Journal: IEEE Transactions on Information Forensics and Security

Volume 6, Issue 4

1185 -- 1199Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn. Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks
1200 -- 1213Ehsan Nezhadarya, Z. Jane Wang, Rabab Kreidieh Ward. Robust Image Watermarking Based on Multiscale Gradient Direction Quantization
1214 -- 1222Tu-Thach Quach. Optimal Cover Estimation Methods and Steganographic Payload Location
1223 -- 1232Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction
1233 -- 1247Qiong Huang, Duncan S. Wong, Willy Susilo. Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange
1248 -- 1258Kien Nguyen, Clinton Fookes, Sridha Sridharan, Simon Denman. Quality-Driven Super-Resolution for Less Constrained Iris Recognition at a Distance and on the Move
1259 -- 1274Yingbo Zhou, Ajay Kumar. Human Identification Using Palm-Vein Images
1275 -- 1286Hae Jong Seo, Peyman Milanfar. Face Verification Using the LARK Representation
1287 -- 1304Sina Jahanbin, Hyohoon Choi, Alan C. Bovik. Passive Multimodal 2-D+3-D Face Recognition Using Gabor Features and Landmark Distances
1305 -- 1314Miguel A. Ferrer, Aythami Morales. Hand-Shape Biometrics Combining the Visible and Short-Wave Infrared Bands
1315 -- 1322Sairul I. Safie, John J. Soraghan, Lykourgos Petropoulakis. Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR)
1323 -- 1334Shengzhi Zhang, Xiaoqi Jia, Peng Liu 0005, Jiwu Jing. PEDA: Comprehensive Damage Assessment for Production Environment Server Systems
1335 -- 1345Hai-Dong Yuan. Blind Forensics of Median Filtering in Digital Images
1346 -- 1354Yan Shi, Michael A. Jensen. Improved Radiometric Identification of Wireless Devices Using MIMO Transmission
1355 -- 1369Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy. Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding
1370 -- 1381Wenjun Gu, Sriram Chellappan, Xiaole Bai, Honggang Wang. Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
1382 -- 1393Qian Wang, Zesheng Chen, Chao Chen. Darknet-Based Inference of Internet Worm Temporal Characteristics
1394 -- 1403Bogdan Carbunar, Radu Sion. Write-Once Read-Many Oblivious RAM
1404 -- 1417Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang. Comprehensive and Efficient Protection of Kernel Control Data
1418 -- 1431Levent Ozparlak, Ismail Avcibas. Differentiating Between Images Using Wavelet-Based Transforms: A Comparative Study
1432 -- 1444Daw-Tung Lin, Kai-Yung Huang. Collaborative Pedestrian Tracking and Data Fusion With Multiple Cameras

Volume 6, Issue 3-2

873 -- 882Dinu Coltuc. Improved Embedding for Prediction-Based Reversible Watermarking
883 -- 893Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Craig T. Jin. Blind Image Watermarking Using a Sample Projection Approach
894 -- 905Shankar Sadasivam, Pierre Moulin, Todd P. Coleman. A Message-Passing Approach to Combating Desynchronization Attacks
906 -- 919Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik. Tardos Fingerprinting Codes in the Combined Digit Model
920 -- 935Tomás Filler, Jan Judas, Jessica J. Fridrich. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
936 -- 945I-Jen Lai, Wen-Hsiang Tsai. Secret-Fragment-Visible Mosaic Image-A New Computer Art and Its Application to Information Hiding
946 -- 959Pei-Ju Chiang, Jan P. Allebach, George T.-C. Chiu. Extrinsic Signature Embedding and Detection in Electrophotographic Halftoned Images Through Exposure Modulation
960 -- 969Shyong Jian Shyu, Ming-Chiang Chen. Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes
970 -- 979Robert Biddle, Mohammad Mannan, Paul C. van Oorschot, Tara Whalen. User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
980 -- 991Jing Liu, Bo Yang. Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
992 -- 1001Pei-Ling Chiu, Kai-Hui Lee. A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes
1002 -- 1013Francesco Turroni, Davide Maltoni, Raffaele Cappelli, Dario Maio. Improving Fingerprint Orientation Extraction
1014 -- 1027Vivek Kanhangad, Ajay Kumar, David Zhang. A Unified Framework for Contactless Hand Verification
1028 -- 1037Zhifeng Li, Unsang Park, Anil K. Jain. A Discriminative Model for Age Invariant Face Recognition
1038 -- 1049Chaoying Tang, Adams Wai-Kin Kong, Noah Craft. Using a Knowledge-Based Approach to Remove Blocking Artifacts in Skin Images for Forensic Analysis
1050 -- 1065Matthew C. Stamm, K. J. Ray Liu. Anti-Forensics of Digital Image Compression
1066 -- 1075Eric Kee, Micah K. Johnson, Hany Farid. Digital Image Authentication From JPEG Headers
1076 -- 1085Ming-Wei Liu, John F. Doherty. Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels
1086 -- 1098Pinghui Wang, Xiaohong Guan, Tao Qin, Qiuzhen Huang. A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links
1099 -- 1110Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Giuseppe Serra. A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
1111 -- 1122Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo. Identifying Image Composites Through Shadow Matte Consistency
1123 -- 1135Mehrdad Majzoobi, Farinaz Koushanfar. Time-Bounded Authentication of FPGAs
1136 -- 1145Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak. Malicious Circuitry Detection Using Thermal Conditioning
1146 -- 1159Avinash L. Varna, Min Wu 0001. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification
1160 -- 1164Raffaele Cappelli, Matteo Ferrara, Dario Maio. Candidate List Reduction Based on the Analysis of Fingerprint Indexing Scores
1165 -- 1169Carsten Gottschlich, Thomas Hotz, Robert Lorenz 0002, Stefanie Bernhardt, Michael Hantschel, Axel Munk. Modeling the Growth of Fingerprints Improves Matching for Adolescents
1170 -- 1179Charles Lamech, Reza M. Rad, Mohammad Tehranipoor, Jim Plusquellic. An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities
1180 -- 0Koichiro Niinuma, Unsang Park, Anil K. Jain. Erratum to "Soft Biometric Traits for Continuous User Authentication"

