Abstract is missing.
- Detecting fingerprint distortion from a single imageXuanbin Si, Jianjiang Feng, Jie Zhou. 1-6 [doi]
- Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensorsRonny Merkel, Jana Dittmann, Claus Vielhauer. 7-12 [doi]
- Facial landmark configuration for improved detectionC. Huang, Boris A. Efraty, Uday Kurkure, Manos Papadakis, Shishir K. Shah, Ioannis A. Kakadiaris. 13-18 [doi]
- Two-stage appearance-based re-identification of humans in low-resolution videosJürgen Metzler. 19-24 [doi]
- Biometric template protection using turbo codes and modulation constellationsEmanuele Maiorana, Daniele Blasi, Patrizio Campisi. 25-30 [doi]
- Can a "poor" verification system be a "good" identification system? A preliminary studyBrian DeCann, Arun Ross. 31-36 [doi]
- Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usabilityGabriel Hospodar, Roel Maes, Ingrid Verbauwhede. 37-42 [doi]
- Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS)Sviatoslav Voloshynovskiy, Maurits Diephuis, Fokko Beekhof, Oleksiy J. Koval, Bruno Keel. 43-48 [doi]
- Improving the DGK comparison protocolThijs Veugen. 49-54 [doi]
- General function evaluation in a STPC setting via piecewise linear approximationTommaso Pignata, Riccardo Lazzeretti, Mauro Barni. 55-60 [doi]
- A framework for privacy preserving statistical analysis on distributed databasesBing-Rong Lin, Ye Wang, Shantanu Rane. 61-66 [doi]
- Modeling and analysis of Electric Network Frequency signal for timestamp verificationRavi Garg, Avinash L. Varna, Min Wu 0001. 67-72 [doi]
- Telephone handset identification by feature selection and sparse representationsYannis Panagakis, Constantine Kotropoulos. 73-78 [doi]
- Privacy-preserving architecture for forensic image recognitionAndreas Peter, Thomas Hartmann, Sascha Müller 0003, Stefan Katzenbeisser. 79-84 [doi]
- Sequence detection of overlapping latent fingerprints using a short-term aging featureMaik Schott, Ronny Merkel, Jana Dittmann. 85-90 [doi]
- Semantic based DNS forensicsSamuel Marchal, Jérôme François, Radu State, Thomas Engel. 91-96 [doi]
- Fingerprinting a flow of messages to an anonymous serverJuan A. Elices, Fernando Pérez-González. 97-102 [doi]
- Detecting anomalous network hosts by means of PCATomás Pevný, Martin Rehák, Martin Grill. 103-108 [doi]
- Forensic analysis of wireless networking evidence of Android smartphonesPanagiotis Andriotis, George C. Oikonomou, Theo Tryfonas. 109-114 [doi]
- A Least Squares approach to user profiling in pool mix-based anonymous communication systemsFernando Pérez-González, Carmela Troncoso. 115-120 [doi]
- Mapping evidence graphs to attack graphsChangwei Liu, Anoop Singhal, Duminda Wijesekera. 121-126 [doi]
- Reverse engineering of double JPEG compression in the presence of image resizingTiziano Bianchi, Alessandro Piva. 127-132 [doi]
- Content authentication and identification under informed attacksFokko Beekhof, Sviatoslav Voloshynovskiy, Farzad Farhadzadeh. 133-138 [doi]
- Forensic analysis of ordered data structures on the example of JPEG filesThomas Gloe. 139-144 [doi]
- Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devicesTakayuki Yamada, Seiichi Gohshi, Isao Echizen. 145-150 [doi]
- Detection of video double encoding with GOP size estimationDavid Vazquez-Padin, Marco Fontani, Tiziano Bianchi, Pedro Comesaña, Alessandro Piva, Mauro Barni. 151-156 [doi]
- IPTV streaming source classificationM. Masciopinto, Pedro Comesaña. 157-162 [doi]
- Effect of cover quantization on steganographic fisher informationJessica J. Fridrich. 163-168 [doi]
- An efficient JPEG steganographic scheme using uniform embeddingLinjie Guo, Jiangqun Ni, Yun-Qing Shi. 169-174 [doi]
- Active content fingerprinting: A marriage of digital watermarking and content fingerprintingSviatoslav Voloshynovskiy, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak. 175-180 [doi]
- AC-3 bit stream watermarkingXiao-Ming Chen, Michael Arnold, Peter G. Baum, Gwenaël J. Doërr. 181-186 [doi]
- Decoding fingerprints using the Markov Chain Monte Carlo methodTeddy Furon, Arnaud Guyader, Frédéric Cérou. 187-192 [doi]
- Weighted stego-image steganalysis for naive content-adaptive embeddingPascal Schöttle, Stefan Korff, Rainer Böhme. 193-198 [doi]
- Optimum forensic and counter-forensic strategies for source identification with training dataMauro Barni, Benedetta Tondi. 199-204 [doi]
- ML estimation of the resampling factorDavid Vazquez-Padin, Pedro Comesaña. 205-210 [doi]
- Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chainsPedro Comesana. 211-216 [doi]
- Watermarking method with exact self-propagating restoration capabilitiesSergio Bravo-Solorio, C. T. Li, Asoke K. Nandi. 217-222 [doi]
- Capacity control of reversible watermarking by two-thresholds embeddingIon Caciula, Dinu Coltuc. 223-227 [doi]
- How to find relevant training data: A paired bootstrapping approach to blind steganalysisPham Hai Dang Le, Matthias O. Franz. 228-233 [doi]
- Designing steganographic distortion using directional filtersVojtech Holub, Jessica J. Fridrich. 234-239 [doi]
- Dynamic traitor tracing for arbitrary alphabets: Divide and conquerThijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen. 240-245 [doi]
- Low level crowd analysis using frame-wise normalized feature for people countingHajer Fradi, Jean-Luc Dugelay. 246-251 [doi]
- Identify computer generated characters by analysing facial expressions variationDuc-Tien Dang-Nguyen, Giulia Boato, Francesco G. B. De Natale. 252-257 [doi]
- Non-regenerative two-hop wiretap channels using interference neutralizationSabrina Gerbracht, Eduard A. Jorswieck, Gan Zheng, Björn E. Ottersten. 258-263 [doi]
- End-to-end secure connection in heterogeneous networks for critical scenariosRomeo Giuliano, Alessandro Neri, Damiano Valletta. 264-269 [doi]
- Comparison of different attack classes in arbitrarily varying wiretap channelsHolger Boche, Rafael F. Wyrembelski. 270-275 [doi]
- Optimality of beamforming for secrecy capacity of MIMO wiretap channelsJiangyuan Li, Athina P. Petropulu. 276-281 [doi]
- Destination assisted cooperative jamming for wireless physical layer securityYupeng Liu, Athina P. Petropulu. 282-287 [doi]