Journal: IEEE Transactions on Information Forensics and Security

Volume 8, Issue 9

1417 -- 1432Ravi Garg, Avinash L. Varna, Adi Hajj-Ahmad, Min Wu 0001. "Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing
1433 -- 1445Marina Blanton, Mehrdad Aliasgari. Analysis of Reusability of Secure Sketches and Fuzzy Extractors
1446 -- 1455Feng Liu, David Zhang, Zhenhua Guo. Distal-Interphalangeal-Crease-Based User Authentication System
1456 -- 1468Xiangui Kang, Matthew C. Stamm, Anjie Peng, K. J. Ray Liu. Robust Median Filtering Forensics Using an Autoregressive Model
1469 -- 1481Satyanaranaya Vuppala, Giuseppe Abreu. Unicasting on the Secrecy Graph
1482 -- 1496Holger Boche, Rafael F. Schaefer. Capacity Results and Super-Activation for Wiretap Channels With Active Wiretappers
1497 -- 1507Shraboni Jana, Kai Zeng, Wei Cheng, Prasant Mohapatra. Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
1508 -- 1518Hong Cao, Alex C. Kot. On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding
1519 -- 1530Nicole L. Beebe, Laurence A. Maddox, Lishu Liu, Minghe Sun. Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification
1531 -- 1540Babak Mahdian, Radim Nedbal, Stanislav Saic. Blind Verification of Digital Image Originality: A Statistical Approach
1541 -- 1553Xiaotian Wu, Wei Sun. Generalized Random Grid and Its Applications in Visual Cryptography

Volume 8, Issue 8

1261 -- 1273Jiangyang Zhang, Rongjie Lai, C. C. Jay Kuo. Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation
1274 -- 1279Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann. Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks
1280 -- 1293Chao Yang, Robert Chandler Harkreader, Guofei Gu. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
1294 -- 1305Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo. Hybrid Static-Runtime Information Flow and Declassification Enforcement
1306 -- 1317Patrick Bas, Teddy Furon. A New Measure of Watermarking Security: The Effective Key Length
1318 -- 1330Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun. A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices
1331 -- 1342Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye. A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior Modeling
1343 -- 1354Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng. Attribute-Based Encryption With Verifiable Outsourced Decryption
1355 -- 1370Seung-Jin Ryu, Matthias Kirchner, Min-Jeong Lee, Heung-Kyu Lee. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments
1371 -- 1383Sian-Jheng Lin, Wei-Ho Chung. An Efficient (n, k) Information Dispersal Algorithm Based on Fermat Number Transforms
1384 -- 1396Yidong Li, Hong Shen. On Identity Disclosure Control for Hypergraph-Based Data Publishing
1397 -- 1408Holger Boche, Rafael F. Schaefer. Wiretap Channels With Side Information - Strong Secrecy Capacity and Optimal Transceiver Design

Volume 8, Issue 7

1081 -- 1090Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu. Uncoordinated Cooperative Jamming for Secret Communications
1091 -- 1100Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification
1101 -- 1114Juan Ramón Troncoso-Pastoriza, Daniel González-Jiménez, Fernando Pérez-González. Fully Private Noninteractive Face Verification
1115 -- 1125Luis Cardoso, Andre Barbosa, Frutuoso Silva, António M. G. Pinheiro, Hugo Proença. Iris Biometrics: Synthesis of Degraded Ocular Images
1126 -- 1139Meng-Hsi Chen, Shih-Chun Lin, Yao-Win Peter Hong, Xiangyun Zhou. On Cooperative and Malicious Behaviors in Multirelay Fading Channels
1140 -- 1151Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
1152 -- 1161Yahya Sowti Khiabani, Shuangqing Wei. ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels
1162 -- 1172Sadaf Salehkalaibar, Mahtab Mirmohseni, Mohammad Reza Aref. One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets
1173 -- 1181Ling Fu, Penn N. Markham, Richard W. Conners, Yilu Liu. An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction
1182 -- 1194Tiago Jose de Carvalho, Christian Riess, Elli Angelopoulou, Hélio Pedrini, Anderson de Rezende Rocha. Exposing Digital Image Forgeries by Illumination Color Classification
1195 -- 1200Ly-Minh-Duy Le, Kah Chan Teh, Kwok Hung Li. Jamming Rejection Using FFH/MFSK ML Receiver Over Fading Channels With the Presence of Timing and Frequency Offsets
1201 -- 1210Ming Li, Michel Kulhandjian, Dimitrios A. Pados, Stella N. Batalama, Michael J. Medley. Extracting Spread-Spectrum Hidden Data From Digital Media
1211 -- 1220Britton Quist, Michael A. Jensen. Optimal Channel Estimation in Beamformed Systems for Common-Randomness-Based Secret Key Establishment
1221 -- 1229Gerson de Souza Faria, Hae Yong Kim. Identification of Pressed Keys From Mechanical Vibrations
1230 -- 1242Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima. Monitoring Integrity Using Limited Local Memory
1243 -- 1254Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe. Multiaccess Channel With Partially Cooperating Encoders and Security Constraints

Volume 8, Issue 6

835 -- 837Sen-ching Samson Cheung, Yan Sun, Karl Aberer, Jayant R. Haritsa, Bill G. Horne, Kai Hwang. Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems
838 -- 852Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor. Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
853 -- 862David Sánchez 0001, Montserrat Batet, Alexandre Viejo. Automatic General-Purpose Sanitization of Textual Documents
863 -- 873I.-Ting Lien, Yu-Hsun Lin, Jyh-Ren Shieh, Ja-Ling Wu. A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search
874 -- 887Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
888 -- 900FengJun Li, Bo Luo, Peng Liu 0005, Dongwon Lee, Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
901 -- 910Agusti Solanas, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz. Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health
911 -- 923Ivan Ivanov, Peter Vajda, Pavel Korshunov, Touradj Ebrahimi. Comparative Study of Trust Modeling for Automatic Landmark Tagging
924 -- 935Xiaoyong Li, Feng Zhou, Junping Du. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
936 -- 948Yuhong Liu, Yan Sun, Siyuan Liu, Alex C. Kot. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
949 -- 962Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
963 -- 972Justin L. Rice, Vir V. Phoha, Philip Robinson. Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds
973 -- 984Imad M. Abbadi, Anbang Ruan. Towards Trustworthy Resource Scheduling in Clouds
985 -- 997Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
998 -- 1012Arfika Nurhudatiana, Adams Wai-Kin Kong, Keyan Matinpour, Deborah Chon, Lisa Altieri, Siu-Yeung Cho, Noah Craft. The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns
1013 -- 1026Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu. Fine-Grained Refinement on TPM-Based Protocol Applications
1027 -- 1037Earlence Fernandes, Bruno Crispo, Mauro Conti. FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment
1038 -- 1050Benjamin Mathon, Patrick Bas, François Cayre, Benoit M. Macq. Impacts of Watermarking Security on Tardos-Based Fingerprinting
1051 -- 1060Jinyu Zuo, Natalia A. Schmid. Adaptive Quality-Based Performance Prediction and Boosting for Iris Authentication: Methodology and Its Illustration
1061 -- 1072M. Kamran, Muddassar Farooq. A Formal Usability Constraints Model for Watermarking of Outsourced Datasets

Volume 8, Issue 5

705 -- 716Mohammad Hashem Haghighat, Mehdi Tavakoli, Mehdi Kharrazi. Payload Attribution via Character Dependent Multi-Bloom Filters
717 -- 732Siavash Bayat, Raymond H. Y. Louie, Zhu Han, Branka Vucetic, Yonghui Li. Physical-Layer Security in Distributed Wireless Networks Using Matching Theory
733 -- 743Shyong Jian Shyu, Hung-Wei Jiang. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes
744 -- 753D. Bykhovsky, A. Cohen. Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model
754 -- 768Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
769 -- 778Feng Yue, Bin Li, Ming Yu, Jiaqiang Wang. Hashing Based Fast Palmprint Identification for Large-Scale Databases
779 -- 788Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, FengHua Li. Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding
789 -- 802Nese Alyüz, Berk Gökberk, Lale Akarun. 3-D Face Recognition Under Occlusion Using Masked Projection
803 -- 809Lin Ding, Jie Guan. Related Key Chosen IV Attack on Grain-128a Stream Cipher
810 -- 820Alessandro Cilardo, Nicola Mazzocca. Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
821 -- 828Zoe L. Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, K. P. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun. Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data

