Journal: IEEE Transactions on Information Forensics and Security

Volume 9, Issue 9

1341 -- 1355Fernando Pérez-González, Carmela Troncoso, Simon Oya. A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems
1356 -- 1366Michael R. Clark, Kenneth M. Hopkinson. Transferable Multiparty Computation With Applications to the Smart Grid
1367 -- 1379Hussein Moosavi, Francis M. Bui. A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
1380 -- 1393Andrea Abrardo, Mauro Barni. A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding
1394 -- 1405Kevin M. Carter, Nwokedi C. Idika, William W. Streilein. Probabilistic Threat Propagation for Network Security
1406 -- 1415Shaoquan Jiang. (Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel
1416 -- 1423Worapan Kusakunniran. Recognizing Gaits on Spatio-Temporal Feature Domain
1424 -- 1435Andrew D. Ker, Tomás Pevný. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis
1436 -- 1449Stefano Berretti, Pietro Pala, Alberto Del Bimbo. Face Recognition by Super-Resolved 3D Models From Consumer Depth Cameras
1450 -- 1464Andrea Costanzo, Irene Amerini, Roberto Caldelli, Mauro Barni. Forensic Analysis of SIFT Keypoint Removal and Injection
1465 -- 1476Seyyedeh Atefeh Musavi, Mehdi Kharrazi. Back to Static Analysis for Kernel-Level Rootkit Detection
1477 -- 1490Yen-Wei Huang, Pierre Moulin. On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics
1491 -- 1501Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez. Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework
1502 -- 1517Md. Asikuzzaman, M. J. Alam, Andrew J. Lambert, Mark R. Pickering. Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT Domain
1518 -- 1526Chun-Wei Tan, Ajay Kumar. Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris Encoding

Volume 9, Issue 8

1211 -- 1226Wei Fan, Kai Wang, François Cayre, Zhang Xiong. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
1227 -- 1239Yang Wang, Willy Susilo, Man Ho Au, Guilin Wang. Collusion-Resistance in Optimistic Fair Exchange
1240 -- 1250Huiming Wang, Feng Liu, Xiang-Gen Xia. Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks
1251 -- 1263Neil Zhenqiang Gong, Di Wang. On the Security of Trustee-Based Social Authentications
1264 -- 1277Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang. Investigation on Cost Assignment in Spatial Image Steganography
1278 -- 1287Andrey Garnaev, Melike Baykal-Gursoy, H. Vincent Poor. Incorporating Attack-Type Uncertainty Into Network Protection
1288 -- 1298Ajay Kumar. Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities
1299 -- 1310Fausto Galvan, Giovanni Puglisi, Arcangelo Ranieri Bruna, Sebastiano Battiato. First Quantization Matrix Estimation From Double Compressed JPEG Images
1311 -- 1321Michail Tsikerdekis, Sherali Zeadally. Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior
1322 -- 1332Fuqing Duan, Yanchao Yang, Yan Li, Yun Tian, Ke Lu, Zhongke Wu, Mingquan Zhou. Skull Identification via Correlation Measure Between Skull and Face Shape

Volume 9, Issue 7

1045 -- 1055Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing. A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion
1056 -- 1068Himanshu S. Bhatt, Richa Singh, Mayank Vatsa. On Recognizing Faces in Videos Using Clustering-Based Re-Ranking and Fusion
1069 -- 1083Jingtang Luo, Xiaolong Yang, Jin Wang, Jie Xu, Jian Sun, Keping Long. On a Mathematical Model for Low-Rate Shrew DDoS
1084 -- 1097Nesli Erdogmus, Sébastien Marcel. Spoofing Face Recognition With 3D Masks
1098 -- 1107Fuchun Guo, Yi Mu, Willy Susilo. Subset Membership Encryption and Its Applications to Oblivious Transfer
1108 -- 1119Matthieu Urvoy, Dalila Goudia, Florent Autrusseau. Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions
1120 -- 1132Pengfei Zhu, Wangmeng Zuo, Lei Zhang, Simon Chi-Keung Shiu, David Zhang. Image Set-Based Collaborative Representation for Face Recognition
1133 -- 1140David Irakiza, Md E. Karim, Vir V. Phoha. A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
1141 -- 1156Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
1157 -- 1168Neetesh Saxena, Narendra S. Chaudhari. EasySMS: A Protocol for End-to-End Secure Transmission of SMS
1169 -- 1178Haibin Yan, Jiwen Lu, Weihong Deng, Xiuzhuang Zhou. Discriminative Multimetric Learning for Kinship Verification
1179 -- 1192WenCheng Yang, Jiankun Hu, Song Wang. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement
1193 -- 1205Jae Hong Seo, Keita Emura. Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

