Multipurpose Watermarking Based on Multiscale Curvelet Transform
620 -- 634Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt. Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform
635 -- 650Tomás Pevný, Jessica J. Fridrich. Multiclass Detector of Current Steganographic Methods for JPEG Format
651 -- 661Osman Hilmi Kocal, Emrah Yürüklü, Ismail Avcibas. Chaotic-Type Features for Speech Steganalysis
662 -- 672Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu. Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits
673 -- 683Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji, Gilles Zémor. Theoretical and Practical Boundaries of Binary Secure Sketches
684 -- 697Xiaozheng Zhang, Yongsheng Gao, Maylor K. H. Leung. Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases
698 -- 708Shuicheng Yan, Huan Wang, Xiaoou Tang, Jianzhuang Liu, Thomas S. Huang. Regression From Uncertain Labels and Its Applications to Soft Biometrics
709 -- 718Steven Cadavid, Mohamed Abdel-Mottaleb. 3-D Ear Modeling and Recognition From Video Sequences Using Shape From Shading
719 -- 733Sergey Tulyakov, Venu Govindaraju. Use of Identification Trial Statistics for the Combination of Biometric Matchers
734 -- 748Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, P. Jonathon Phillips. Subspace Approximation of Face Recognition Algorithms: An Empirical Study
749 -- 762Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran. Toward Compression of Encrypted Images and Video Sequences
763 -- 775Asma Rabaoui, Manuel Davy, Stéphane Rossignol, Zied Ellouze. Using One-Class SVMs and Wavelets for Audio Surveillance
776 -- 782Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon. Scalar DC-QIM for Semifragile Authentication
783 -- 786Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik, Michiel van der Veen, M. Maas. A Buyer-Seller Watermarking Protocol Based on Secure Embedding
786 -- 791Phillip A. Regalia. Cryptographic Secrecy of Steganographic Matrix Embedding
792 -- 800Sanghoon Lee, Hee-seung Choi, Kyoungtaek Choi, Jaihie Kim. Fingerprint-Quality Index Using Gradient Components

Volume 3, Issue 3

1 -- 7William Luh, Deepa Kundur. Distributed Secret Sharing for Discrete Memoryless Networks
347 -- 358Alberto López Toledo, Xiaodong Wang. Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks
359 -- 369Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang. Projecting Cyberattacks Through Variable-Length Markov Models
370 -- 380Tung Le, Christoforos N. Hadjicostis. Graphical Inference for Multiple Intrusion Detection
381 -- 389Devi Parikh, Tsuhan Chen. Data Fusion and Cost Minimization for Intrusion Detection
390 -- 403Ting He, Lang Tong. Distributed Detection of Information Flows
404 -- 413Matthieu Bloch, Rajesh Narasimha, Steven W. McLaughlin. Network Security for Client-Server Architecture Using Wiretap Codes
414 -- 423Paulo F. Oliveira, João Barros. A Network Coding Approach to Secret Key Distribution
431 -- 440Mohammad H. Mahoor, Mohamed Abdel-Mottaleb. A Multimodal Approach for Face Modeling and Recognition
441 -- 455Maneli Noorkami, Russell M. Mersereau. Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase
456 -- 465Hyoung Joong Kim, Vasiliy Sachnev, Yun-Qing Shi, Jeho Nam, Hyon-Gon Choo. A Novel Difference Expansion Transform for Reversible Data Embedding
466 -- 474Lino Coria-Mendoza, Mark R. Pickering, Panos Nasiopoulos, Rabab K. Ward. A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform
475 -- 487Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
488 -- 497Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
498 -- 511Iordanis Mpiperis, Sotiris Malassiotis, Michael G. Strintzis. Bilinear Models for 3-D Face and Facial Expression Recognition
512 -- 528Natalia A. Schmid, Francesco Nicolo. On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
529 -- 538Babak Mahdian, Stanislav Saic. Blind Authentication Using Periodic Properties of Interpolation
539 -- 552Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon. Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
553 -- 566Oya Çeliktutan, Bülent Sankur, Ismail Avcibas. Blind Identification of Source Cell-Phone Model
567 -- 569Anthony Tung Shuen Ho, Xunzhan Zhu, Jun Shen, Pina Marziliano. Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform
569 -- 572Hans Georg Schaathun. On the Assumption of Equal Contributions in Fingerprinting
572 -- 577Craig Belcher, Yingzi Du. A Selective Feature Information Approach for Iris Image-Quality Measure