Volume 6, Issue 3-1

521 -- 522Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, João Barros. Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems
523 -- 531Motohiko Isaka, Seiya Kawata. Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels
532 -- 540Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin, João Barros, Byung-Jae Kwak. LDPC Codes for the Gaussian Wiretap Channel
541 -- 550Shun Watanabe, Yasutada Oohama. Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
551 -- 564Chan Wong Wong, Tan F. Wong, John M. Shea. Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel
565 -- 574Anurag Agrawal, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini. Noncoherent Capacity of Secret-Key Agreement With Public Discussion
575 -- 584Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros. Coding for Cryptographic Security Enhancement Using Stopping Sets
585 -- 594Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
595 -- 605Alexandre J. Pierrot, Matthieu R. Bloch. Strongly Secure Communications Over the Two-Way Wiretap Channel
606 -- 615Paul L. Yu, Brian M. Sadler. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer
616 -- 627João P. Vilela, Pedro C. Pinto, João Barros. Position-Based Jamming for Enhanced Wireless Secrecy
628 -- 639Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar. Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints
640 -- 649S. Ali. A. Fakoorian, A. Lee Swindlehurst. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design
650 -- 660Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems
661 -- 671Jiang Lei, Zhu Han, Maria Angeles Vázquez-Castro, Are Hjørungnes. Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints
672 -- 681Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell. Secret-Key Agreement With Channel State Information at the Transmitter
682 -- 692Yingbin Liang, H. Vincent Poor, Lei Ying. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization
693 -- 702Xiaowei Wang, Meixia Tao, Jianhua Mo, Youyun Xu. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks
703 -- 711Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai. On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels
712 -- 724Satashu Goel, Vaneet Aggarwal, Aylin Yener, A. Robert Calderbank. The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach
725 -- 736Mable P. Fok, Zhenxing Wang, Zhexing Deng, Paul R. Prucnal. Optical Layer Security in Fiber-Optic Networks
737 -- 751Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef, Ahmed Sultan, Hesham El Gamal. Keys Through ARQ: Theory and Practice
752 -- 762Suhas Mathur, Wade Trappe. BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams
763 -- 774Hyoungsuk Jeon, Daesung Hwang, Jinho Choi 0001, Hyuckjae Lee, Jeongseok Ha. Secure Type-Based Multiple Access
775 -- 790Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic. Key Agreement Over Multiple Access Channel
791 -- 802Neal Patwari, Joey Wilson. Spatial Models for Human Motion-Induced Signal Strength Variance on Static Links
803 -- 817Ehsan Vahedi, Vahid Shah-Mansouri, Vincent W. S. Wong, Ian F. Blake, Rabab K. Ward. Probabilistic Analysis of Blocking Attack in RFID Systems
818 -- 830Melda Yuksel, Xi Liu, Elza Erkip. A Secure Communication Game With a Relay Helping the Eavesdropper
831 -- 842Yongle Wu, K. J. Ray Liu. An Information Secrecy Game in Cognitive Radio Networks
843 -- 852Saurabh U. Pawar, John F. Doherty. Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy
853 -- 860Vinay Uday Prabhu, Miguel R. D. Rodrigues. On Wireless Channels With varepsilon-Outage Secrecy Capacity
861 -- 867Jiangyuan Li, Athina P. Petropulu. Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading

Volume 6, Issue 2

241 -- 255C.-M. Yu, Y.-T. Tsou, C.-S. Lu, S.-Y. Kuo. Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks
256 -- 266J. P. Vilela, Matthieu Bloch, João Barros, Steven W. McLaughlin. Wireless Secrecy Regions With Friendly Jamming
267 -- 282Amir Valizadeh, Z. Jane Wang. Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding
283 -- 295Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, Riccardo Leonardi. High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators
296 -- 306Y. F. Huang, S. Tang, J. Yuan. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
307 -- 322F. Liu, C. Wu. Embedded Extended Visual Cryptography Schemes
323 -- 337D. Wang, L. Dong, X. Li. Towards Shift Tolerant Visual Secret Sharing Schemes
338 -- 345H. Choi, K. Choi, J. Kim. Fingerprint Matching Incorporating Ridge Features With Minutiae
346 -- 359F. Chen, J. Feng, Anil K. Jain, J. Zhou, J. Zhang. Separating Overlapped Fingerprints
360 -- 370Z.-L. Sun, K.-M. Lam. Depth Estimation of Face Images Based on the Constrained ICA Model
371 -- 384Thirimachos Bourlai, Arun Ross, Anil K. Jain. Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed, and Scanned Photos
385 -- 395Shreyas Venugopalan, Marios Savvides. How to Generate Spoofed Irises From an Iris Code Template
396 -- 406Y.-L. Chen, C. T. Hsu. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
407 -- 425C.-M. Yu, Y.-T. Tsou, C.-S. Lu, S.-Y. Kuo. Constrained Function-Based Message Authentication for Sensor Networks
426 -- 437Y. Xiang, K. Li, W. Zhou. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
438 -- 451Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha. Speculative Parallel Pattern Matching
452 -- 468Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider 0003. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks
469 -- 485Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González. Secure Adaptive Filtering
486 -- 497Y. Zhu, Y. Tan. A Local-Concentration-Based Feature Extraction Approach for Spam Filtering
498 -- 512Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng. Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures
513 -- 0Miroslav Goljan, Jessica J. Fridrich, Mo Chen. Erratum to Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification [Mar 11 227-236]

Volume 6, Issue 1

1 -- 13Ronald William Smith, George Scott Knight. Predictable Three-Parameter Design of Network Covert Communication Systems
14 -- 18Hussein A. Aly. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
19 -- 27Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi. On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks
28 -- 38Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan. Secure Device Pairing Based on a Visual Channel: Design and Usability Study
39 -- 52Shouhuai Xu, Xiaohu Li, Timothy Paul Parker, Xueping Wang. Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
53 -- 58Xinpeng Zhang. Lossy Compression and Iterative Reconstruction for Encrypted Image
59 -- 69K. C. Leung, C. H. Leung. Improvement of Fingerprint Retrieval by a Statistical Classifier
70 -- 81Arun Ross, Asem A. Othman. Visual Cryptography for Biometric Privacy
82 -- 95Hugo Proença. Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength
96 -- 106Unsang Park, Raghavender R. Jillela, Arun Ross, Anil K. Jain. Periocular Biometrics in the Visible Spectrum
107 -- 121Emile J. C. Kelkboom, Jeroen Breebaart, Tom A. M. Kevenaar, Ileana Buhan, Raymond N. J. Veldhuis. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme
122 -- 139Lifeng Lai, Siu-Wai Ho, H. Vincent Poor. Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case
140 -- 151Lifeng Lai, Siu-Wai Ho, H. Vincent Poor. Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case
152 -- 161Chi-Yuan Chen, Kai-Di Chang, Han-Chieh Chao. Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem
162 -- 174Farinaz Koushanfar, Azalia Mirhoseini. A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
175 -- 188Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson. Towards Situational Awareness of Large-Scale Botnet Probing Events
189 -- 201Xuhua Ding, Yanjiang Yang, Robert H. Deng. Database Access Pattern Protection Without Full-Shuffles
202 -- 212Alfredo Rial, Josep Balasch, Bart Preneel. A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
213 -- 226Mani Malekesmaeili, Mehrdad Fatourechi, Rabab Kreidieh Ward. A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting
227 -- 236Miroslav Goljan, Jessica J. Fridrich, Mo Chen. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification