357 | -- | 358 | C. C. Jay Kuo. Editorial |
359 | -- | 371 | Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe. Secure Communication Over Parallel Relay Channel |
372 | -- | 382 | Mitsugu Iwamoto. A Weak Security Notion for Visual Secret Sharing Schemes |
383 | -- | 392 | Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, Shui Yu. A Dual-Channel Time-Spread Echo Method for Audio Watermarking |
393 | -- | 402 | Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise |
403 | -- | 417 | Minoru Kuribayashi. Interference Removal Operation for Spread Spectrum Fingerprinting Scheme |
418 | -- | 431 | Hafiz Malik, K. P. Subbalakshmi, Ramamurti Chandramouli. Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy |
432 | -- | 444 | Jan Kodovský, Jessica J. Fridrich, Vojtech Holub. Ensemble Classifiers for Steganalysis of Digital Media |
445 | -- | 454 | Tomás Pevný, Jessica J. Fridrich, Andrew D. Ker. From Blind to Quantitative Steganalysis |
455 | -- | 464 | Tamer Shanableh. Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering |
465 | -- | 479 | Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang. A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries |
480 | -- | 490 | Lifeng Lai, Yingbin Liang, H. Vincent Poor. A Unified Framework for Key Agreement Over Wireless Fading Channels |
491 | -- | 505 | Fabio Pareschi, Riccardo Rovatti, Gianluca Setti. On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution |
506 | -- | 517 | Xiaozheng Zhang, Yongsheng Gao. Heterogeneous Specular and Diffuse 3-D Surface Approximation for Face Recognition Across Pose |
518 | -- | 529 | Aglika Gyaourova, Arun Ross. Index Codes for Multibiometric Pattern Retrieval |
530 | -- | 542 | Alexandros Iosifidis, Anastasios Tefas, Ioannis Pitas. Activity-Based Person Identification Using Fuzzy Representation and Discriminant Learning |
543 | -- | 552 | Darko S. Matovski, Mark S. Nixon, Sasan Mahmoodi, John N. Carter. The Effect of Time on Gait Recognition Performance |
553 | -- | 562 | Roy Wallace, Mitchell McLaren, Christopher McCool, Sébastien Marcel. Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models |
563 | -- | 576 | Jingu Heo, Marios Savvides. 3-D Generic Elastic Models for Fast and Texture Preserving 2-D Novel Pose Synthesis |
577 | -- | 587 | Tolga Inan, Ugur Halici. 3-D Face Recognition With Local Shape Descriptors |
588 | -- | 601 | Karen Hollingsworth, Shelby Solomon Darnell, Philip E. Miller, Damon L. Woodard, Kevin W. Bowyer, Patrick J. Flynn. Human and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light |
602 | -- | 612 | Chi-Ho Chan, Budhaditya Goswami, Josef Kittler, William J. Christmas. Local Ordinal Contrast Pattern Histograms for Spatiotemporal, Lip-Based Speaker Authentication |
613 | -- | 624 | Yi Cheng Feng, Pong Chi Yuen. Binary Discriminant Analysis for Generating Binary Face Template |
625 | -- | 634 | Cemal Hanilçi, Figen Ertas, Tuncay Ertas, Ömer Eskidere. Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals |
635 | -- | 650 | Slim Rekhis, Noureddine Boudriga. A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks |
651 | -- | 663 | Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin. oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks |
664 | -- | 675 | Qinghua Li, Guohong Cao. Mitigating Routing Misbehavior in Disruption Tolerant Networks |
676 | -- | 690 | Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee. A Large-Scale Empirical Study of Conficker |
691 | -- | 703 | Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu. Enhancing the Trust of Internet Routing With Lightweight Route Attestation |
704 | -- | 716 | Sabrina Gerbracht, Christian Scheunert, Eduard A. Jorswieck. Secrecy Outage in MISO Systems With Partial Channel Information |
717 | -- | 730 | Ravi Garg, Avinash L. Varna, Min Wu 0001. An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks |
731 | -- | 742 | Zhenghao Zhang. A New Bound on the Performance of the Bandwidth Puzzle |
743 | -- | 754 | Zhiguo Wan, Jun e Liu, Robert H. Deng. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing |
755 | -- | 764 | Radu Sion, Yao Chen. Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances |
765 | -- | 773 | Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar, Miodrag Potkonjak. Gate Characterization Using Singular Value Decomposition: Foundations and Applications |
774 | -- | 788 | Zanoni Dias, Anderson Rocha, Siome Goldenstein. Image Phylogeny by Minimal Spanning Trees |
789 | -- | 797 | Ming-Hour Yang, Ming-Chien Yang. RIHT: A Novel Hybrid IP Traceback Scheme |
798 | -- | 808 | Hugo Proença, Luís A. Alexandre. Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests |
809 | -- | 820 | Rajesh Kumar 0008, Nikhil R. Pal, Bhabatosh Chanda, J. D. Sharma. Forensic Detection of Fraudulent Alteration in Ball-Point Pen Strokes |
821 | -- | 826 | Jian Cao, Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security |
826 | -- | 832 | Xinpeng Zhang. Separable Reversible Data Hiding in Encrypted Image |
833 | -- | 841 | Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems |
842 | -- | 848 | Tiziano Bianchi, Alessandro Piva. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps |