Journal: IEEE Transactions on Information Forensics and Security

Volume 4, Issue 4

593 -- 596Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora. Guest editorial: special issue on electronic voting
597 -- 610Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman. State-wide elections, optical scan voting systems, and the pursuit of integrity
611 -- 627David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora. Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes
628 -- 637Russell A. Fink, Alan T. Sherman, Richard Carback. TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules
638 -- 650Ryan W. Gardner, Sujata Garera, Aviel D. Rubin. Detecting code alteration by creating a temporary memory bottleneck
651 -- 661Adolfo Villafiorita, Komminist Weldemariam, Roberto Tiella. Development, formal verification, and evaluation of an E-voting system with VVPAT
662 -- 673Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia. Prêt à voter: a voter-verifiable voting system
674 -- 684Jeroen van de Graaf. Voting with unconditional privacy by merging Prêt à voter and PunchScan
685 -- 698Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague. Shuffle-sum: coercion-resistant verifiable tallying for STV voting
699 -- 707Kevin Henry, Douglas R. Stinson, Jiayuan Sui. The effectiveness of receipt-based attacks on ThreeBallot
708 -- 717Philip B. Stark. CAST: Canvass audits by sampling and testing
718 -- 728Bryan A. Campbell, Michael D. Byrne. Straight-party voting: what do voters think?
729 -- 744Guido Schryen, Eliot Rich. Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
745 -- 750Jens-Matthias Bohli, Christian Henrich, Carmen Kempka, Jörn Müller-Quade, Stefan Röhrich. Enhancing electronic voting machines on the example of Bingo voting
757 -- 0Ali H. Sayed. Free electronic access to SP publications
758 -- 767Tony Thomas, Sabu Emmanuel, A. V. Subramanyam, Mohan S. Kankanhalli. Joint watermarking scheme for multiparty multilevel DRM architecture
768 -- 780Jean-François Jourdas, Pierre Moulin. High-rate random-like spherical fingerprinting codes with linear decoding complexity
781 -- 789Hung-Min Sun, King-Hang Wang, Wei-Chih Ting. On the security of the secure arithmetic code
790 -- 801Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le. Self-verifying visual secret sharing using error diffusion and interpolation techniques
802 -- 811Carsten Gottschlich, Preda Mihailescu, Axel Munk. Robust orientation field estimation and extrapolation using semilocal line sensors
812 -- 823Ryan N. Rakvic, Bradley J. Ulis, Randy P. Broussard, Robert W. Ives, Neil Steiner. Parallelizing iris recognition
824 -- 836Samir Shah, Arun Ross. Iris segmentation using geodesic active contours
837 -- 848Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, Patrick J. Flynn. Iris recognition using signal-level fusion of frames from video
849 -- 866Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Féerrez-Aguilar, Harald Ganster, Javier Ortega-Garcia, Donald E. Maurer, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer. Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms
867 -- 882Bo Fu, Simon X. Yang, Jianping Li, Dekun Hu. Multibiometric cryptosystem: model structure and performance analysis
883 -- 898Yafei Yang, Yan Sun, Steven Kay, Qing Yang. Securing rating aggregation systems using statistical detectors and trust
899 -- 910Hong Cao, Alex C. Kot. Accurate detection of demosaicing regularity for digital image forensics
911 -- 927W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu. Behavior forensics with side information for multimedia fingerprinting social networks
928 -- 932Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A study on the randomness measure of image hashing
933 -- 945Chun-I Fan, Yi-Hui Lin. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
946 -- 955Nitesh Saxena, Jeong Hyun Yi. Noninteractive self-certification for long-lived mobile ad hoc networks
956 -- 973Tanya Ignatenko, Frans M. J. Willems. Biometric systems: privacy and secrecy aspects
974 -- 981Luke Miratrix, Philip B. Stark. Election audits using a trinomial bound
982 -- 994Minho Jin, Chang D. Yoo. Quantum hashing for multimedia
995 -- 1004Dalwon Jang, Chang Dong Yoo, Sunil Lee, Sungwoong Kim, Ton Kalker. Pairwise boosted audio fingerprint
1005 -- 1014Philip B. Stark. Risk-limiting postelection audits: conservative P-values from common probability inequalities

Volume 4, Issue 3

273 -- 283Maha El Choubassi, Pierre Moulin. On reliability and security of randomized detectors against sensitivity analysis attacks
284 -- 292Shankar Sadasivam, Pierre Moulin. On estimation accuracy of desynchronization attack channel parameters
293 -- 301Negar Kiyavash, Pierre Moulin. Performance of orthogonal fingerprinting codes under worst-case noise
302 -- 317Byung-Ho Cha, C. C. Jay Kuo. Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
318 -- 329Negar Kiyavash, Pierre Moulin, Ton Kalker. Regular simplex fingerprints and their optimality properties
330 -- 345Avinash L. Varna, Shan He 0002, Ashwin Swaminathan, Min Wu. Fingerprinting compressed multimedia signals
346 -- 358Giacomo Cancelli, Mauro Barni. MPSteg-color: data hiding through redundant basis decomposition
359 -- 368Qingzhong Liu, Andrew H. Sung, Mengyu Qiao. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
369 -- 382Bin Li, Jiwu Huang, Yun-Qing Shi. Steganalysis of YASS
383 -- 396Zhongmin Wang, Gonzalo R. Arce, Giovanni Di Crescenzo. Halftone visual cryptography via error diffusion
397 -- 409Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, Berk Gökberk. Fingerprint verification using spectral minutiae representations
410 -- 417Vladan Velisavljevic. Low-complexity iris coding and recognition based on directionlets
418 -- 427Wenming Zheng, Xiaoou Tang. Fast algorithm for updating the discriminant vectors of dual-space LDA
428 -- 440Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthenis Ioannidis, Michael G. Strintzis. A channel coding approach for human authentication from gait sequences
441 -- 450Yanwei Pang, Xuelong Li, Yuan Yuan, Dacheng Tao, Jing Pan. Fast Haar transform based feature extraction for face representation and recognition
451 -- 459Marcello Ferro, Giovanni Pioggia, Alessandro Tognetti, Nicola Carbonaro, Danilo De Rossi. A sensing seat for human authentication
460 -- 475W. Sabrina Lin, Steven K. Tjoa, H. Vicky Zhao, K. J. Ray Liu. Digital image source coder forensics via intrinsic fingerprints
476 -- 491Hongmei Gou, Ashwin Swaminathan, Min Wu. Intrinsic sensor noise features for forensic analysis on scanners and scanned images
492 -- 503Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe. Channel-based detection of Sybil attacks in wireless networks
504 -- 518Ritendra Datta, Jia Li, James Ze Wang. Exploiting the human-machine gap in image recognition for designing CAPTCHAs
519 -- 529Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García Teodoro. Mathematical model for low-rate DoS attacks against application servers
530 -- 541Zesheng Chen, Chuanyi Ji. An information-theoretic view of network-aware malware attacks
542 -- 551Ciza Thomas, N. Balakrishnan. Improvement in intrusion detection with advances in sensor fusion
552 -- 563Vivek K. Singh, Mohan S. Kankanhalli. Adversary aware surveillance systems
564 -- 569Weiming Zhang, Xin Wang. Generalization of the ZZW embedding construction for steganography
570 -- 577Gabriel Domínguez-Conde, Pedro Comesaña, Fernando Pérez-González. Performance analysis of Fridrich-Goljan self-embedding authentication method
578 -- 0Craig Belcher, Yingzi Du. Corrections to A selective feature information approach for iris image-quality measure

Volume 4, Issue 2

165 -- 178Lin Chen, Jean Leneutre. A game theoretical framework on intrusion detection in heterogeneous networks
179 -- 192Chuhong Fei, Raymond H. Kwong, Deepa Kundur. A hypothesis testing approach to semifragile watermark-based authentication
193 -- 206Chun-Hsiang Huang, Shang-Chih Chuang, Yen-Lin Huang, Ja-Ling Wu. Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents
207 -- 216Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari. Watermarking robustness evaluation based on perceptual quality via genetic algorithms
217 -- 230Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Jun Liu. Face recognition under occlusions and variant expressions with partial similarity
231 -- 241Michael E. Schuckers. A parametric correlation framework for the statistical evaluation and estimation of biometric-based classification performance in a single environment
242 -- 256Petar Popovski, Osvaldo Simeone. Wireless secrecy in cellular systems with infrastructure-aided cooperation
257 -- 267Hsin-Yi Tsai, Yu-Lun Huang, David Wagner. A graph approach to quantitative analysis of control-flow obfuscating transformations

Volume 4, Issue 1

1 -- 0Nasir Memon. Editorial
2 -- 24Luis Pérez-Freire, Fernando Pérez-González. Spread-spectrum watermarking security
25 -- 35Pietro Guccione, Michele Scagliola. Hyperbolic RDM for nonlinear valumetric distortions
36 -- 48Parag Agarwal, Balakrishnan Prabhakaran. Robust blind watermarking of point-sampled geometry
49 -- 58Vinod Pankajakshan, Gwenaël J. Doërr, Prabin Kumar Bora. Detection of motion-incoherent components in video streams
59 -- 69Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal. Fingerprinting with minimum distance decoding
70 -- 85Abdellatif Zaidi, Luc Vandendorpe. Coding schemes for relay-assisted information embedding
86 -- 97Tiziano Bianchi, Alessandro Piva, Mauro Barni. On the implementation of the discrete Fourier transform in the encrypted domain
98 -- 110Ajay Kumar, Ch. Ravikanth. Personal authentication using finger knuckle surface
111 -- 122Hong Chang, Yi Yao, Andreas Koschan, Besma R. Abidi, Mongi A. Abidi. Improving face recognition via narrowband spectral range selection using Jeffrey divergence
123 -- 139Nitin Khanna, Aravind K. Mikkilineni, Edward J. Delp. Scanner identification using feature-based processing and analysis
140 -- 150Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay Chiou Lee. SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks
151 -- 154Jessica J. Fridrich. Asymptotic behavior of the ZZW embedding construction
154 -- 160Hany Farid. Exposing digital forgeries from JPEG ghosts