Journal: IEEE Transactions on Information Forensics and Security

Volume 7, Issue 6

1673 -- 1686Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Juan Hernández-Serrano, Oscar Esparza, Juanjo Alins. A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces
1687 -- 1694Xiaofeng Chen 0001, Jin Li, Willy Susilo. Efficient Fair Conditional Payments for Outsourcing Computations
1695 -- 1706Michel Abdalla, Angelo De Caro, Duong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
1707 -- 1716Zhen Lei, ShengCai Liao, Anil K. Jain, Stan Z. Li. Coupled Discriminant Analysis for Heterogeneous Face Recognition
1717 -- 1726Francesco Nicolo, Natalia A. Schmid. Long Range Cross-Spectral Face Recognition: Matching SWIR Against Visible Light Images
1727 -- 1737Matteo Ferrara, Davide Maltoni, Raffaele Cappelli. Noninvertible Minutia Cylinder-Code Representation
1738 -- 1751Meng Yang, Lei Zhang 0006, Simon Chi-Keung Shiu, David Zhang. Monogenic Binary Coding: An Efficient Local Feature Extraction Approach to Face Recognition
1752 -- 1765Abhishek Nagar, Heeseung Choi, Anil K. Jain. Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach
1766 -- 1779Lahoucine Ballihi, Boulbaba Ben Amor, Mohamed Daoudi, Anuj Srivastava, Driss Aboutajdine. Boosting 3-D-Geometric Features for Efficient Face Recognition and Gender Classification
1780 -- 1788Tao Wu, Pavan K. Turaga, Rama Chellappa. Age Estimation and Face Verification Across Aging Using Landmarks
1789 -- 1801Brendan Klare, Mark J. Burge, Joshua C. Klontz, Richard W. Vorder Bruegge, Anil K. Jain. Face Recognition Performance: Role of Demographic Information
1802 -- 1811Sung-Uk Jung, Mark S. Nixon. On Using Gait to Enhance Frontal Face Extraction
1812 -- 1824Ikenna Odinaka, Po-Hsiang Lai, Alan D. Kaplan, Joseph A. O'Sullivan, Erik J. Sirevaag, John W. Rohrbaugh. ECG Biometric Recognition: A Comparative Analysis
1825 -- 1840Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar. A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems
1841 -- 1854Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou. An Evaluation of Popular Copy-Move Forgery Detection Approaches
1855 -- 1864Raef Bassily, Sennur Ulukus. Deaf Cooperation for Secrecy With Multiple Antennas at the Helper
1865 -- 1875Yongfeng Huang, Chenghao Liu, Shanyu Tang, Sen Bai. Steganography Integration Into a Low-Bit Rate Speech Codec
1876 -- 1889Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose. Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches
1890 -- 1899Paulo F. Oliveira, Luísa Lima, Tiago T. V. Vinhoza, João Barros, Muriel Médard. Coding for Trusted Storage in Untrusted Networks
1900 -- 1905Chester Rebeiro, Debdeep Mukhopadhyay. Boosting Profiled Cache Timing Attacks With A Priori Analysis
1906 -- 1912Sheng Li, Alex C. Kot. An Improved Scheme for Full Fingerprint Reconstruction