Volume 9, Issue 6

891 -- 904Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu. Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems
905 -- 920Farzad Farhadzadeh, Sviatoslav Voloshynovskiy. Active Content Fingerpriting
921 -- 932Le Zhang, Zhi-Hui Kong, Chip-Hong Chang, Alessandro Cabrini, Guido Torelli. Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable Functions
933 -- 947Napa Sae-Bae, Nasir Memon. Online Signature Verification on Mobile Devices
948 -- 960Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin. A New Sketch Method for Measuring Host Connection Degree Distribution
961 -- 975Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou. A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags
976 -- 987Neil Zhenqiang Gong, Mario Frank, Prateek Mittal. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection
988 -- 998Tian Wang, Hichem Snoussi. Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram
999 -- 1014Shize Guo, XinJie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert, Chujiao Ma. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
1015 -- 1023Bashar A. Rajoub, Reyer Zwiggelaar. Thermal Facial Analysis for Deception Detection
1024 -- 1033Shaoquan Jiang. Keyless Authentication in a Noisy Model

Volume 9, Issue 5

741 -- 751Keren Wang, Hong Zhao, Hongxia Wang. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value
752 -- 762Jan Kodovský, Jessica J. Fridrich. Effect of Image Downsampling on Steganographic Security
763 -- 771Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan. CP-ABE With Constant-Size Keys for Lightweight Devices
772 -- 781Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
782 -- 800Patrizio Campisi, Daria La Rocca. Brain waves for automatic biometric-based user recognition
801 -- 813Chia-Hua Lin, Shang-Ho Tsai, Yuan-Pei Lin. Secure Transmission Using MIMO Precoding
814 -- 825Linjie Guo, Jiangqun Ni, Yun-Qing Shi. Uniform Embedding for Efficient JPEG Steganography
826 -- 838Nesli Erdogmus, Jean-Luc Dugelay. 3D Assisted Face Recognition: Dealing With Expression Variations
839 -- 850Joan Enric Barceló-Lladó, Antoni Morell, Gonzalo Seco-Granados. Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks
851 -- 862D. Yadav, Naman Kohli, James S. Doyle Jr., R. Singh, M. Vatsa, Kevin W. Bowyer. Unraveling the Effect of Textured Contact Lenses on Iris Recognition
863 -- 874Ruben Heras Evangelio, Michael Pätzold, Ivo Keller, Thomas Sikora. Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction
875 -- 884Boris Skoric, Niels de Vreede. The Spammed Code Offset Method

Volume 9, Issue 4

543 -- 553Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding. A Hybrid Scheme for Authenticating Scalable Video Codestreams
554 -- 567Giovanni Chierchia, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection
568 -- 582Napa Sae-Bae, Nasir Memon, Katherine Isbister, Kowsar Ahmed. Multitouch Gesture-Based Authentication
583 -- 595Makkena Purnachandra Rao, A. N. Rajagopalan, Guna Seetharaman. Harnessing Motion Blur to Unveil Splicing
596 -- 606Dawen Xu, Rangding Wang, Yun Q. Shi. Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
607 -- 609Hans Georg Schaathun. Attacks on Kuribayashi's Fingerprinting Scheme
610 -- 623Minoru Kuribayashi. Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme
624 -- 632Chunxiao Cai, Yueming Cai, Xiangyun Zhou, Weiwei Yang, Wendong Yang. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?
633 -- 644Mahmoud M. Elmesalawy, M. M. Eissa. New Forensic ENF Reference Database for Media Recording Authentication Based on Harmony Search Technique Using GIS and Wide Area Frequency Measurements
645 -- 652Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang. Cryptanalysis of Lightweight WG-8 Stream Cipher
653 -- 665Roberto De Prisco, Alfredo De Santis. On the Relation of Random Grid and Deterministic Visual Cryptography
666 -- 680Han Su, Adams Wai-Kin Kong. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification
681 -- 694Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
695 -- 708Mun-Kyu Lee. Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry
709 -- 718Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, Athanasios V. Vasilakos. ${\rm PROFIL}_{R}$: Toward Preserving Privacy and Functionality in Geosocial Networks
719 -- 729Gaojie Chen, Zhao Tian, Yu Gong, Zhi Chen, Jonathon A. Chambers. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