Volume 8, Issue 4

593 -- 607Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni. A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence
608 -- 618Jiayuan Fan, Hong Cao, Alex C. Kot. Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection
619 -- 625Hyoungsuk Jeon, Jinho Choi 0001, Steven W. McLaughlin, Jeongseok Ha. Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks
626 -- 635Quanxue Gao, Jingjing Liu, Hailin Zhang, Xinbo Gao, Kui Li. Joint Global and Local Structure Discriminant Analysis
636 -- 645Shuangqing Wei, Jian Wang, Ruming Yin, Jian Yuan. Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts
646 -- 656Jun Yan, Yihai Zhu, Haibo He, Yan Sun. Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map
657 -- 668Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen. A Novel Electronic English Auction System With a Secure On-Shelf Mechanism
669 -- 681Vivek Balachandran, Sabu Emmanuel. Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code
682 -- 694Yupeng Liu, Jiangyuan Li, Athina P. Petropulu. Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security

Volume 8, Issue 3

429 -- 439Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei. Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
440 -- 449Kun Xie, Wen Chen 0001, Lili Wei. Increasing Security Degree of Freedom in Multiuser and Multieve Systems
450 -- 463Mauro Barni, Benedetta Tondi. The Source Identification Game: An Information-Theoretic Perspective
464 -- 476Rémi Cogranne, Florent Retraint. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection
477 -- 487Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues. A Timing Channel Spyware for the CSMA/CA Protocol
488 -- 499Juan E. Tapia, Claudio A. Perez. Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of LBP, Intensity, and Shape
500 -- 509Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul-Gyu Im. SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection
510 -- 519Jiwen Lu, Yap-Peng Tan. Cost-Sensitive Subspace Analysis and Extensions for Face Recognition
520 -- 527Deng Wang, Duoqian Miao, Gunnar Blohm. A New Method for EEG-Based Concealed Information Test
528 -- 541Khandaker A. Rahman, Kiran S. Balagani, Vir V. Phoha. Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes
542 -- 552Xiaobei Liu, Soo Ngee Koh, Chee Cheon Chui, Xin-Wen Wu. A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder
553 -- 562Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, FengHua Li. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
563 -- 577Tzipora Halevi, Nitesh Saxena. Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing
578 -- 587Gökhan Gül, Fatih Kurugollu. JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques

Volume 8, Issue 2

273 -- 282Hong Zhao, Yun-Qing Shi. Detecting Covert Channels in Computer Networks Based on Chaos Theory
283 -- 294Andrew Chi-Chih Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices
295 -- 304Ngoc-Son Vu. Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition
305 -- 313Qian Tao, Raymond N. J. Veldhuis. Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics
314 -- 323Cristina Comaniciu, H. Vincent Poor. On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels
324 -- 334Rafael F. Wyrembelski, Moritz Wiese, Holger Boche. Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages
335 -- 349Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro. Revealing the Traces of JPEG Compression Anti-Forensics
350 -- 360Sheng Li, Alex C. Kot. Fingerprint Combination for Privacy Protection
361 -- 373Jessica J. Fridrich. Effect of Cover Quantization on Steganographic Fisher Information
374 -- 389Stefano Berretti, Alberto Del Bimbo, Pietro Pala. Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts
390 -- 401Robin Doss, Wanlei Zhou, Shui Yu. Secure RFID Tag Ownership Transfer Based on Quadratic Residues
402 -- 413Larry A. Dunning, Ray Kresman. Privacy Preserving Data Sharing With Anonymous ID Assignment
414 -- 419Shih-Chun Lin, Pin-Hsun Lin. On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT

Volume 8, Issue 12

1897 -- 1908Po-Chyi Su, Yu-Chuan Chang, Ching-Yu Wu. Geometrically Resilient Digital Image Watermarking by Using Interest Point Extraction and Extended Pilot Signals
1909 -- 1922Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou. Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE
1923 -- 1936Biao He, Xiangyun Zhou. Secure On-Off Transmission Design With Channel Estimation Errors
1937 -- 1946Daniel Votipka, Timothy Vidas, Nicolas Christin. Passe-Partout: A General Collection Methodology for Android Devices
1947 -- 1960Lan Zhou, Vijay Varadharajan, Michael Hitchens. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
1961 -- 1974Peng Xu, Zhiguo Ding, Xuchu Dai. Rate Regions for Multiple Access Channel With Conference and Secrecy Constraints
1975 -- 1985Hugo Proença. Iris Biometrics: Indexing and Retrieving Heavily Degraded Data
1986 -- 1995Yoichi Tomioka, Yuya Ito, Hitoshi Kitazawa. Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise
1996 -- 2006Vojtech Holub, Jessica J. Fridrich. Random Projections of Residuals for Digital Image Steganalysis
2007 -- 2020Huiming Wang, Miao Luo, Qinye Yin, Xiang-Gen Xia. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks
2021 -- 2033Emiliano De Cristofaro, Claudio Soriente. Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
2034 -- 2045Maodi Hu, Yunhong Wang, Zhaoxiang Zhang, James J. Little, Di Huang. View-Invariant Discriminative Projection for Multi-View Gait-Based Human Identification
2046 -- 2058Andreas Peter, Erik Tews, Stefan Katzenbeisser. Efficiently Outsourcing Multiparty Computation Under Multiple Keys
2059 -- 2072Daoshun Wang, Tao Song, Lin Dong, Ching-Nung Yang. Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing
2073 -- 2088Wei-Hong Chuang, Ravi Garg, Min Wu 0001. Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis
2089 -- 2100Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, Y. Thomas Hou. Proximity-Based Security Techniques for Mobile Users in Wireless Networks
2101 -- 2114David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Mark E. Oxley. Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios
2115 -- 2126Corey Holland, Oleg V. Komogortsev. Complex Eye Movement Pattern Biometrics: The Effects of Environment and Stimulus
2127 -- 2137Thomas Plantard, Willy Susilo, Zhenfei Zhang. Fully Homomorphic Encryption Using Hidden Ideal Lattice
2138 -- 2153Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang. Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy
2154 -- 2163Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta. Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity
2164 -- 2176Yi-Lei Chen, Chiou-Ting Hsu. Subspace Learning for Facial Age Estimation Via Pairwise Age Ranking
2177 -- 2185Hao-Gong Chou, Chun-Fu Chuang, Wen-June Wang, Jia-Chin Lin. A Fuzzy-Model-Based Chaotic Synchronization and Its Implementation on a Secure Communication System

Volume 8, Issue 11

1709 -- 1721Mu Li, Vishal Monga. Compact Video Fingerprinting via Structural Graphical Models
1722 -- 1730Sheng Wei, Ani Nahapetian, Miodrag Potkonjak. Quantitative Intellectual Property Protection Using Physical-Level Characterization
1731 -- 1745Dajiang Chen, Zheng Qin, Xufei Mao, Panlong Yang, Zhiguang Qin, Ruijin Wang. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference
1746 -- 1759Hong Zhao, Hafiz Malik. Audio Recording Location Identification Using Acoustic Environment Signature
1760 -- 1774Abdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai, Luc Vandendorpe. Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT
1775 -- 1789Zhenxin Zhan, Maochao Xu, Shouhuai Xu. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
1790 -- 1801Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
1802 -- 1814Xi Zhang, Xiangyun Zhou, Matthew R. McKay. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks
1815 -- 1826Mohammad Reza Faghani, Uyen Trang Nguyen. A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks
1827 -- 1837Hafiz Malik. Acoustic Environment Identification and Its Applications to Audio Forensics
1838 -- 1849Xudong Lv, Z. Jane Wang. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding
1850 -- 1859Xun Gong, Mavis Rodrigues, Negar Kiyavash. Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors
1860 -- 1875Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
1876 -- 1891Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas. PUF Modeling Attacks on Simulated and Silicon Data

