Abstract is missing.
- Separate MAP adaptation of GMM parameters for forensic voice comparison on limited dataChee Cheun Huang, Julien Epps, Ewald Enzinger. 1-6 [doi]
- Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrievalXuran Zhao, Nicholas Evans, Jean-Luc Dugelay. 7-12 [doi]
- Testing the validity and reliability of forensic voice comparison based on reassigned time-frequency representations of Chinese /iau/Ewald Enzinger. 13-18 [doi]
- Restoring blood vessel patterns from JPEG compressed skin images for forensic analysisXiaojie Li, Adams Wai-Kin Kong. 19-24 [doi]
- Robust visual tracking using local salient coding and PCA subspace modelingDajun Lin, Huicheng Zheng, Donghong Ma. 25-30 [doi]
- ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authenticationRuggero Donida Labati, Roberto Sassi, Fabio Scotti. 31-36 [doi]
- A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verificationAjita Rattani, Norman Poh, Arun Ross. 37-42 [doi]
- De-duplication errors in a biometric system: An investigative studyBrian DeCann, Arun Ross. 43-48 [doi]
- Hashing fingerprints for identity de-duplicationYi Wang, Pong C. Yuen, Yiu-ming Cheung. 49-54 [doi]
- Secure Evaluation of Private Functions through Piecewise Linear ApproximationRiccardo Lazzeretti, Tommaso Pignata, Mauro Barni. 55-60 [doi]
- Privacy-preserving recommender systems in dynamic environmentsZekeriya Erkin, Thijs Veugen, Reginald L. Lagendijk. 61-66 [doi]
- Integrated secure watermark detection and privacy preserving storage in the compressive sensing domainQia Wang, Wenjun Zeng, Jun Tian. 67-72 [doi]
- Fast and secure similarity search in high dimensional spaceTeddy Furon, Herve Jegou, Laurent Amsaleg, Benjamin Mathon. 73-78 [doi]
- Building a privacy-preserving semantic overlay for Peer-to-Peer networksNiels Zeilemaker, Zekeriya Erkin, Paolo Palmieri, Johan A. Pouwelse. 79-84 [doi]
- The perils of cross-silo deduplication: Trading user security for provider storage efficiencyEric Rozier. 85-90 [doi]
- Multiple-observation hypothesis testing under adversarial conditionsMauro Barni, Benedetta Tondi. 91-96 [doi]
- The flow fingerprinting gameJuan A. Elices, Fernando Pérez-González. 97-102 [doi]
- Attacking image classification based on bag-of-visual-wordsA. Melloni, Paolo Bestagini, Andrea Costanzo, Mauro Barni, Marco Tagliasacchi, Stefano Tubaro. 103-108 [doi]
- Shot-based temporally respective frame generation algorithm for video hashingXiaocui Liu, Jiande Sun, Ju Liu, Jiande Sun, Ju Liu. 109-114 [doi]
- Towards a realistic channel model for security analysis of authentication using graphical codesCléo Baras, François Cayre. 115-119 [doi]
- The watchful forensic analyst: Multi-clue information fusion with background knowledgeMarco Fontani, Enrique Argones-Rúa, Carmela Troncoso, Mauro Barni. 120-125 [doi]
- Feature-based classification for audio bootlegs detectionPaolo Bestagini, Massimiliano Zanoni, L. Albonico, A. Paganini, Augusto Sarti, Stefano Tubaro. 126-131 [doi]
- Exploring color information to characterize camcorder piracyJuan Jose Moreira-Perez, Bertrand Chupeau, Gwenaël J. Doërr, Séverine Baudry. 132-137 [doi]
- ENF based location classification of sensor recordingsAdi Hajj-Ahmad, Ravi Garg, Min Wu 0001. 138-143 [doi]
- Splicing detection in out-of-focus blurred imagesKhosro Bahrami, Alex C. Kot, Jiayuan Fan. 144-149 [doi]
- Set-membership identification of resampled signalsDavid Vazquez-Padin, Pedro Comesaña, Fernando Pérez-González. 150-155 [doi]
- Joint detection of full-frame linear filtering and JPEG compression in digital imagesValentina Conotter, Pedro Comesaña, Fernando Pérez-González. 156-161 [doi]
- Forensically determining the order of signal processing operationsMatthew C. Stamm, Xiaoyu Chu, K. J. Ray Liu. 162-167 [doi]
- Near optimal detection of quantized signals and application to JPEG forensicsTiziano Bianchi, Alessandro Piva, Fernando Pérez-González. 168-173 [doi]
- Optimum perfect steganography of memoryless sources as a rate-distortion problemFélix Balado, David Haughton. 174-179 [doi]
- The holey grail A special score function for non-binary traitor tracingBoris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen. 180-185 [doi]
- Correlation-and-bit-aware multiplicative spread spectrum embedding for data hidingXiaoqiang Zhang, Z. Jane Wang. 186-190 [doi]
- Dynamic traitor tracing schemes, revisitedThijs Laarhoven. 191-196 [doi]
- Towards transferable watermarks in buyer-seller watermarking protocolsBjörn Terelius. 197-202 [doi]
- A GA optimization approach to HS based multiple reversible data hidingJunxiang Wang, Jiangqun Ni. 203-208 [doi]