Volume 7, Issue 5

1425 -- 0Mari Ostendorf. A Message from the Vice President of Publications on New Developments in Signal Processing Society Publications
1426 -- 1438Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich. CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android
1439 -- 1447Fu-Hau Hsu, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, Chieh-Wen Chen. Antivirus Software Shield Against Antivirus Terminators
1448 -- 1458Shan-Chun Liu, Wen-Hsiang Tsai. Line-Based Cubism-Like Image - A New Type of Art Image and its Application to Lossless Data Hiding
1459 -- 1471Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo. Spectral Watermarking for Parameterized Surfaces
1472 -- 1483Onur Ozan Koyluoglu, Hesham El Gamal. Polar Coding for Secure Transmission and Key Agreement
1484 -- 1497Yanpei Liu, Stark C. Draper, Akbar M. Sayeed. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
1498 -- 1510Jianjiang Feng, Yuan Shi, Jie Zhou. Robust and Efficient Algorithms for Separating Latent Overlapped Fingerprints
1511 -- 1521Haruyuki Iwama, Mayu Okumura, Yasushi Makihara, Yasushi Yagi. The OU-ISIR Gait Database Comprising the Large Population Dataset and Performance Evaluation of Gait Recognition
1522 -- 1535Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa. Memetically Optimized MCWLD for Matching Sketches With Digital Face Images
1536 -- 1550Nisha Srinivas, Gaurav Aggarwal, Patrick J. Flynn, Richard W. Vorder Bruegge. Analysis of Facial Marks to Distinguish Between Identical Twins
1551 -- 1565Di Huang, Mohsen Ardabilian, Yunhong Wang, Liming Chen. 3-D Face Recognition Using eLBP-Based Facial Description and Local Feature Hybrid Matching
1566 -- 1577Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
1578 -- 1593Ligang Zheng, Yanqiang Lei, Guoping Qiu, Jiwu Huang. Near-Duplicate Image Detection in a Visually Salient Riemannian Space
1594 -- 1603Chih-Yi Chiu, Sheng-Yang Li, Cheng-Yu Hsieh. Video Query Reformulation for Near-Duplicate Detection
1604 -- 1613Yahya S. Khiabani, Shuangqing Wei, Jian Yuan, Jian Wang. Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise
1614 -- 1627Qian Wang, Zesheng Chen, Chao Chen. On the Characteristics of the Worm Infection Family Tree
1628 -- 1637Bogdan Carbunar, Yao Chen, Radu Sion. Tipping Pennies? Privately Practical Anonymous Micropayments
1638 -- 1651Chao Yang, Yimin Song, Guofei Gu. Active User-Side Evil Twin Access Point Detection Using Statistical Techniques
1652 -- 1667Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval. Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding

Volume 7, Issue 4

1105 -- 1117Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi. Robust Image Alignment for Tampering Detection
1118 -- 1126Reza Soosahabi, Mort Naraghi-Pour. Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
1127 -- 1143Amir Valizadeh, Z. Jane Wang. An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding
1144 -- 1154Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne Burleson. Detecting Software Theft in Embedded Systems: A Side-Channel Approach
1155 -- 1167Sian-Jheng Lin, Wei-Ho Chung. The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions
1168 -- 1180Peter Meerwald, Teddy Furon. Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes
1181 -- 1191Fangjun Huang, Jiwu Huang, Yun-Qing Shi. New Channel Selection Rule for JPEG Steganography
1192 -- 1203Somnath Dey, Debasis Samanta. Iris Data Indexing Method Using Gabor Energy Features
1204 -- 1213Matteo Ferrara, Annalisa Franco, Dario Maio, Davide Maltoni. Face Image Conformance to ISO/ICAO Standards in Machine Readable Travel Documents
1214 -- 1224Walter J. Scheirer, Anderson de Rezende Rocha, Jonathan Parris, Terrance E. Boult. Learning for Meta-Recognition
1225 -- 1241Emile J. C. Kelkboom, Jeroen Breebaart, Ileana Buhan, Raymond N. J. Veldhuis. Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources
1242 -- 1254Meng-Hui Lim, Andrew Beng Jin Teoh. An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding
1255 -- 1269Keshav Seshadri, Marios Savvides. An Analysis of the Sensitivity of Active Shape Models to Initialization When Applied to Automatic Facial Landmarking
1270 -- 1277Amin Merati, Norman Poh, Josef Kittler. User-Specific Cohort Selection and Score Normalization for Biometric Systems
1278 -- 1287Masoud Ghoreishi Madiseh, Stephen W. Neville, Michael L. McGuire. Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation
1288 -- 1300Zhe Yao, Philip Mark, Michael Rabbat. Anomaly Detection Using Proximity Graph and PageRank Algorithm
1301 -- 1314Huazhu Fu, Xiaochun Cao. Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
1315 -- 1329Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu. Temporal Forensics and Anti-Forensics for Motion Compensated Video
1330 -- 1338Ode Ojowu, Johan Karlsson, Jian Li, Yilu Liu. ENF Extraction From Digital Recordings Using Adaptive Techniques and Frequency Tracking
1339 -- 1353Ryan M. Gerdes, Mani Mina, Steve Russell, Thomas E. Daniels. Physical-Layer Identification of Wired Ethernet Devices
1354 -- 1367Francesco Renna, Nicola Laurenti, H. Vincent Poor. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels
1368 -- 1380Liang Xiao, Yan Chen, W. Sabrina Lin, K. J. Ray Liu. Indirect Reciprocity Security Game for Large-Scale Wireless Networks
1381 -- 1393Shui Yu, Guofeng Zhao, Wanchun Dou, Simon James. Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks
1394 -- 1403Lang Lin, Sudheendra Srivathsa, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne Burleson. Design and Validation of Arbiter-Based PUFs for Sub-45-nm Low-Power Security Applications
1404 -- 1413Sevinç Bayram, Hüsrev T. Sencar, Nasir D. Memon. Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
1414 -- 1418Won Taek Song, Jinho Choi 0001, Jeongseok Ha. Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II