Volume 3, Issue 2

137 -- 152Fernando Pérez-González, Carlos Mosquera. Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering
153 -- 165David J. Coumou, Gaurav Sharma. Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking
166 -- 172Juan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda. On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
173 -- 182Dominik Engel, E. Pschernig, Andreas Uhl. An Analysis of Lightweight Encryption Schemes for Fingerprint Images
183 -- 191Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi. Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering
192 -- 202Raffaele Cappelli, Matteo Ferrara, Davide Maltoni. On the Operational Quality of Fingerprint Scanners
203 -- 212Feng Hao, John Daugman, Piotr Zielinski. A Fast Search Algorithm for a Large Fuzzy Database
213 -- 222Chengjun Liu. Learning the Uncorrelated, Independent, and Discriminating Color Spaces for Face Recognition
223 -- 233Omaima Nomir, Mohamed Abdel-Mottaleb. Fusion of Matching Algorithms for Human Identification Using Dental X-Ray Radiographs
234 -- 246D. E. Nassar, Ayman Abaza, Xin Li, Hany H. Ammar. Automatic Construction of Dental Charts for Postmortem Identification
247 -- 258Tomás Pevný, Jessica J. Fridrich. Detection of Double-Compression in JPEG Images for Applications in Steganography
259 -- 272Yu Zhang, Zang Li, Wade Trappe. Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems
273 -- 289Tuncer C. Aysal, Kenneth E. Barner. Sensor Data Cryptography in Wireless Sensor Networks
290 -- 303Tairan Wang, Georgios B. Giannakis. Mutual Information Jammer-Relay Games
304 -- 316E-yong Kim, Li Xiao, Klara Nahrstedt, Kunsoo Park. Secure Interdomain Routing Registry
317 -- 330Wei Yu, K. J. Ray Liu. Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
331 -- 338Hartwig Fronthaler, Klaus Kollreider, Josef Bigün, Julian Fiérrez-Aguilar, Fernando Alonso-Fernandez, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez. Fingerprint Image-Quality Estimation and its Application to Multialgorithm Verification

Volume 3, Issue 1

1 -- 15François Cayre, Patrick Bas. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
16 -- 28Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutsos. Color Image Watermarking Using Multidimensional Fourier Transforms
29 -- 37Antonis Mairgiotis, Nikolas P. Galatsanos, Yongyi Yang. New Additive Watermark Detectors Based On A Hierarchical Spatially Adaptive Image Model
38 -- 51Paul L. Yu, John S. Baras, Brian M. Sadler. Physical-Layer Authentication
52 -- 61John Daugman, Cathryn Downing. Effect of Severe Image Compression on Iris Recognition Performance
62 -- 73Timothy C. Faltemier, Kevin W. Bowyer, Patrick J. Flynn. A Region Ensemble for 3-D Face Recognition
74 -- 90Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan Lukás. Determining Image Origin and Integrity Using Sensor Noise
91 -- 100Yun Fu, Shuicheng Yan, Thomas S. Huang. Classification and Feature Extraction by Simplexization
101 -- 117Ashwin Swaminathan, Min Wu, K. J. Ray Liu. Digital Image Forensics via Intrinsic Fingerprints
118 -- 132Abhishek Das, David Nguyen, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary. An FPGA-Based Network Intrusion Detection Architecture