Abstract is missing.
- Private data aggregation with groups for smart grids in a dynamic setting using CRTZekeriya Erkin. 1-6 [doi]
- Information-theoretical limits of active content fingerprinting in content-based identification systemsFarzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy. 1-6 [doi]
- Optimum reversible data hiding and permutation codingFélix Balado. 1-4 [doi]
- Reconstruction of smartphone images for low resolution iris recognitionFernando Alonso-Fernandez, Reuben A. Farrugia, Josef Bigün. 1-6 [doi]
- Detection and segmentation of latent fingerprintsXiao Yang, Jianjiang Feng, Jie Zhou, Shutao Xia. 1-6 [doi]
- A sequential method for online steganalysisRémi Cogranne. 1-6 [doi]
- Local Gabor Rank Pattern (LGRP): A novel descriptor for face representation and recognitionAbhishek Kumar Gangwar, Akanksha Joshi. 1-6 [doi]
- Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNSShuichiro Haruta, Kentaroh Toyoda, Iwao Sasase. 1-6 [doi]
- Robust PUF based authenticationAndrea Grigorescu, Holger Boche, Rafael F. Schaefer. 1-6 [doi]
- Key search and adaptation based on association rules for backward secrecyKannan Karthik. 1-6 [doi]
- Improved 3D lighting environment estimation for image forgery detectionBo Peng, Wei Wang, Jing Dong, Tieniu Tan. 1-6 [doi]
- Forensics of high-quality JPEG images with color subsamplingMatthias Carnein, Pascal Schöttle, Rainer Böhme. 1-6 [doi]
- A second look at first significant digit histogram restorationMatthias Kirchner, Sujoy Chakraborty. 1-6 [doi]
- Decision tree-based detection of denial of service and command injection attacks on robotic vehiclesTuan Phan Vuong, George Loukas, Diane Gan, Anatolij Bezemskij. 1-6 [doi]
- Multiscale anisotropic texture unsupervised clustering for photographic paperStéphane G. Roux, Nicolas Tremblay, Pierre Borgnat, Patrice Abry, Herwig Wendt, Paul Messier. 1-6 [doi]
- TRAP: Using Targeted ads to unveil Google personal profilesMauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi. 1-6 [doi]
- The influence of segmentation on individual gait recognitionNing Jia, Victor Sanchez, Chang-Tsun Li, Hassan Mansour. 1-6 [doi]
- Full-duplex vs. half-duplex secret-key generationHendrik Vogt, Aydin Sezgin. 1-6 [doi]
- Practicability study of android volatile memory forensic researchPhilipp Wachter, Michael Gruhn. 1-6 [doi]
- Single relay selection for secure communication in a cooperative system with multiple full-duplex decode-and-forward relaysBinh Van Nguyen, Kiseon Kim. 1-6 [doi]
- Reliable secret key generation from physical unclonable functions under varying environmental conditionsOnur Gunlu, Onurcan Iscan, Gerhard Kramer. 1-6 [doi]
- On the effectiveness of meta-detection for countering oracle attacks in watermarkingBenedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni. 1-6 [doi]
- Rediscovering text in the Yale Martellus mapRoger L. Easton, Kevin Sacca, Gregory Heyworth, Kenneth Boydston, Chet Van Duzer, Michael Phelps. 1-6 [doi]
- Side-informed steganography with additive distortionTomás Denemark, Jessica J. Fridrich. 1-6 [doi]
- WristSnoop: Smartphone PINs prediction using smartwatch motion sensorsAllen Sarkisyan, Ryan Debbiny, Ani Nahapetian. 1-6 [doi]
- Fragile sensor fingerprint camera identificationErwin Quiring, Matthias Kirchner. 1-6 [doi]
- Counterfeit detection using paper PUF and mobile camerasChau-Wai Wong, Min Wu 0001. 1-6 [doi]
