default search action
IEEE Transactions on Information Forensics and Security, Volume 1
Volume 1, Number 1, March 2006
- Petar S. Aleksic, Aggelos K. Katsaggelos:
Automatic facial expression recognition using facial animation parameters and multistream HMMs. 3-11 - Sotiris Malassiotis, Niki Aifanti, Michael G. Strintzis:
Personal authentication using 3-D finger geometry. 12-21 - Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto:
A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification. 22-34 - Charles G. Boncelet Jr.:
The NTMAC for authentication of noisy messages. 35-42 - Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Analysis and design of secure watermark-based authentication systems. 43-55 - Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo:
Approximate Message Authentication Codes for N-ary Alphabets. 56-67 - Vishal Monga, Arindam Banerjee, Brian L. Evans:
A clustering based approach to perceptual image hashing. 68-79 - Luis Pérez-Freire, Fernando Pérez-González, Sviatoslav Voloshynovskiy:
An accurate analysis of scalar quantization-based data hiding. 80-86 - Damien Delannay, Benoît Macq:
Watermarking relying on cover signal content to hide synchronization marks. 87-101 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Wet paper codes with improved embedding efficiency. 102-110 - Siwei Lyu, Hany Farid:
Steganalysis using higher-order image statistics. 111-119
Volume 1, Number 2, June 2006
- Anil K. Jain, Arun Ross, Sharath Pankanti:
Biometrics: a tool for information security. 125-143 - Daniel Schonberg, Darko Kirovski:
EyeCerts. 144-153 - Natalia A. Schmid, Manasi V. Ketkar, Harshinder Singh, Bojan Cukic:
Performance analysis of iris-based identification system at the matching score level. 154-168 - Xinjian Chen, Jie Tian, Xin Yang, Yangyang Zhang:
An algorithm for distorted fingerprint matching based on local triangle feature set. 169-177 - Eyad Haj-Said, Diaa Eldin M. Nassar, Gamal Fahmy, Hany H. Ammar:
Teeth segmentation in digitized dental X-ray films using mathematical morphology. 178-189 - Qing Li, Wade Trappe:
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. 190-204 - Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:
Digital camera identification from sensor pattern noise. 205-214 - Ashwin Swaminathan, Yinian Mao, Min Wu:
Robust and secure image hashing. 215-230 - Shan He, Min Wu:
Joint coding and embedding techniques for MultimediaFingerprinting. 231-247 - Hans Georg Schaathun:
The Boneh-Shaw fingerprinting scheme is better than we thought. 248-255 - Irene G. Karybali, Kostas Berberidis:
Efficient spatial image watermarking via new perceptual masking and blind detection schemes. 256-274 - Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath:
Steganalysis for Markov cover data with applications to images. 275-287
Volume 1, Number 3, September 2006
- Pierre Moulin, Anil Kumar Goteti:
Block QIM watermarking games. 293-310 - H. Vicky Zhao, K. J. Ray Liu:
Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. 311-329 - Wen-Nung Lie, Guo-Shiang Lin, Sheng-Lung Cheng:
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. 330-341 - E. P. Vivek, N. Sudha:
Gray Hausdorff distance measure for comparing face images. 342-349 - Sinjini Mitra, Marios Savvides, B. V. K. Vijaya Kumar:
Face identification using novel frequency-domain representation of facial asymmetry. 350-359 - Athos Antonelli, Raffaele Cappelli, Dario Maio, Davide Maltoni:
Fake finger detection by skin distortion analysis. 360-373 - Derek Justice, Alfred O. Hero III:
Estimation of message source and destination from network intercepts. 374-385 - Bin Yan, Zhe-Ming Lu, Sheng-He Sun:
Security of autoregressive speech watermarking model under guessing attack. 386-390 - Jessica J. Fridrich, David Soukal:
Matrix embedding for large payloads. 390-395 - Jean-Camille Birget, Dawei Hong, Nasir D. Memon:
Graphical passwords based on robust discretization. 395-399
Volume 1, Number 4, December 2006
- Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management. 405-420 - Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesaña:
Security of Lattice-Based Data Hiding Against the Known Message Attack. 421-439 - H. Vicky Zhao, K. J. Ray Liu:
Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. 440-456 - Arunan Ramalingam, Sridhar Krishnan:
Gaussian Mixture Modeling of Short-Time Fourier Transform Features for Audio Fingerprinting. 457-463 - Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran, Ibrahim El-Khalil:
'Print and Scan' Resilient Data Hiding in Images. 464-478 - Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mark F. Bocko:
A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection. 479-492 - Chin-Chen Chang, Chih-Yang Lin:
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. 493-501 - Udit Budhia, Deepa Kundur, Takis Zourntos:
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. 502-516 - Yu Liu, Charles G. Boncelet Jr.:
The CRC-NTMAC for Noisy Message Authentication. 517-523 - Adam L. Young, Moti Yung:
On Fundamental Limitations of Proving Data Theft. 524-531 - Xudong Jiang, Manhua Liu, Alex ChiChung Kot:
Fingerprint Retrieval for Identification. 532-542 - Soo-Chang Pei, Yi-Chong Zeng:
A Novel Image Recovery Algorithm for Visible Watermarked Images. 543-550
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.