Volume 9, Issue 3

337 -- 338C. C. Jay Kuo. Editorial
339 -- 353Yajuan Tang, Xiapu Luo, Qing Hui, Rocky K. C. Chang. Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks
354 -- 363Erik Matlin, Motilal Agrawal, David Stoker. Non-Invasive Recognition of Poorly Resolved Integrated Circuit Elements
364 -- 374Pietro Lovato, Manuele Bicego, Cristina Segalin, Alessandro Perina, Nicu Sebe, Marco Cristani. Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are
375 -- 385Reza Soosahabi, Mort Naraghi-Pour, Dmitri D. Perkins, Magdy A. Bayoumi. Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks
386 -- 396Taha A. Khalaf, Sang Wu Kim, Alaa E. Abdel-Hakim. Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack
397 -- 410Javier Franco-Contreras, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux. Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation
411 -- 425Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Ulrich Gries, Gwenaël J. Doërr. A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation
426 -- 435Erfan Soltanmohammadi, Mort Naraghi-Pour. Nonparametric Density Estimation, Hypotheses Testing, and Sensor Classification in Centralized Detection
436 -- 450Bingyang Liu, Jun Bi, Athanasios V. Vasilakos. Toward Incentivizing Anti-Spoofing Deployment
451 -- 463Jun Yan, Haibo He, Yan Sun. Integrated Security Analysis on Cascading Failure in Complex Networks
464 -- 475Pedro Tome-Gonzalez, Julian Fiérrez, Rubén Vera-Rodríguez, Mark S. Nixon. Soft Biometrics and Their Application in Person Recognition at a Distance
476 -- 488Heng Zhou, Lauren M. Huie, Lifeng Lai. Secret Key Generation in the Two-Way Relay Channel With Active Attackers
489 -- 500Haojun Wu, Yong Wang, Jiwu Huang. Identification of Electronic Disguised Voices
501 -- 514Jun-Yong Zhu, Wei-Shi Zheng, Jian-Huang Lai, Stan Z. Li. Matching NIR Face to VIS Face Using Transduction
515 -- 525Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li. Contrast Enhancement-Based Forensics in Digital Images
526 -- 536Xiangqian Wu, Youbao Tang, Wei Bu. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform

Volume 9, Issue 2

182 -- 195Peng Xu, Zhiguo Ding, Xuchu Dai, Kin K. Leung. A General Framework of Wiretap Channel With Helping Interference and State Information
196 -- 207Zhiyong Shan, Xin Wang 0001. Growing Grapes in Your Computer to Defend Against Malware
208 -- 220Hong Liu, Huansheng Ning, Yan Zhang, Qingxu Xiong, Laurence T. Yang. Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid
221 -- 232Steffen Schulz, Vijay Varadharajan, Ahmad-Reza Sadeghi. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
233 -- 246Xin Liu, Yiu-ming Cheung. Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification
247 -- 258Lifeng Wang, Nan (Jonas) Yang, Maged Elkashlan, Phee Lep Yeoh, Jinhong Yuan. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels
259 -- 271Takao Murakami, Kenta Takahashi, Kanta Matsuura. Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics
272 -- 284Ning Wang, Ning Zhang, T. Aaron Gulliver. Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design
285 -- 295Jeffrey R. Paone, Patrick J. Flynn, P. Jonathon Phillips, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick Grother, George W. Quinn, Matthew T. Pruitt, Jason M. Grant. Double Trouble: Differentiating Identical Twins by Face Recognition
296 -- 308Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak. Firewall Policy Reconnaissance: Techniques and Analysis
309 -- 320Bing Zeng, Jeff Siu-Kei Au-Yeung, Shuyuan Zhu, Moncef Gabbouj. Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms
321 -- 329Mohamad Badra, Sherali Zeadally. Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy

Volume 9, Issue 12

2024 -- 2034George Tzimiropoulos, Joan Alabort-i-Medina, Stefanos Zafeiriou, Maja Pantic. Active Orientation Models for Face Alignment In-the-Wild
2035 -- 2050Xingjie Wei, Chang-Tsun Li, Zhen Lei, Dong Yi, Stan Z. Li. Dynamic Image-to-Class Warping for Occluded Face Recognition
2051 -- 2062Yong Li, Jing Liu, Hanqing Lu, Songde Ma. Learning Robust Face Representation With Classwise Block-Diagonal Structure
2063 -- 2075Massimo Tistarelli, Yunlian Sun, Norman Poh. On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition
2076 -- 2088Yi-Chen Chen, Vishal M. Patel, Rama Chellappa, P. Jonathon Phillips. Ambiguously Labeled Learning Using Dictionaries
2089 -- 2099Giovani Chiachia, Alexandre X. Falcão, Nicolas Pinto, Anderson Rocha, David D. Cox. Learning Person-Specific Representations From Faces in the Wild
2100 -- 2109Shervin Rahimzadeh Arashloo, Josef Kittler. Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features
2110 -- 2118Gee-Sern Hsu, Yu-Lun Liu, Hsiao-Chia Peng, Po-Xun Wu. RGB-D-Based Face Reconstruction and Recognition
2119 -- 2131Suriya Gunasekar, Joydeep Ghosh, Alan C. Bovik. Face Detection on Distorted Images Augmented by Perceptual Quality-Aware Features
2132 -- 2143Mehran Kafai, Le An, Bir Bhanu. Reference Face Graph for Face Recognition
2144 -- 2157Lacey Best-Rowden, Hu Han, Charles Otto, Brendan Klare, Anil K. Jain. Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection
2158 -- 2169Asem M. Ali. A 3D-Based Pose Invariant Face Recognition at a Distance Framework
2170 -- 2179Eran Eidinger, Roee Enbar, Tal Hassner. Age and Gender Estimation of Unfiltered Faces
2180 -- 2192Gayathri Mahalingam, Karl Ricanek Jr., A. Midori Albert. Investigating the Periocular-Based Face Recognition Across Gender Transformation
2193 -- 2204Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay Jha. Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints
2205 -- 2219Arik Vartanian, Asaf Shabtai. TM-Score: A Misuseability Weight Measure for Textual Content
2220 -- 2231Yuan Cao, Chip-Hong Chang, Shoushun Chen. A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection
2232 -- 2247Cong Liu, Hefei Ling, Fuhao Zou, Lingyu Yan, Yunfei Wang, Hui Feng, Xinyu Ou. Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints
2248 -- 2263Scott Klum, Hu Han, Brendan Klare, Anil K. Jain. The FaceSketchID System: Matching Facial Composites to Mugshots
2264 -- 2276Ivana Chingovska, André Rabello dos Anjos, Sébastien Marcel. Biometrics Evaluation Under Spoofing Attacks
2277 -- 2290Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon. Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
2291 -- 2301Yuxi Liu, Dimitrios Hatzinakos. Earprint: Transient Evoked Otoacoustic Emission for Biometrics
2302 -- 2313Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao. An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
2314 -- 2326Paulo Antonio Andrade Esquef, José Antonio Apolinário, Luiz W. P. Biscainho. Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations
2327 -- 2339Hu Xiong. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
2340 -- 2354Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He. Resilience Analysis of Power Grids Under the Sequential Attack

Volume 9, Issue 11

1765 -- 1779Marco Baldi, Franco Chiaraluce, Nicola Laurenti, Stefano Tomasin, Francesco Renna. Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes
1780 -- 1789Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris. Mobile User Authentication Using Statistical Touch Dynamics Images
1790 -- 1803Zhen Xu, Cong Wang, Kui Ren, Lingyu Wang, Bingsheng Zhang. Proof-Carrying Cloud Computation: The Case of Convex Optimization
1804 -- 1813Mohsen Zareian, Hamid Reza Tohidypour. A Novel Gain Invariant Quantization-Based Watermarking Approach
1814 -- 1827Chao Wang, Huiming Wang. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels
1828 -- 1842Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
1843 -- 1856Pratik Chattopadhyay, Shamik Sural, Jayanta Mukherjee. Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera
1857 -- 1868Jiantao Zhou, Oscar C. Au, Guangtao Zhai, Yuan Yan Tang, Xianming Liu. Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling
1869 -- 1882Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
1883 -- 1892Yang Wang, Man Ho Allen Au, Willy Susilo. Revisiting Optimistic Fair Exchange Based on Ring Signatures
1893 -- 1905Li Zhang, Chip-Hong Chang. A Pragmatic Per-Device Licensing Scheme for Hardware IP Cores on SRAM-Based FPGAs
1906 -- 1921Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan. DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints
1922 -- 1932Aythami Morales, Raffaele Cappelli, Miguel Angel Ferrer-Ballester, Davide Maltoni. Synthesis and Evaluation of High Resolution Hand-Prints
1933 -- 1942Jianquan Yang, Jin Xie, Guopu Zhu, Sam Kwong, Yun-Qing Shi. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix
1943 -- 1952Qiang Tang 0001. Nothing is for Free: Security in Searching Shared and Encrypted Data
1953 -- 1961Yun-Fu Liu, Jing-Ming Guo, Chih-Hsien Hsia, Sheng-Yao Su, Hua Lee. Sample Space Dimensionality Refinement for Symmetrical Object Detection
1962 -- 1973Shigen Shen, Hongjie Li, Risheng Han, Athanasios V. Vasilakos, Yihan Wang, Qiying Cao. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
1974 -- 1985Wenxiong Kang, Qiuxia Wu. Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern
1986 -- 2001Jeremiah R. Barr, Kevin W. Bowyer, Patrick J. Flynn. Framework for Active Clustering With Ensembles
2002 -- 2013Saeid Wahabi, Shahrzad Pouryayevali, Siddarth Hari, Dimitrios Hatzinakos. On Evaluating ECG Biometric Systems: Session-Dependence and Body Posture