- General-purpose image forensics using patch likelihood under image statistical modelsWei Fan, Kai Wang, François Cayre. 1-6 [doi]
- Detection games with a fully active attackerBenedetta Tondi, Mauro Barni, Neri Merhav. 1-6 [doi]
- Improved edit detection in speech via ENF patternsPaulo A. A. Esquef, José Antonio Apolinário, Luiz W. P. Biscainho. 1-6 [doi]
- Optimizing pooling function for pooled steganalysisTomás Pevný, Ivan Nikolaev. 1-6 [doi]
- Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?Rémi Cogranne, Vahid Sedighi, Jessica J. Fridrich, Tomás Pevný. 1-6 [doi]
- Worst-case secrecy rates in MIMOME systems under input and state constraintsAnne Wolf, Eduard A. Jorswieck, Carsten Rudolf Janda. 1-6 [doi]
- Privacy, efficiency & fault tolerance in aggregate computations on massive star networksShantanu Rane, Julien Freudiger, Alejandro E. Brito, Ersin Uzun. 1-6 [doi]
- Multicasting with untrusted relays: A noncoherent secure network coding approachTa-Yuan Liu, Shih-Chun Lin, Yao-Win Peter Hong. 1-6 [doi]
- Which dataset is this iris image from?Susan El-Naggar, Arun Ross. 1-6 [doi]
- Update strategies for HMM-based dynamic signature biometric systemsRubén Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez. 1-6 [doi]
- A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherenceHasan Sheikh Faridul, Gwenaël J. Doërr. 1-6 [doi]
- Fast target link flooding attack detection scheme by analyzing traceroute packets flowTakayuki Hirayama, Kentaroh Toyoda, Iwao Sasase. 1-6 [doi]
- Splicebuster: A new blind image splicing detectorDavide Cozzolino, Giovanni Poggi, Luisa Verdoliva. 1-6 [doi]
- Generalised tally-based decoders for traitor tracing and group testingBoris Skoric, Wouter de Groot. 1-6 [doi]
- Image splicing detection based on general perspective constraintsMassimo Iuliani, Giovanni Fabbri, Alessandro Piva. 1-6 [doi]
- Automatic contrast enhancement using reversible data hidingSuah Kim, Rolf Lussi, Xiaochao Qu, Hyoung Joong Kim. 1-5 [doi]
- Binary fingerprinting codes - can we prove that someone is guilty?!Marcel Fernandez, Elena Egorova, Grigory Kabatiansky. 1-4 [doi]
- Some applications of verifiable computation to biometric verificationJulien Bringer, Hervé Chabanne, Firas Kraiem, Roch Lescuyer, Eduardo Soria-Vazquez. 1-6 [doi]
- Integrating rare minutiae in generic fingerprint matchers for forensicsRam P. Krish, Julian Fiérrez, Daniel Ramos. 1-6 [doi]
- Camera model identification framework using an ensemble of demosaicing featuresChen Chen, Matthew C. Stamm. 1-6 [doi]
- Identification of pictorial materials by means of optimized multispectral reflectance image processingLucilla Pronti, Pasquale Ferrara, Francesca Uccheddu, Anna Pelagotti, Alessandro Piva. 1-6 [doi]
- Detection of interest flooding attacks in Named Data Networking using hypothesis testingTan N. Nguyen, Rémi Cogranne, Guillaume Doyen, Florent Retraint. 1-6 [doi]
- VSig: Hand-gestured signature recognition and authentication with wearable cameraHasan Sajid, Sen-ching Samson Cheung. 1-6 [doi]
- Continuous authentication and identification for mobile devices: Combining security and forensicsSoumik Mondal, Patrick Bours. 1-6 [doi]
- Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometricsSantosh Tirunagari, Norman Poh, Miroslaw Bober, David Windridge. 1-6 [doi]
- Impact of incomplete knowledge on scanning strategyAndrey Garnaev, Wade Trappe. 1-6 [doi]
- Secure Modular HashingAbelino Jimenez, Bhiksha Raj, José Portelo, Isabel Trancoso. 1-6 [doi]