default search action
12th WIFS 2020: New York City, NY, USA
- 12th IEEE International Workshop on Information Forensics and Security, WIFS 2020, New York City, NY, USA, December 6-11, 2020. IEEE 2020, ISBN 978-1-7281-9930-6
- Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, Christoph Busch:
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection. 1-6 - Lázaro Janier González-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas W. D. Evans:
Texture-based Presentation Attack Detection for Automatic Speaker Verification. 1-6 - Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures. 1-6 - Quentin Giboulot, Patrick Bas, Rémi Cogranne:
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography. 1-6 - Tamio-Vesa Nakajima, Andrew D. Ker:
The Syndrome-Trellis Sampler for Generative Steganography. 1-6 - Juan E. Tapia, Marta Gomez-Barrero, Christoph Busch:
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris. 1-6 - Liangping Ma, John Kaewell:
Fast Monte Carlo Dropout and Error Correction for Radio Transmitter Classification. 1-5 - Behrooz Razeghi, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy:
On Perfect Obfuscation: Local Information Geometry Analysis. 1-6 - Matthias Börsig, Sven Nitzsche, Max Eisele, Roland Gröll, Jürgen Becker, Ingmar Baumgart:
Fuzzing Framework for ESP32 Microcontrollers. 1-6 - Jin Keong, Xingbo Dong, Zhe Jin, Khawla Mallat, Jean-Luc Dugelay:
Multi-spectral Facial Landmark Detection. 1-6 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González:
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation. 1-6 - Kaizaburo Chubachi:
An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis. 1-6 - Benedikt Lorch, Anatol Maier, Christian Riess:
Reliable JPEG Forensics via Model Uncertainty. 1-6 - T. Scott Brandes, Scott Kuzdeba, Jessee McClelland, Neil Bomberger, Andrew Radlbeck:
RF Waveform Synthesis Guided by Deep Reinforcement Learning. 1-6 - Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space. 1-6 - Rémi Cogranne, Quentin Giboulot, Patrick Bas:
ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images. 1-5 - Yassine Yousfi, Jan Butora, Eugene Khvedchenya, Jessica J. Fridrich:
ImageNet Pre-trained CNNs for JPEG Steganalysis. 1-6 - Andrey Garnaev, Wade Trappe, Narayan B. Mandayam, H. Vincent Poor:
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game. 1-6 - Pranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt, Richard J. Enbody:
The Suitability of RSA for Bulk Data Encryption. 1-6 - Davide Capoferri, Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro:
Speech Audio Splicing Detection and Localization Exploiting Reverberation Cues. 1-6 - Luca Bondi, Edoardo Daniele Cannas, Paolo Bestagini, Stefano Tubaro:
Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection. 1-6 - Clément Gaine, Driss Aboulkassimi, Simon Pontié, Jean-Pierre Nikolovski, Jean-Max Dutertre:
Electromagnetic Fault Injection as a New Forensic Approach for SoCs. 1-6 - Sara Mandelli, Nicolò Bonettini, Paolo Bestagini, Stefano Tubaro:
Training CNNs in Presence of JPEG Compression: Multimedia Forensics vs Computer Vision. 1-6 - Shruti Agarwal, Hany Farid, Tarek El-Gaaly, Ser-Nam Lim:
Detecting Deep-Fake Videos from Appearance and Behavior. 1-6 - Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. 1-6 - Sneha Sudhakaran, Aisha I. Ali-Gombe, Augustine Orgah, Andrew Case, Golden G. Richard III:
AmpleDroid Recovering Large Object Files from Android Application Memory. 1-6 - Tetsuro Ishizuka, Yodai Watanabe:
Threshold audio secret sharing schemes encrypting audio secrets. 1-5 - Shan Jin, Riccardo Bettati:
Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks. 1-6 - Daniel Mas Montserrat, János Horváth, Sri Kalyan Yarlagadda, Fengqing Zhu, Edward J. Delp:
Generative Autoregressive Ensembles for Satellite Imagery Manipulation Detection. 1-6 - Pu Sun, Yuezun Li, Honggang Qi, Siwei Lyu:
Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction. 1-6 - Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.