Abstract is missing.
- A phase-space reconstruction approach to detect covert channels in TCP/IP protocolsHong Zhao, Yun Q. Shi. 1-6 [doi]
- Semi non-intrusive training for cell-phone camera model linkageWei-Hong Chuang, Min Wu 0001. 1-6 [doi]
- First steps toward image phylogenyZanoni Dias, Anderson Rocha, Siome Goldenstein. 1-6 [doi]
- A fingerprint cryptosystem based on minutiae phase spectrumKarthik Nandakumar. 1-6 [doi]
- Differential template attacks on PUF enabled cryptographic devicesDeniz Karakoyunlu, Berk Sunar. 1-6 [doi]
- A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuitsHassan Salmani, Mark Tehranipoor, Jim Plusquellic. 1-6 [doi]
- ECG biometrics: A robust short-time frequency analysisIkenna Odinaka, Po-Hsiang Lai, Alan D. Kaplan, Joseph A. O'Sullivan, Erik J. Sirevaag, Sean D. Kristjansson, Amanda K. Sheffield, John W. Rohrbaugh. 1-6 [doi]
- Encrypted integer divisionThijs Veugen. 1-6 [doi]
- Joint robust watermarking and image compressionYuhan Zhou. 1-6 [doi]
- Beyond PKI: The Biocryptographic Key InfrastructureWalter J. Scheirer, Bill Bishop, Terrance E. Boult. 1-6 [doi]
- Minimizing additive distortion functions with non-binary embedding operation in steganographyTomás Filler, Jessica J. Fridrich. 1-6 [doi]
- Privacy preserving evaluation of signal quality with application to ECG analysisMauro Barni, Jorge Guajardo, Riccardo Lazzeretti. 1-6 [doi]
- Privacy amplification of content identification systems based on fingerprint bit reliabilitySviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof, Farzad Farhadzadeh. 1-6 [doi]
- Multimodal fusion vulnerability to non-zero effort (spoof) impostersPeter A. Johnson 0001, Bozhao Tan, Stephanie Schuckers. 1-5 [doi]
- Towards a feature set for robust printing-imaging cycle device identification using structured printed markingsMatthew Gaubatz, Steven J. Simske. 1-6 [doi]
- Digital forensics in VoIP networksJérôme François, Radu State, Thomas Engel, Olivier Festor. 1-6 [doi]
- Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetryFernanda A. Andaló, Gabriel Taubin, Siome Goldenstein. 1-6 [doi]
- The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithmsBozhao Tan, Aaron Lewicke, David Yambay, Stephanie Schuckers. 1-6 [doi]
- Indexing iris images using the Burrows-Wheeler TransformRavindra B. Gadde, Donald A. Adjeroh, Arun Ross. 1-6 [doi]
- On classification of source cameras: A graph based approachBei-Bei Liu, Heung-Kyu Lee, Yongjian Hu, Chang-Hee Choi. 1-5 [doi]
- Recognition of blurred license plate imagesPei-Lun Hsieh, Yu-Ming Liang, Hong-Yuan Mark Liao. 1-6 [doi]
- id-Privacy in large scale biometric systemsAbhijit Bendale, Terrance E. Boult. 1-6 [doi]
- Phishing and money mulesDinei Florêncio, Cormac Herley. 1-5 [doi]
- FPGA PUF using programmable delay linesMehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas. 1-6 [doi]
- Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitionsYen-Wei Huang, Pierre Moulin. 1-6 [doi]
- Efficient strategies to play the indistinguishability game for fuzzy sketchesIleana Buhan, Jorge Guajardo, Emile Kelkboom. 1-6 [doi]
- Similarity coefficient generators for network forensicsTelidevara Aditya, Venkatachalam Chandrasekaran, Avinash Srinivasan, Ravi Mukkamala, Sandeep Gampa. 1-6 [doi]
- A universal divergence-rate estimator for steganalysis in timing channelsShankar Sadasivam, Pierre Moulin, Sean P. Meyn. 1-6 [doi]
- Exposing digital forgeries from 3-D lighting environmentsEric Kee, Hany Farid. 1-6 [doi]
- Predictability and correlation in human metrologyDonald A. Adjeroh, Deng Cao, Marco Piccirilli, Arun Ross. 1-6 [doi]
- Secure computations on non-integer valuesMartin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser 0001, Heike Schröder. 1-6 [doi]
- Security and robustness constraints for spread-spectrum Tardos fingerprintingBenjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. 1-6 [doi]
- On rotation invariance in copy-move forgery detectionVincent Christlein, Christian Riess, Elli Angelopoulou. 1-6 [doi]
- Bayesian watermark detection and new perceptual mask based on a spatially weighted Total Variation image priorAntonis Mairgiotis, Nikolaos Galatsanos. 1-6 [doi]
- Fast image clustering of unknown source imagesRoberto Caldelli, Irene Amerini, Francesco Picchioni, Matteo Innocenti. 1-5 [doi]
- Model based print signature profile extraction for forensic analysis of individual text glyphsStephen B. Pollard, Steven J. Simske, Guy B. Adams. 1-6 [doi]
- Identification and secret-key binding in binary-symmetric template-protected biometric systemsFrans M. J. Willems, Tanya Ignatenko. 1-5 [doi]
- Privacy preserving string comparisons based on Levenshtein distanceShantanu Rane, Wei Sun 0008. 1-6 [doi]
- MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooksKannan Karthik, Dimitrios Hatzinakos. 1-6 [doi]