default search action
IEEE Transactions on Information Forensics and Security, Volume 7
Volume 7, Number 1, Part 1, February 2012
- Miodrag Potkonjak, Ramesh Karri, Ingrid Verbauwhede, Kouichi Itoh:
Guest Editorial Integrated Circuit and System Security. 1-2 - Naofumi Homma, Kazuya Saito, Takafumi Aoki:
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits. 3-13 - William E. Cobb, Eric D. Laspe, Rusty O. Baldwin, Michael A. Temple, Yong C. Kim:
Intrinsic Physical-Layer Authentication of Integrated Circuits. 14-24 - Eric Love, Yier Jin, Yiorgos Makris:
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition. 25-40 - Chong Hee Kim:
Improved Differential Fault Analysis on AES Key Schedule. 41-50 - Farinaz Koushanfar:
Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management. 51-63 - Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman, Ira S. Moskowitz, Myong H. Kang:
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. 64-75 - Hassan Salmani, Mohammad Tehranipoor:
Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection. 76-87 - Yang Li, Kazuo Ohta, Kazuo Sakiyama:
New Fault-Based Side-Channel Attack Using Fault Sensitivity. 88-97 - Roel Maes, Dries Schellekens, Ingrid Verbauwhede:
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs. 98-108 - Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:
Information-Theoretic Approach to Optimal Differential Fault Analysis. 109-120
Volume 7, Number 1, Part 2, February 2012
- Pedro C. Pinto, João Barros, Moe Z. Win:
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity. 125-138 - Pedro C. Pinto, João Barros, Moe Z. Win:
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion. 139-147 - Hung D. Ly, Tie Liu, Yufei W. Blankenship:
Security Embedding Codes. 148-159 - Yen-Wei Huang, Pierre Moulin:
On the Saddle-Point Solution and the Large-Coalition Asymptotics of Fingerprinting Games. 160-175 - Wien Hong, Tung-Shou Chen:
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. 176-184 - Hongjie He, Fan Chen, Heng-Ming Tai, Ton Kalker, Jiashu Zhang:
Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. 185-196 - Sian-Jheng Lin, Wei-Ho Chung:
A Probabilistic Model of $(t, n)$ Visual Cryptography Scheme With Dynamic Group. 197-207 - Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise. 208-218 - Kai-Hui Lee, Pei-Ling Chiu:
An Extended Visual Cryptography Algorithm for General Access Structures. 219-229 - Amol D. Rahulkar, Raghunath S. Holambe:
Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n: A Postclassifier. 230-240 - Anindya Roy, Mathew Magimai-Doss, Sébastien Marcel:
A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers. 241-254 - Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
Multibiometric Cryptosystems Based on Feature-Level Fusion. 255-268 - Enrique Argones-Rúa, Emanuele Maiorana, José Luis Alba-Castro, Patrizio Campisi:
Biometric Template Protection Using Universal Background Models: An Application to Online Signature. 269-282 - Valentina Conotter, James F. O'Brien, Hany Farid:
Exposing Digital Forgeries in Ballistic Motion. 283-296 - Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. 297-309 - Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han, Bingli Jiao:
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks. 310-320 - Arun K. Kanuparthi, Mohamed Zahran, Ramesh Karri:
Architecture Support for Dynamic Integrity Checking. 321-332 - Abhranil Maiti, Inyoung Kim, Patrick Schaumont:
A Robust Physical Unclonable Function With Enhanced Challenge-Response Set. 333-345 - Chao Wang, Weiming Zhang, Jiufen Liu, Nenghai Yu:
Fast Matrix Embedding by Matrix Extending. 346-350
Volume 7, Number 2, April 2012
- C.-C. Jay Kuo:
Editorial. 357-358 - Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe:
Secure Communication Over Parallel Relay Channel. 359-371 - Mitsugu Iwamoto:
A Weak Security Notion for Visual Secret Sharing Schemes. 372-382 - Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, Shui Yu:
A Dual-Channel Time-Spread Echo Method for Audio Watermarking. 383-392 - Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise. 393-402 - Minoru Kuribayashi:
Interference Removal Operation for Spread Spectrum Fingerprinting Scheme. 403-417 - Hafiz Malik, K. P. Subbalakshmi, Ramamurti Chandramouli:
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy. 418-431 - Jan Kodovský, Jessica J. Fridrich, Vojtech Holub:
Ensemble Classifiers for Steganalysis of Digital Media. 432-444 - Tomás Pevný, Jessica J. Fridrich, Andrew D. Ker:
From Blind to Quantitative Steganalysis. 445-454 - Tamer Shanableh:
Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering. 455-464 - Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang:
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries. 465-479 - Lifeng Lai, Yingbin Liang, H. Vincent Poor:
A Unified Framework for Key Agreement Over Wireless Fading Channels. 480-490 - Fabio Pareschi, Riccardo Rovatti, Gianluca Setti:
On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution. 491-505 - Xiaozheng Zhang, Yongsheng Gao:
Heterogeneous Specular and Diffuse 3-D Surface Approximation for Face Recognition Across Pose. 506-517 - Aglika Gyaourova, Arun Ross:
Index Codes for Multibiometric Pattern Retrieval. 518-529 - Alexandros Iosifidis, Anastasios Tefas, Ioannis Pitas:
Activity-Based Person Identification Using Fuzzy Representation and Discriminant Learning. 530-542 - Darko S. Matovski, Mark S. Nixon, Sasan Mahmoodi, John N. Carter:
The Effect of Time on Gait Recognition Performance. 543-552 - Roy Wallace, Mitchell McLaren, Christopher McCool, Sébastien Marcel:
Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models. 553-562 - Jingu Heo, Marios Savvides:
3-D Generic Elastic Models for Fast and Texture Preserving 2-D Novel Pose Synthesis. 563-576 - Tolga Inan, Ugur Halici:
3-D Face Recognition With Local Shape Descriptors. 577-587 - Karen Hollingsworth, Shelby Solomon Darnell, Philip E. Miller, Damon L. Woodard, Kevin W. Bowyer, Patrick J. Flynn:
Human and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light. 588-601 - Chi-Ho Chan, Budhaditya Goswami, Josef Kittler, William J. Christmas:
Local Ordinal Contrast Pattern Histograms for Spatiotemporal, Lip-Based Speaker Authentication. 602-612 - Yi Cheng Feng, Pong Chi Yuen:
Binary Discriminant Analysis for Generating Binary Face Template. 613-624 - Cemal Hanilçi, Figen Ertas, Tuncay Ertas, Ömer Eskidere:
Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals. 625-634 - Slim Rekhis, Noureddine Boudriga:
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks. 635-650 - Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin:
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. 651-663 - Qinghua Li, Guohong Cao:
Mitigating Routing Misbehavior in Disruption Tolerant Networks. 664-675 - Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee:
A Large-Scale Empirical Study of Conficker. 676-690 - Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. 691-703 - Sabrina Gerbracht, Christian Scheunert, Eduard A. Jorswieck:
Secrecy Outage in MISO Systems With Partial Channel Information. 704-716 - Ravi Garg, Avinash L. Varna, Min Wu:
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks. 717-730 - Zhenghao Zhang:
A New Bound on the Performance of the Bandwidth Puzzle. 731-742 - Zhiguo Wan, Jun-e Liu, Robert H. Deng:
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. 743-754 - Radu Sion, Yao Chen:
Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances. 755-764 - Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar, Miodrag Potkonjak:
Gate Characterization Using Singular Value Decomposition: Foundations and Applications. 765-773 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:
Image Phylogeny by Minimal Spanning Trees. 774-788 - Ming-Hour Yang, Ming-Chien Yang:
RIHT: A Novel Hybrid IP Traceback Scheme. 789-797 - Hugo Proença, Luís A. Alexandre:
Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests. 798-808 - Rajesh Kumar, Nikhil R. Pal, Bhabatosh Chanda, J. D. Sharma:
Forensic Detection of Fraudulent Alteration in Ball-Point Pen Strokes. 809-820 - Jian Cao, Jiwu Huang:
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. 821-826 - Xinpeng Zhang:
Separable Reversible Data Hiding in Encrypted Image. 826-832 - Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys:
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems. 833-841 - Tiziano Bianchi, Alessandro Piva:
Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps. 842-848
Volume 7, Number 3, June 2012
- Chuntao Wang, Jiangqun Ni, Jiwu Huang:
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. 853-867 - Jessica J. Fridrich, Jan Kodovský:
Rich Models for Steganalysis of Digital Images. 868-882 - Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis. 883-894 - Rajendra S. Katti, Aida Vosoughi:
On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability. 895-903 - Qijun Zhao, Anil K. Jain:
Model Based Separation of Overlapping Latent Fingerprints. 904-918 - Ryan Connaughton, Amanda Sgroi, Kevin W. Bowyer, Patrick J. Flynn:
A Multialgorithm Analysis of Three Iris Biometric Sensors. 919-931 - Sri-Kaushik Pavani, Federico Sukno, David Delgado-Gómez, Constantine Butakoff, Xavier Planes, Alejandro F. Frangi:
An Experimental Evaluation of Three Classifiers for Use in Self-Updating Face Recognition Systems. 932-943 - Jiwen Lu, Xiuzhuang Zhou, Yap-Peng Tan, Yuanyuan Shang, Jie Zhou:
Cost-Sensitive Semi-Supervised Discriminant Analysis for Face Recognition. 944-953 - Vishal M. Patel, Tao Wu, Soma Biswas, P. Jonathon Phillips, Rama Chellappa:
Dictionary-Based Face Recognition Under Variable Lighting and Pose. 954-965 - Miguel A. Ferrer, Jesús Francisco Vargas-Bonilla, Aythami Morales, Aarón Ordonez:
Robustness of Offline Signature Verification Based on Gray Level Features. 966-977 - Jindan Zhou, Steven Cadavid, Mohamed Abdel-Mottaleb:
An Efficient 3-D Ear Recognition System Employing Local and Holistic Features. 978-991 - Hong Cao, Alex C. Kot:
Manipulation Detection on Image Patches Using FusionBoost. 992-1002 - Tiziano Bianchi, Alessandro Piva:
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts. 1003-1017 - Pravin Kakar, N. Sudha:
Exposing Postprocessed Copy-Paste Forgeries Through Transform-Invariant Features. 1018-1028 - Pravin Kakar, N. Sudha:
Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation. 1029-1039 - Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks. 1040-1052 - Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. 1053-1066 - Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner:
On the Complexity of Generating Gate Level Information Flow Tracking Logic. 1067-1080 - Xudong Lv, Z. Jane Wang:
Perceptual Image Hashing Based on Shape Contexts and Local Feature Points. 1081-1093 - Zhenhua Guo, David Zhang, Lei Zhang, Wenhuang Liu:
Feature Band Selection for Online Multispectral Palmprint Recognition. 1094-1099
Volume 7, Number 4, August 2012
- Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, Giovanni Puglisi:
Robust Image Alignment for Tampering Detection. 1105-1117 - Reza Soosahabi, Mort Naraghi-Pour:
Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks. 1118-1126 - Amir Valizadeh, Z. Jane Wang:
An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding. 1127-1143 - Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne P. Burleson:
Detecting Software Theft in Embedded Systems: A Side-Channel Approach. 1144-1154 - Sian-Jheng Lin, Wei-Ho Chung:
The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions. 1155-1167 - Peter Meerwald, Teddy Furon:
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes. 1168-1180 - Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Channel Selection Rule for JPEG Steganography. 1181-1191 - Somnath Dey, Debasis Samanta:
Iris Data Indexing Method Using Gabor Energy Features. 1192-1203 - Matteo Ferrara, Annalisa Franco, Dario Maio, Davide Maltoni:
Face Image Conformance to ISO/ICAO Standards in Machine Readable Travel Documents. 1204-1213 - Walter J. Scheirer, Anderson de Rezende Rocha, Jonathan Parris, Terrance E. Boult:
Learning for Meta-Recognition. 1214-1224 - Emile J. C. Kelkboom, Jeroen Breebaart, Ileana Buhan, Raymond N. J. Veldhuis:
Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. 1225-1241 - Meng-Hui Lim, Andrew Beng Jin Teoh:
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding. 1242-1254 - Keshav Seshadri, Marios Savvides:
An Analysis of the Sensitivity of Active Shape Models to Initialization When Applied to Automatic Facial Landmarking. 1255-1269 - Amin Merati, Norman Poh, Josef Kittler:
User-Specific Cohort Selection and Score Normalization for Biometric Systems. 1270-1277 - Masoud Ghoreishi Madiseh, Stephen W. Neville, Michael L. McGuire:
Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation. 1278-1287 - Zhe Yao, Philip Mark, Michael G. Rabbat:
Anomaly Detection Using Proximity Graph and PageRank Algorithm. 1288-1300 - Huazhu Fu, Xiaochun Cao:
Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map. 1301-1314 - Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:
Temporal Forensics and Anti-Forensics for Motion Compensated Video. 1315-1329 - Ode Ojowu, Johan Karlsson, Jian Li, Yilu Liu:
ENF Extraction From Digital Recordings Using Adaptive Techniques and Frequency Tracking. 1330-1338 - Ryan M. Gerdes, Mani Mina, Steve Russell, Thomas E. Daniels:
Physical-Layer Identification of Wired Ethernet Devices. 1339-1353 - Francesco Renna, Nicola Laurenti, H. Vincent Poor:
Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels. 1354-1367 - Liang Xiao, Yan Chen, W. Sabrina Lin, K. J. Ray Liu:
Indirect Reciprocity Security Game for Large-Scale Wireless Networks. 1368-1380 - Shui Yu, Guofeng Zhao, Wanchun Dou, Simon James:
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks. 1381-1393 - Lang Lin, Sudheendra Srivathsa, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne P. Burleson:
Design and Validation of Arbiter-Based PUFs for Sub-45-nm Low-Power Security Applications. 1394-1403 - Sevinç Bayram, Hüsrev T. Sencar, Nasir D. Memon:
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization. 1404-1413 - Won Taek Song, Jinho Choi, Jeongseok Ha:
Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II. 1414-1418
Volume 7, Number 5, October 2012
- Mari Ostendorf:
A Message from the Vice President of Publications on New Developments in Signal Processing Society Publications. 1425 - Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android. 1426-1438 - Fu-Hau Hsu, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, Chieh-Wen Chen:
Antivirus Software Shield Against Antivirus Terminators. 1439-1447 - Shan-Chun Liu, Wen-Hsiang Tsai:
Line-Based Cubism-Like Image - A New Type of Art Image and its Application to Lossless Data Hiding. 1448-1458 - Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo:
Spectral Watermarking for Parameterized Surfaces. 1459-1471 - Onur Ozan Koyluoglu, Hesham El Gamal:
Polar Coding for Secure Transmission and Key Agreement. 1472-1483 - Yanpei Liu, Stark C. Draper, Akbar M. Sayeed:
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness. 1484-1497 - Jianjiang Feng, Yuan Shi, Jie Zhou:
Robust and Efficient Algorithms for Separating Latent Overlapped Fingerprints. 1498-1510 - Haruyuki Iwama, Mayu Okumura, Yasushi Makihara, Yasushi Yagi:
The OU-ISIR Gait Database Comprising the Large Population Dataset and Performance Evaluation of Gait Recognition. 1511-1521 - Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa:
Memetically Optimized MCWLD for Matching Sketches With Digital Face Images. 1522-1535 - Nisha Srinivas, Gaurav Aggarwal, Patrick J. Flynn, Richard W. Vorder Bruegge:
Analysis of Facial Marks to Distinguish Between Identical Twins. 1536-1550 - Di Huang, Mohsen Ardabilian, Yunhong Wang, Liming Chen:
3-D Face Recognition Using eLBP-Based Facial Description and Local Feature Hybrid Matching. 1551-1565 - Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva:
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts. 1566-1577 - Ligang Zheng, Yanqiang Lei, Guoping Qiu, Jiwu Huang:
Near-Duplicate Image Detection in a Visually Salient Riemannian Space. 1578-1593 - Chih-Yi Chiu, Sheng-Yang Li, Cheng-Yu Hsieh:
Video Query Reformulation for Near-Duplicate Detection. 1594-1603 - Yahya S. Khiabani, Shuangqing Wei, Jian Yuan, Jian Wang:
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise. 1604-1613 - Qian Wang, Zesheng Chen, Chao Chen:
On the Characteristics of the Worm Infection Family Tree. 1614-1627 - Bogdan Carbunar, Yao Chen, Radu Sion:
Tipping Pennies? Privately Practical Anonymous Micropayments. 1628-1637 - Chao Yang, Yimin Song, Guofei Gu:
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. 1638-1651 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding. 1652-1667
Volume 7, Number 6, December 2012
- Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Juan Hernández-Serrano, Oscar Esparza, Juanjo Alins:
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces. 1673-1686 - Xiaofeng Chen, Jin Li, Willy Susilo:
Efficient Fair Conditional Payments for Outsourcing Computations. 1687-1694 - Michel Abdalla, Angelo De Caro, Duong Hieu Phan:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. 1695-1706 - Zhen Lei, Shengcai Liao, Anil K. Jain, Stan Z. Li:
Coupled Discriminant Analysis for Heterogeneous Face Recognition. 1707-1716 - Francesco Nicolo, Natalia A. Schmid:
Long Range Cross-Spectral Face Recognition: Matching SWIR Against Visible Light Images. 1717-1726 - Matteo Ferrara, Davide Maltoni, Raffaele Cappelli:
Noninvertible Minutia Cylinder-Code Representation. 1727-1737 - Meng Yang, Lei Zhang, Simon Chi-Keung Shiu, David Zhang:
Monogenic Binary Coding: An Efficient Local Feature Extraction Approach to Face Recognition. 1738-1751 - Abhishek Nagar, Heeseung Choi, Anil K. Jain:
Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach. 1752-1765 - Lahoucine Ballihi, Boulbaba Ben Amor, Mohamed Daoudi, Anuj Srivastava, Driss Aboutajdine:
Boosting 3-D-Geometric Features for Efficient Face Recognition and Gender Classification. 1766-1779 - Tao Wu, Pavan K. Turaga, Rama Chellappa:
Age Estimation and Face Verification Across Aging Using Landmarks. 1780-1788 - Brendan Klare, Mark James Burge, Joshua C. Klontz, Richard W. Vorder Bruegge, Anil K. Jain:
Face Recognition Performance: Role of Demographic Information. 1789-1801 - Sung-Uk Jung, Mark S. Nixon:
On Using Gait to Enhance Frontal Face Extraction. 1802-1811 - Ikenna Odinaka, Po-Hsiang Lai, Alan David Kaplan, Joseph A. O'Sullivan, Erik J. Sirevaag, John W. Rohrbaugh:
ECG Biometric Recognition: A Comparative Analysis. 1812-1824 - Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar:
A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems. 1825-1840 - Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou:
An Evaluation of Popular Copy-Move Forgery Detection Approaches. 1841-1854 - Raef Bassily, Sennur Ulukus:
Deaf Cooperation for Secrecy With Multiple Antennas at the Helper. 1855-1864 - Yongfeng Huang, Chenghao Liu, Shanyu Tang, Sen Bai:
Steganography Integration Into a Low-Bit Rate Speech Codec. 1865-1875 - Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose:
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches. 1876-1889 - Paulo F. Oliveira, Luísa Lima, Tiago T. V. Vinhoza, João Barros, Muriel Médard:
Coding for Trusted Storage in Untrusted Networks. 1890-1899 - Chester Rebeiro, Debdeep Mukhopadhyay:
Boosting Profiled Cache Timing Attacks With A Priori Analysis. 1900-1905 - Sheng Li, Alex C. Kot:
An Improved Scheme for Full Fingerprint Reconstruction. 1906-1912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.