Volume 9, Issue 10

1533 -- 1546Filipe de O. Costa, Marina A. Oikawa, Zanoni Dias, Siome Goldenstein, Anderson Rezende de Rocha. Image Phylogeny Forests Reconstruction
1547 -- 1556Ning Zhang, Yali Zang, Xin Yang, Xiaofei Jia, Jie Tian. Adaptive Orientation Model Fitting for Latent Overlapped Fingerprints Separation
1557 -- 1568Tiziano Bianchi, Alessandro Piva. TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding
1569 -- 1580Jianwu Wan, Ming Yang, Yang Gao, Yin-Juan Chen. Pairwise Costs in Semisupervised Discriminant Analysis for Face Recognition
1581 -- 1591Wen Zhou, Zhong Zhang. Human Action Recognition With Multiple-Instance Markov Model
1592 -- 1605Xiaotian Wu, Wei Sun. Extended Capabilities for XOR-Based Visual Cryptography
1606 -- 1616Honghai Yu, Pierre Moulin. Regularized Adaboost Learning for Identification of Time-Varying Content
1617 -- 1628Seong Ho Chae, Wan Choi, Jung Hoon Lee, Tony Q. S. Quek. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone
1629 -- 1640Gaurav Goswami, Mayank Vatsa, Richa Singh. RGB-D Face Recognition With Texture and Attribute Features
1641 -- 1652Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref. Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT
1653 -- 1666Wei Wang, Jing Dong, Tieniu Tan. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
1667 -- 1680Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie. A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
1681 -- 1694Qing Zhang, Yilong Yin, De-Chuan Zhan, Jingliang Peng. A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques
1695 -- 1707Yongkun Li, John C. S. Lui. Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks
1708 -- 1719Stefano Tomasin, Nicola Laurenti. Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis
1720 -- 1732Rafael F. Schaefer, Holger Boche. Robust Broadcasting of Common and Confidential Messages Over Compound Channels: Strong Secrecy and Decoding Performance
1733 -- 1742Attila Altay Yavuz. An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages
1743 -- 1754Ioannis Rigas, Oleg V. Komogortsev. Biometric Recognition via Probabilistic Spatial Projection of Eye Movement Trajectories in Dynamic Visual Environments

Volume 9, Issue 1

5 -- 13Xixiang Lv, Yi Mu, Hui Li. Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs
14 -- 26Zhenhua Chai, Zhenan Sun, Heydi Mendez Vazquez, Ran He, Tieniu Tan. Gabor Ordinal Measures for Face Recognition
27 -- 38Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz. Building a Scalable System for Stealthy P2P-Botnet Detection
39 -- 50Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation
51 -- 61Jiwen Lu, Gang Wang, Pierre Moulin. Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions
62 -- 71Pablo David Gutierrez, Miguel Lastra, Francisco Herrera, José Manuel Benítez. A High Performance Fingerprint Matching System for Large Databases Based on GPU
72 -- 87Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu. Data-Centric OS Kernel Malware Characterization
88 -- 98Kai-Hui Lee, Pei-Ling Chiu. Digital Image Sharing by Diverse Image Media
99 -- 108Vaibhav Rastogi, Yan Chen, Xuxian Jiang. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
109 -- 124Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo. Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks
125 -- 140Andrew Chi-Chih Yao, Yunlei Zhao. Privacy-Preserving Authenticated Key-Exchange Over Internet