Volume 7, Issue 3

853 -- 867Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain
868 -- 882Jessica J. Fridrich, Jan Kodovský. Rich Models for Steganalysis of Digital Images
883 -- 894Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis
895 -- 903Rajendra S. Katti, Aida Vosoughi. On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability
904 -- 918Qijun Zhao, Anil K. Jain. Model Based Separation of Overlapping Latent Fingerprints
919 -- 931Ryan Connaughton, Amanda Sgroi, Kevin W. Bowyer, Patrick J. Flynn. A Multialgorithm Analysis of Three Iris Biometric Sensors
932 -- 943Sri-Kaushik Pavani, Federico Sukno, David Delgado Gomez, Constantine Butakoff, Xavier Planes, Alejandro F. Frangi. An Experimental Evaluation of Three Classifiers for Use in Self-Updating Face Recognition Systems
944 -- 953Jiwen Lu, Xiuzhuang Zhou, Yap-Peng Tan, Yuanyuan Shang, Jie Zhou. Cost-Sensitive Semi-Supervised Discriminant Analysis for Face Recognition
954 -- 965Vishal M. Patel, Tao Wu, Soma Biswas, P. Jonathon Phillips, Rama Chellappa. Dictionary-Based Face Recognition Under Variable Lighting and Pose
966 -- 977Miguel A. Ferrer, Francisco Vargas, Aythami Morales, Aarón Ordonez. Robustness of Offline Signature Verification Based on Gray Level Features
978 -- 991Jindan Zhou, Steven Cadavid, Mohamed Abdel-Mottaleb. An Efficient 3-D Ear Recognition System Employing Local and Holistic Features
992 -- 1002Hong Cao, Alex C. Kot. Manipulation Detection on Image Patches Using FusionBoost
1003 -- 1017Tiziano Bianchi, Alessandro Piva. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
1018 -- 1028Pravin Kakar, N. Sudha. Exposing Postprocessed Copy-Paste Forgeries Through Transform-Invariant Features
1029 -- 1039Pravin Kakar, N. Sudha. Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
1040 -- 1052Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks
1053 -- 1066Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
1067 -- 1080Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner. On the Complexity of Generating Gate Level Information Flow Tracking Logic
1081 -- 1093Xudong Lv, Z. Jane Wang. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points
1094 -- 1099Zhenhua Guo, David Zhang, Lei Zhang 0006, Wenhuang Liu. Feature Band Selection for Online Multispectral Palmprint Recognition

Volume 7, Issue 2

357 -- 358C. C. Jay Kuo. Editorial
359 -- 371Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe. Secure Communication Over Parallel Relay Channel
372 -- 382Mitsugu Iwamoto. A Weak Security Notion for Visual Secret Sharing Schemes
383 -- 392Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, Shui Yu. A Dual-Channel Time-Spread Echo Method for Audio Watermarking
393 -- 402Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
403 -- 417Minoru Kuribayashi. Interference Removal Operation for Spread Spectrum Fingerprinting Scheme
418 -- 431Hafiz Malik, K. P. Subbalakshmi, Ramamurti Chandramouli. Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy
432 -- 444Jan Kodovský, Jessica J. Fridrich, Vojtech Holub. Ensemble Classifiers for Steganalysis of Digital Media
445 -- 454Tomás Pevný, Jessica J. Fridrich, Andrew D. Ker. From Blind to Quantitative Steganalysis
455 -- 464Tamer Shanableh. Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering
465 -- 479Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang. A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries
480 -- 490Lifeng Lai, Yingbin Liang, H. Vincent Poor. A Unified Framework for Key Agreement Over Wireless Fading Channels
491 -- 505Fabio Pareschi, Riccardo Rovatti, Gianluca Setti. On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution
506 -- 517Xiaozheng Zhang, Yongsheng Gao. Heterogeneous Specular and Diffuse 3-D Surface Approximation for Face Recognition Across Pose
518 -- 529Aglika Gyaourova, Arun Ross. Index Codes for Multibiometric Pattern Retrieval
530 -- 542Alexandros Iosifidis, Anastasios Tefas, Ioannis Pitas. Activity-Based Person Identification Using Fuzzy Representation and Discriminant Learning
543 -- 552Darko S. Matovski, Mark S. Nixon, Sasan Mahmoodi, John N. Carter. The Effect of Time on Gait Recognition Performance
553 -- 562Roy Wallace, Mitchell McLaren, Christopher McCool, Sébastien Marcel. Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models
563 -- 576Jingu Heo, Marios Savvides. 3-D Generic Elastic Models for Fast and Texture Preserving 2-D Novel Pose Synthesis
577 -- 587Tolga Inan, Ugur Halici. 3-D Face Recognition With Local Shape Descriptors
588 -- 601Karen Hollingsworth, Shelby Solomon Darnell, Philip E. Miller, Damon L. Woodard, Kevin W. Bowyer, Patrick J. Flynn. Human and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light
602 -- 612Chi-Ho Chan, Budhaditya Goswami, Josef Kittler, William J. Christmas. Local Ordinal Contrast Pattern Histograms for Spatiotemporal, Lip-Based Speaker Authentication
613 -- 624Yi Cheng Feng, Pong Chi Yuen. Binary Discriminant Analysis for Generating Binary Face Template
625 -- 634Cemal Hanilçi, Figen Ertas, Tuncay Ertas, Ömer Eskidere. Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals
635 -- 650Slim Rekhis, Noureddine Boudriga. A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks
651 -- 663Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin. oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
664 -- 675Qinghua Li, Guohong Cao. Mitigating Routing Misbehavior in Disruption Tolerant Networks
676 -- 690Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee. A Large-Scale Empirical Study of Conficker
691 -- 703Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu. Enhancing the Trust of Internet Routing With Lightweight Route Attestation
704 -- 716Sabrina Gerbracht, Christian Scheunert, Eduard A. Jorswieck. Secrecy Outage in MISO Systems With Partial Channel Information
717 -- 730Ravi Garg, Avinash L. Varna, Min Wu 0001. An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks
731 -- 742Zhenghao Zhang. A New Bound on the Performance of the Bandwidth Puzzle
743 -- 754Zhiguo Wan, Jun e Liu, Robert H. Deng. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
755 -- 764Radu Sion, Yao Chen. Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances
765 -- 773Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar, Miodrag Potkonjak. Gate Characterization Using Singular Value Decomposition: Foundations and Applications
774 -- 788Zanoni Dias, Anderson Rocha, Siome Goldenstein. Image Phylogeny by Minimal Spanning Trees
789 -- 797Ming-Hour Yang, Ming-Chien Yang. RIHT: A Novel Hybrid IP Traceback Scheme
798 -- 808Hugo Proença, Luís A. Alexandre. Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests
809 -- 820Rajesh Kumar 0008, Nikhil R. Pal, Bhabatosh Chanda, J. D. Sharma. Forensic Detection of Fraudulent Alteration in Ball-Point Pen Strokes
821 -- 826Jian Cao, Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security
826 -- 832Xinpeng Zhang. Separable Reversible Data Hiding in Encrypted Image
833 -- 841Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
842 -- 848Tiziano Bianchi, Alessandro Piva. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps

Volume 7, Issue 1

1 -- 2Miodrag Potkonjak, Ramesh Karri, Ingrid Verbauwhede, Kouichi Itoh. Guest Editorial Integrated Circuit and System Security
3 -- 13Naofumi Homma, Kazuya Saito, Takafumi Aoki. A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits
14 -- 24William E. Cobb, Eric D. Laspe, Rusty O. Baldwin, Michael A. Temple, Yong C. Kim. Intrinsic Physical-Layer Authentication of Integrated Circuits
25 -- 40Eric Love, Yier Jin, Yiorgos Makris. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition
41 -- 50Chong Hee Kim. Improved Differential Fault Analysis on AES Key Schedule
51 -- 63Farinaz Koushanfar. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
64 -- 75Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman, Ira S. Moskowitz, Myong H. Kang. Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
76 -- 87Hassan Salmani, Mohammad Tehranipoor. Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection
88 -- 97Yang Li, Kazuo Ohta, Kazuo Sakiyama. New Fault-Based Side-Channel Attack Using Fault Sensitivity
98 -- 108Roel Maes, Dries Schellekens, Ingrid Verbauwhede. A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs
109 -- 120Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta. Information-Theoretic Approach to Optimal Differential Fault Analysis
125 -- 138Pedro C. Pinto, João Barros, Moe Z. Win. Secure Communication in Stochastic Wireless Networks - Part I: Connectivity
139 -- 147Pedro C. Pinto, João Barros, Moe Z. Win. Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion
148 -- 159Hung D. Ly, Tie Liu, Yufei W. Blankenship. Security Embedding Codes
160 -- 175Yen-Wei Huang, Pierre Moulin. On the Saddle-Point Solution and the Large-Coalition Asymptotics of Fingerprinting Games
176 -- 184Wien Hong, Tung-Shou Chen. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
185 -- 196HongJie He, Fan Chen, Heng-Ming Tai, Ton Kalker, Jiashu Zhang. Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme
197 -- 207Sian-Jheng Lin, Wei-Ho Chung. A Probabilistic Model of $(t, n)$ Visual Cryptography Scheme With Dynamic Group
208 -- 218Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee Cheon Chui. Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise
219 -- 229Kai-Hui Lee, Pei-Ling Chiu. An Extended Visual Cryptography Algorithm for General Access Structures
230 -- 240Amol D. Rahulkar, Raghunath S. Holambe. Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n: A Postclassifier
241 -- 254Anindya Roy, Mathew Magimai-Doss, Sébastien Marcel. A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers
255 -- 268Abhishek Nagar, Karthik Nandakumar, Anil K. Jain. Multibiometric Cryptosystems Based on Feature-Level Fusion
269 -- 282Enrique Argones-Rúa, Emanuele Maiorana, José Luis Alba-Castro, Patrizio Campisi. Biometric Template Protection Using Universal Background Models: An Application to Online Signature
283 -- 296Valentina Conotter, James F. O'Brien, Hany Farid. Exposing Digital Forgeries in Ballistic Motion
297 -- 309Liang Xiao, Huaiyu Dai, Peng Ning. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping
310 -- 320Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bingli Jiao. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
321 -- 332Arun K. Kanuparthi, Mohamed Zahran, Ramesh Karri. Architecture Support for Dynamic Integrity Checking
333 -- 345Abhranil Maiti, Inyoung Kim, Patrick Schaumont. A Robust Physical Unclonable Function With Enhanced Challenge-Response Set
346 -- 350Chao Wang, Weiming Zhang, Jiufen Liu, Nenghai Yu. Fast Matrix Embedding by Matrix Extending