Volume 8, Issue 10

1559 -- 1561Noboru Babaguchi, Andrea Cavallaro, Rama Chellappa, Frédéric Dufaux, Liang Wang. Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy
1562 -- 1574Stefan Popa, Danny Crookes, Paul Miller. Hardware Acceleration of Background Modeling in the Compressed Domain
1575 -- 1589Hang Su, Hua Yang, Shibao Zheng, Yawen Fan, Sha Wei. The Large-Scale Crowd Behavior Perception Based on Spatio-Temporal Viscous Fluid Field
1590 -- 1599Yang Cong, Junsong Yuan, Yandong Tang. Video Anomaly Search in Crowded Scenes via Spatio-Temporal Motion Context
1600 -- 1609Zhong Zhang, Chunheng Wang, Baihua Xiao, Wen Zhou, Shuang Liu. Attribute Regularization Based Human Action Recognition
1610 -- 1619Nandita M. Nayak, Yingying Zhu, Amit K. Roy Chowdhury. Exploiting Spatio-Temporal Scene Structure for Wide-Area Activity Analysis in Unconstrained Environments
1620 -- 1631Giounona Tzanidou, Iffat Zafar, Eran A. Edirisinghe. Carried Object Detection in Videos Using Color Information
1632 -- 1641Zhaoxiang Zhang, Yuhang Zhao, Yunhong Wang, Jianyun Liu, Zhenjun Yao, Jun Tang. Transferring Training Instances for Convenient Cross-View Object Classification in Surveillance
1642 -- 1653Worapan Kusakunniran, Qiang Wu, Jian Zhang, Yi Ma, Hongdong Li. A New View-Invariant Feature for Cross-View Gait Recognition
1654 -- 1664Xu Zhao, Xiong Li, Zhe Wu, Yun Fu, Yuncai Liu. Multiple Subcategories Parts-Based Representation for One Sample Face Identification
1665 -- 1677Unsang Park, Hyun-Cheol Choi, Anil K. Jain, Seong-Whan Lee. Face Tracking and Recognition at a Distance: A Coaxial and Concentric PTZ Camera System
1678 -- 1687Yansong (Jennifer) Ren, Lawrence O'Gorman, Les J. Wu, Fangzhe Chang, Thomas L. Wood, John R. Zhang. Authenticating Lossy Surveillance Video
1688 -- 1699Fei Peng, Xiao-wen Zhu, Min Long. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos

Volume 8, Issue 1

5 -- 15Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
16 -- 30Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion. User Authentication Through Mouse Dynamics
31 -- 45Alessandra A. Paulino, Jianjiang Feng, Anil K. Jain. Latent Fingerprint Matching Using Descriptor-Based Hough Transform
46 -- 54Luís Filipe da Cruz Nassif, Eduardo R. Hruschka. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
55 -- 63Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao. Robust Hashing for Image Authentication Using Zernike Moments and Local Features
64 -- 75Yazhuo Gong, David Zhang, Pengfei Shi, Jingqi Yan. An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition
76 -- 88Zhen Liu, Zhenfu Cao, Duncan S. Wong. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
89 -- 100Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa. Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm
101 -- 110Patrick Chi Kwong Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. Heap Graph Based Software Theft Detection
111 -- 120Gouenou Coatrieux, Wei Pan, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
121 -- 135Stefanos Zafeiriou, Gary A. Atkinson, Mark F. Hansen, William A. P. Smith, Vasileios Argyriou, Maria Petrou, Melvyn L. Smith, Lyndon N. Smith. Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation
136 -- 148Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
149 -- 162Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun. On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
163 -- 173Roberto Di Pietro, Gabriele Oligeri. COKE Crypto-Less Over-the-Air Key Establishment
174 -- 183Neil J. Grabham, Matthew A. Swabey, Paul Chambers, Mark E. Lutman, Neil M. White, John E. Chad, Stephen P. Beeby. An Evaluation of Otoacoustic Emissions as a Biometric
184 -- 190Ke Cui, Jian Wang, Hong-Fei Zhang, Chun-Li Luo, Ge Jin, Teng-Yun Chen. A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System
191 -- 204Hu Han, Brendan Klare, Kathryn Bonnen, Anil K. Jain. Matching Composite Sketches to Face Photos: A Component-Based Approach
205 -- 215Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour. Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes
216 -- 228Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng. Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography
229 -- 238Hang Long, Wei Xiang, Yueying Zhang, Yuanan Liu, Wenbo Wang 0007. Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems
239 -- 253Kathryn Bonnen, Brendan Klare, Anil K. Jain. Component-Based Representation in Automated Face Recognition
254 -- 259Nan (Jonas) Yang, Himal A. Suraweera, Iain B. Collings, Chau Yuen. Physical Layer Security of TAS/MRC With Antenna Correlation
260 -- 267Asem A. Othman, Arun Ross. On Mixing Fingerprints