default search action
IEEE Transactions on Information Forensics and Security, Volume 8
Volume 8, Number 1, January 2013
- Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. 5-15 - Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:
User Authentication Through Mouse Dynamics. 16-30 - Alessandra A. Paulino, Jianjiang Feng, Anil K. Jain:
Latent Fingerprint Matching Using Descriptor-Based Hough Transform. 31-45 - Luís Filipe da Cruz Nassif, Eduardo R. Hruschka:
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. 46-54 - Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. 55-63 - Yazhuo Gong, David Zhang, Pengfei Shi, Jingqi Yan:
An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition. 64-75 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. 76-88 - Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa:
Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm. 89-100 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Heap Graph Based Software Theft Detection. 101-110 - Gouenou Coatrieux, Wei Pan, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. 111-120 - Stefanos Zafeiriou, Gary A. Atkinson, Mark F. Hansen, William A. P. Smith, Vasileios Argyriou, Maria Petrou, Melvyn L. Smith, Lyndon N. Smith:
Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation. 121-135 - Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. 136-148 - Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun:
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. 149-162 - Roberto Di Pietro, Gabriele Oligeri:
COKE Crypto-Less Over-the-Air Key Establishment. 163-173 - Neil J. Grabham, Matthew A. Swabey, Paul Chambers, Mark E. Lutman, Neil M. White, John E. Chad, Stephen P. Beeby:
An Evaluation of Otoacoustic Emissions as a Biometric. 174-183 - Ke Cui, Jian Wang, Hong-Fei Zhang, Chun-Li Luo, Ge Jin, Teng-Yun Chen:
A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System. 184-190 - Hu Han, Brendan Klare, Kathryn Bonnen, Anil K. Jain:
Matching Composite Sketches to Face Photos: A Component-Based Approach. 191-204 - Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour:
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes. 205-215 - Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. 216-228 - Hang Long, Wei Xiang, Yueying Zhang, Yuanan Liu, Wenbo Wang:
Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems. 229-238 - Kathryn Bonnen, Brendan Klare, Anil K. Jain:
Component-Based Representation in Automated Face Recognition. 239-253 - Nan (Jonas) Yang, Himal A. Suraweera, Iain B. Collings, Chau Yuen:
Physical Layer Security of TAS/MRC With Antenna Correlation. 254-259 - Asem A. Othman, Arun Ross:
On Mixing Fingerprints. 260-267
Volume 8, Number 2, February 2013
- Hong Zhao, Yun-Qing Shi:
Detecting Covert Channels in Computer Networks Based on Chaos Theory. 273-282 - Andrew Chi-Chih Yao, Yunlei Zhao:
Online/Offline Signatures for Low-Power Devices. 283-294 - Ngoc-Son Vu:
Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition. 295-304 - Qian Tao, Raymond N. J. Veldhuis:
Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics. 305-313 - Cristina Comaniciu, H. Vincent Poor:
On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels. 314-323 - Rafael F. Wyrembelski, Moritz Wiese, Holger Boche:
Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages. 324-334 - Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro:
Revealing the Traces of JPEG Compression Anti-Forensics. 335-349 - Sheng Li, Alex C. Kot:
Fingerprint Combination for Privacy Protection. 350-360 - Jessica J. Fridrich:
Effect of Cover Quantization on Steganographic Fisher Information. 361-373 - Stefano Berretti, Alberto Del Bimbo, Pietro Pala:
Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts. 374-389 - Robin Doss, Wanlei Zhou, Shui Yu:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. 390-401 - Larry A. Dunning, Ray Kresman:
Privacy Preserving Data Sharing With Anonymous ID Assignment. 402-413 - Shih-Chun Lin, Pin-Hsun Lin:
On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT. 414-419
Volume 8, Number 3, March 2013
- Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. 429-439 - Kun Xie, Wen Chen, Lili Wei:
Increasing Security Degree of Freedom in Multiuser and Multieve Systems. 440-449 - Mauro Barni, Benedetta Tondi:
The Source Identification Game: An Information-Theoretic Perspective. 450-463 - Rémi Cogranne, Florent Retraint:
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection. 464-476 - Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues:
A Timing Channel Spyware for the CSMA/CA Protocol. 477-487 - Juan E. Tapia, Claudio A. Perez:
Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of LBP, Intensity, and Shape. 488-499 - Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. 500-509 - Jiwen Lu, Yap-Peng Tan:
Cost-Sensitive Subspace Analysis and Extensions for Face Recognition. 510-519 - Deng Wang, Duoqian Miao, Gunnar Blohm:
A New Method for EEG-Based Concealed Information Test. 520-527 - Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. 528-541 - Xiaobei Liu, Soo Ngee Koh, Chee-Cheon Chui, Xin-Wen Wu:
A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder. 542-552 - Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li:
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. 553-562 - Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. 563-577 - Gökhan Gül, Fatih Kurugollu:
JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques. 578-587
Volume 8, Number 4, April 2013
- Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni:
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence. 593-607 - Jiayuan Fan, Hong Cao, Alex C. Kot:
Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection. 608-618 - Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. 619-625 - Quanxue Gao, Jingjing Liu, Hailin Zhang, Xinbo Gao, Kui Li:
Joint Global and Local Structure Discriminant Analysis. 626-635 - Shuangqing Wei, Jian Wang, Ruming Yin, Jian Yuan:
Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts. 636-645 - Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map. 646-656 - Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen:
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. 657-668 - Vivek Balachandran, Sabu Emmanuel:
Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code. 669-681 - Yupeng Liu, Jiangyuan Li, Athina P. Petropulu:
Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security. 682-694
Volume 8, Number 5, May 2013
- Mohammad Hashem Haghighat, Mehdi Tavakoli, Mehdi Kharrazi:
Payload Attribution via Character Dependent Multi-Bloom Filters. 705-716 - Siavash Bayat, Raymond H. Y. Louie, Zhu Han, Branka Vucetic, Yonghui Li:
Physical-Layer Security in Distributed Wireless Networks Using Matching Theory. 717-732 - Shyong Jian Shyu, Hung-Wei Jiang:
General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes. 733-743 - Dima Bykhovsky, Asaf Cohen:
Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model. 744-753 - Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. 754-768 - Feng Yue, Bin Li, Ming Yu, Jiaqiang Wang:
Hashing Based Fast Palmprint Identification for Large-Scale Databases. 769-778 - Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. 779-788 - Nese Alyüz, Berk Gökberk, Lale Akarun:
3-D Face Recognition Under Occlusion Using Masked Projection. 789-802 - Lin Ding, Jie Guan:
Related Key Chosen IV Attack on Grain-128a Stream Cipher. 803-809 - Alessandro Cilardo, Nicola Mazzocca:
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware. 810-820 - Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. 821-828
Volume 8, Number 6, June 2013
- Sen-ching Samson Cheung, Yan Sun, Karl Aberer, Jayant R. Haritsa, Bill G. Horne, Kai Hwang:
Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems. 835-837 - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:
Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. 838-852 - David Sánchez, Montserrat Batet, Alexandre Viejo:
Automatic General-Purpose Sanitization of Textual Documents. 853-862 - I-Ting Lien, Yu-Hsun Lin, Jyh-Ren Shieh, Ja-Ling Wu:
A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search. 863-873 - Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun:
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. 874-887 - Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. 888-900 - Agusti Solanas, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz:
Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health. 901-910 - Ivan Ivanov, Peter Vajda, Pavel Korshunov, Touradj Ebrahimi:
Comparative Study of Trust Modeling for Automatic Landmark Tagging. 911-923 - Xiaoyong Li, Feng Zhou, Junping Du:
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks. 924-935 - Yuhong Liu, Yan Sun, Siyuan Liu, Alex C. Kot:
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis. 936-948 - Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang:
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. 949-962 - Justin L. Rice, Vir V. Phoha, Philip Robinson:
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. 963-972 - Imad M. Abbadi, Anbang Ruan:
Towards Trustworthy Resource Scheduling in Clouds. 973-984 - Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang:
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. 985-997 - Arfika Nurhudatiana, Adams Wai-Kin Kong, Keyan Matinpour, Deborah Chon, Lisa Altieri, Siu-Yeung Cho, Noah Craft:
The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns. 998-1012 - Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu:
Fine-Grained Refinement on TPM-Based Protocol Applications. 1013-1026 - Earlence Fernandes, Bruno Crispo, Mauro Conti:
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. 1027-1037 - Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Impacts of Watermarking Security on Tardos-Based Fingerprinting. 1038-1050 - Jinyu Zuo, Natalia A. Schmid:
Adaptive Quality-Based Performance Prediction and Boosting for Iris Authentication: Methodology and Its Illustration. 1051-1060 - Muhammad Kamran, Muddassar Farooq:
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. 1061-1072
Volume 8, Number 7, July 2013
- Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Uncoordinated Cooperative Jamming for Secret Communications. 1081-1090 - Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. 1091-1100 - Juan Ramón Troncoso-Pastoriza, Daniel González-Jiménez, Fernando Pérez-González:
Fully Private Noninteractive Face Verification. 1101-1114 - Luis Cardoso, André F. S. Barbosa, Frutuoso G. M. Silva, António M. G. Pinheiro, Hugo Proença:
Iris Biometrics: Synthesis of Degraded Ocular Images. 1115-1125 - Meng-Hsi Chen, Shih-Chun Lin, Yao-Win Peter Hong, Xiangyun Zhou:
On Cooperative and Malicious Behaviors in Multirelay Fading Channels. 1126-1139 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols. 1140-1151 - Yahya Sowti Khiabani, Shuangqing Wei:
ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels. 1152-1161 - Sadaf Salehkalaibar, Mahtab Mirmohseni, Mohammad Reza Aref:
One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets. 1162-1172 - Ling Fu, Penn N. Markham, Richard W. Conners, Yilu Liu:
An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction. 1173-1181 - Tiago Jose de Carvalho, Christian Riess, Elli Angelopoulou, Hélio Pedrini, Anderson de Rezende Rocha:
Exposing Digital Image Forgeries by Illumination Color Classification. 1182-1194 - Ly-Minh-Duy Le, Kah Chan Teh, Kwok Hung Li:
Jamming Rejection Using FFH/MFSK ML Receiver Over Fading Channels With the Presence of Timing and Frequency Offsets. 1195-1200 - Ming Li, Michel Kulhandjian, Dimitrios A. Pados, Stella N. Batalama, Michael J. Medley:
Extracting Spread-Spectrum Hidden Data From Digital Media. 1201-1210 - Britton Quist, Michael A. Jensen:
Optimal Channel Estimation in Beamformed Systems for Common-Randomness-Based Secret Key Establishment. 1211-1220 - Gerson de Souza Faria, Hae Yong Kim:
Identification of Pressed Keys From Mechanical Vibrations. 1221-1229 - Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima:
Monitoring Integrity Using Limited Local Memory. 1230-1242 - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
Multiaccess Channel With Partially Cooperating Encoders and Security Constraints. 1243-1254
Volume 8, Number 8, August 2013
- Jiangyang Zhang, Rongjie Lai, C.-C. Jay Kuo:
Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation. 1261-1273 - Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann:
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. 1274-1279 - Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. 1280-1293 - Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. 1294-1305 - Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. 1306-1317 - Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. 1318-1330 - Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye:
A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior Modeling. 1331-1342 - Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng:
Attribute-Based Encryption With Verifiable Outsourced Decryption. 1343-1354 - Seung-Jin Ryu, Matthias Kirchner, Min-Jeong Lee, Heung-Kyu Lee:
Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. 1355-1370 - Sian-Jheng Lin, Wei-Ho Chung:
An Efficient (n, k) Information Dispersal Algorithm Based on Fermat Number Transforms. 1371-1383 - Yidong Li, Hong Shen:
On Identity Disclosure Control for Hypergraph-Based Data Publishing. 1384-1396 - Holger Boche, Rafael F. Schaefer:
Wiretap Channels With Side Information - Strong Secrecy Capacity and Optimal Transceiver Design. 1397-1408
Volume 8, Number 9, September 2013
- Ravi Garg, Avinash L. Varna, Adi Hajj-Ahmad, Min Wu:
"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing. 1417-1432 - Marina Blanton, Mehrdad Aliasgari:
Analysis of Reusability of Secure Sketches and Fuzzy Extractors. 1433-1445 - Feng Liu, David Zhang, Zhenhua Guo:
Distal-Interphalangeal-Crease-Based User Authentication System. 1446-1455 - Xiangui Kang, Matthew C. Stamm, Anjie Peng, K. J. Ray Liu:
Robust Median Filtering Forensics Using an Autoregressive Model. 1456-1468 - Satyanarayana Vuppala, Giuseppe Abreu:
Unicasting on the Secrecy Graph. 1469-1481 - Holger Boche, Rafael F. Schaefer:
Capacity Results and Super-Activation for Wiretap Channels With Active Wiretappers. 1482-1496 - Shraboni Jana, Kai Zeng, Wei Cheng, Prasant Mohapatra:
Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks. 1497-1507 - Hong Cao, Alex C. Kot:
On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding. 1508-1518 - Nicole Lang Beebe, Laurence A. Maddox, Lishu Liu, Minghe Sun:
Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification. 1519-1530 - Babak Mahdian, Radim Nedbal, Stanislav Saic:
Blind Verification of Digital Image Originality: A Statistical Approach. 1531-1540 - Xiaotian Wu, Wei Sun:
Generalized Random Grid and Its Applications in Visual Cryptography. 1541-1553
Volume 8, Number 10, October 2013
- Noboru Babaguchi, Andrea Cavallaro, Rama Chellappa, Frédéric Dufaux, Liang Wang:
Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy. 1559-1561 - Stefan Popa, Danny Crookes, Paul Miller:
Hardware Acceleration of Background Modeling in the Compressed Domain. 1562-1574 - Hang Su, Hua Yang, Shibao Zheng, Yawen Fan, Sha Wei:
The Large-Scale Crowd Behavior Perception Based on Spatio-Temporal Viscous Fluid Field. 1575-1589 - Yang Cong, Junsong Yuan, Yandong Tang:
Video Anomaly Search in Crowded Scenes via Spatio-Temporal Motion Context. 1590-1599 - Zhong Zhang, Chunheng Wang, Baihua Xiao, Wen Zhou, Shuang Liu:
Attribute Regularization Based Human Action Recognition. 1600-1609 - Nandita M. Nayak, Yingying Zhu, Amit K. Roy-Chowdhury:
Exploiting Spatio-Temporal Scene Structure for Wide-Area Activity Analysis in Unconstrained Environments. 1610-1619 - Giounona Tzanidou, Iffat Zafar, Eran A. Edirisinghe:
Carried Object Detection in Videos Using Color Information. 1620-1631 - Zhaoxiang Zhang, Yuhang Zhao, Yunhong Wang, Jianyun Liu, Zhenjun Yao, Jun Tang:
Transferring Training Instances for Convenient Cross-View Object Classification in Surveillance. 1632-1641 - Worapan Kusakunniran, Qiang Wu, Jian Zhang, Yi Ma, Hongdong Li:
A New View-Invariant Feature for Cross-View Gait Recognition. 1642-1653 - Xu Zhao, Xiong Li, Zhe Wu, Yun Fu, Yuncai Liu:
Multiple Subcategories Parts-Based Representation for One Sample Face Identification. 1654-1664 - Unsang Park, Hyun-Cheol Choi, Anil K. Jain, Seong-Whan Lee:
Face Tracking and Recognition at a Distance: A Coaxial and Concentric PTZ Camera System. 1665-1677 - Yansong (Jennifer) Ren, Lawrence O'Gorman, Les J. Wu, Fangzhe Chang, Thomas L. Wood, John R. Zhang:
Authenticating Lossy Surveillance Video. 1678-1687 - Fei Peng, Xiao-wen Zhu, Min Long:
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos. 1688-1699
Volume 8, Number 11, November 2013
- Mu Li, Vishal Monga:
Compact Video Fingerprinting via Structural Graphical Models. 1709-1721 - Sheng Wei, Ani Nahapetian, Miodrag Potkonjak:
Quantitative Intellectual Property Protection Using Physical-Level Characterization. 1722-1730 - Dajiang Chen, Zheng Qin, XuFei Mao, Panlong Yang, Zhiguang Qin, Ruijin Wang:
SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference. 1731-1745 - Hong Zhao, Hafiz Malik:
Audio Recording Location Identification Using Acoustic Environment Signature. 1746-1759 - Abdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai, Luc Vandendorpe:
Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT. 1760-1774 - Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. 1775-1789 - Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie:
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. 1790-1801 - Xi Zhang, Xiangyun Zhou, Matthew R. McKay:
Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks. 1802-1814 - Mohammad Reza Faghani, Uyen Trang Nguyen:
A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks. 1815-1826 - Hafiz Malik:
Acoustic Environment Identification and Its Applications to Audio Forensics. 1827-1837 - Xudong Lv, Z. Jane Wang:
Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. 1838-1849 - Xun Gong, Mavis Rodrigues, Negar Kiyavash:
Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors. 1850-1859 - Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET. 1860-1875 - Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne P. Burleson, Srinivas Devadas:
PUF Modeling Attacks on Simulated and Silicon Data. 1876-1891
Volume 8, Number 12, December 2013
- Po-Chyi Su, Yu-Chuan Chang, Ching-Yu Wu:
Geometrically Resilient Digital Image Watermarking by Using Interest Point Extraction and Extended Pilot Signals. 1897-1908 - Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou:
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE. 1909-1922 - Biao He, Xiangyun Zhou:
Secure On-Off Transmission Design With Channel Estimation Errors. 1923-1936 - Daniel Votipka, Timothy Vidas, Nicolas Christin:
Passe-Partout: A General Collection Methodology for Android Devices. 1937-1946 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. 1947-1960 - Peng Xu, Zhiguo Ding, Xuchu Dai:
Rate Regions for Multiple Access Channel With Conference and Secrecy Constraints. 1961-1974 - Hugo Proença:
Iris Biometrics: Indexing and Retrieving Heavily Degraded Data. 1975-1985 - Yoichi Tomioka, Yuya Ito, Hitoshi Kitazawa:
Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise. 1986-1995 - Vojtech Holub, Jessica J. Fridrich:
Random Projections of Residuals for Digital Image Steganalysis. 1996-2006 - Huiming Wang, Miao Luo, Qinye Yin, Xiang-Gen Xia:
Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks. 2007-2020 - Emiliano De Cristofaro, Claudio Soriente:
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). 2021-2033 - Maodi Hu, Yunhong Wang, Zhaoxiang Zhang, James J. Little, Di Huang:
View-Invariant Discriminative Projection for Multi-View Gait-Based Human Identification. 2034-2045 - Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation Under Multiple Keys. 2046-2058 - Daoshun Wang, Tao Song, Lin Dong, Ching-Nung Yang:
Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing. 2059-2072 - Wei-Hong Chuang, Ravi Garg, Min Wu:
Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis. 2073-2088 - Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, Y. Thomas Hou:
Proximity-Based Security Techniques for Mobile Users in Wireless Networks. 2089-2100 - David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Mark E. Oxley:
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios. 2101-2114 - Corey Holland, Oleg V. Komogortsev:
Complex Eye Movement Pattern Biometrics: The Effects of Environment and Stimulus. 2115-2126 - Thomas Plantard, Willy Susilo, Zhenfei Zhang:
Fully Homomorphic Encryption Using Hidden Ideal Lattice. 2127-2137 - Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. 2138-2153 - Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity. 2154-2163 - Yi-Lei Chen, Chiou-Ting Hsu:
Subspace Learning for Facial Age Estimation Via Pairwise Age Ranking. 2164-2176 - Hao-Gong Chou, Chun-Fu Chuang, Wen-June Wang, Jia-Chin Lin:
A Fuzzy-Model-Based Chaotic Synchronization and Its Implementation on a Secure Communication System. 2177-2185
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.