By Topic

Information Forensics and Security, IEEE Transactions on

Issue 7 • Date July 2013

Filter Results

Displaying Results 1 - 25 of 26
  • Front Cover

    Publication Year: 2013 , Page(s): C1
    Request Permissions | PDF file iconPDF (2141 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013 , Page(s): C2
    Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013 , Page(s): 1077 - 1078
    Request Permissions | PDF file iconPDF (173 KB)  
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013 , Page(s): 1079 - 1080
    Request Permissions | PDF file iconPDF (174 KB)  
    Freely Available from IEEE
  • Uncoordinated Cooperative Jamming for Secret Communications

    Publication Year: 2013 , Page(s): 1081 - 1090
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1989 KB) |  | HTML iconHTML  

    We consider a Gaussian wiretap channel model with a single-antenna source, destination and eavesdropper. The communication is assisted by multiple multiantenna helpers that transmit noise to confound the eavesdropper. First, we consider a nulling scheme, in which each helper independently transmits noise, designed to maximize the system secrecy rate while creating no interference to the destinatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification

    Publication Year: 2013 , Page(s): 1091 - 1100
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2395 KB) |  | HTML iconHTML  

    In this paper, based on two-dimensional difference- histogram modification, a novel reversible data hiding (RDH) scheme is proposed by using difference-pair-mapping (DPM). First, by considering each pixel-pair and its context, a sequence consisting of pairs of difference values is computed. Then, a two-dimensional difference-histogram is generated by counting the frequency of the resulting differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully Private Noninteractive Face Verification

    Publication Year: 2013 , Page(s): 1101 - 1114
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2255 KB) |  | HTML iconHTML  

    Face recognition is one of the foremost applications in computer vision, which often involves sensitive signals; privacy concerns have been raised lately and tackled by several recent privacy-preserving face recognition approaches. Those systems either take advantage of information derived from the database templates or require several interaction rounds between client and server, so they cannot a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris Biometrics: Synthesis of Degraded Ocular Images

    Publication Year: 2013 , Page(s): 1115 - 1125
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2446 KB) |  | HTML iconHTML  

    Iris recognition is a popular technique for recognizing humans. However, as is the case with most biometric traits, it is difficult to collect data that are suitable for use in experiments due to three factors: 1) the substantial amount of data that is required; 2) the time that is spent in the acquisition process; and 3) the security and privacy concerns of potential volunteers. This paper descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Cooperative and Malicious Behaviors in Multirelay Fading Channels

    Publication Year: 2013 , Page(s): 1126 - 1139
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3942 KB) |  | HTML iconHTML  

    Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols

    Publication Year: 2013 , Page(s): 1140 - 1151
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2809 KB) |  | HTML iconHTML  

    Privacy is faced with serious challenges in the ubiquitous computing world. In order to handle this problem, some researchers in recent years have focused on design and analysis of privacy-friendly ultralightweight authentication protocols. Although the majority of these schemes have been broken to a greater or lesser extent, most of these attacks are based on ad-hoc methods that are not extensibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels

    Publication Year: 2013 , Page(s): 1152 - 1161
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2186 KB) |  | HTML iconHTML  

    This paper focuses on the problem of sharing secret keys using Automatic Repeat reQuest (ARQ) protocol. We consider cases where forward and feedback channels are erasure channels for a legitimate receiver (Bob) and an eavesdropper (Eve). In prior works, the wiretap channel is modeled as statistically independent packet erasure channels for Bob and Eve. In this paper, we go beyond the state-of-the-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets

    Publication Year: 2013 , Page(s): 1162 - 1172
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (4847 KB) |  | HTML iconHTML  

    In this paper, we study the one-receiver two-eavesdropper Broadcast Channel (BC) with three degraded message sets. A common message is sent to three receivers. Another message is sent to the first and second receivers and needs to be kept secret from the third receiver (second eavesdropper). The third message is sent to the first receiver and needs to be kept secret from the second and third recei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Discrete Fourier Transform-Based Algorithm for Electric Network Frequency Extraction

    Publication Year: 2013 , Page(s): 1173 - 1181
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2270 KB) |  | HTML iconHTML  

    This paper introduces a Discrete Fourier Transform (DFT)-based algorithm to extract the Electric Network Frequency (ENF) information from an audio recording for use in audio authentication. The basic idea of the proposed algorithm is to calculate the specific spectral lines by DFT in the frequency domain at the desired frequency point instead of throughout the entire frequency band. Then a binary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing Digital Image Forgeries by Illumination Color Classification

    Publication Year: 2013 , Page(s): 1182 - 1194
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2007 KB) |  | HTML iconHTML  

    For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Although photographers are able to create composites of analog pictures, this process is very time consuming and requires expert knowledge. Today, however, powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jamming Rejection Using FFH/MFSK ML Receiver Over Fading Channels With the Presence of Timing and Frequency Offsets

    Publication Year: 2013 , Page(s): 1195 - 1200
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1338 KB) |  | HTML iconHTML  

    The composite effect of hostile multitone jamming and partial-band noise jamming on bit-error rate (BER) performance of a fast frequency-hopped M-ary frequency-shift-keying system is studied over Rayleigh fading channels in the presence of timing and frequency offsets. The maximum-likelihood (ML) diversity-combining method is employed to improve BER performance of the system. Analytical BER... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Spread-Spectrum Hidden Data From Digital Media

    Publication Year: 2013 , Page(s): 1201 - 1210
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3152 KB) |  | HTML iconHTML  

    We consider the problem of extracting blindly data embedded over a wide band in a spectrum (transform) domain of a digital medium (image, audio, video). We develop a novel multicarrier/signature iterative generalized least-squares (M-IGLS) core procedure to seek unknown data hidden in hosts via multicarrier spread-spectrum embedding. Neither the original host nor the embedding carriers are assumed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Channel Estimation in Beamformed Systems for Common-Randomness-Based Secret Key Establishment

    Publication Year: 2013 , Page(s): 1211 - 1220
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1595 KB) |  | HTML iconHTML  

    Establishing secret keys from the commonly-observed randomness of reciprocal wireless propagation channels has recently received considerable attention. We consider such key establishment between two multiantenna nodes that use beamforming for communication, showing that the upper bound on the number of key bits that can be generated from the channel observations can be maximized by properly probi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Pressed Keys From Mechanical Vibrations

    Publication Year: 2013 , Page(s): 1221 - 1229
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1305 KB) |  | HTML iconHTML  

    This paper describes an attack that identifies the sequence of keystrokes analyzing mechanical vibrations generated by the act of pressing keys. We use accelerometers as vibration sensors. The apparatus necessary for this attack is inexpensive and can be unobtrusively embedded within the target equipment. We tested the proposed attack on an ATM keypad and a PIN-pad. We achieved the key recognition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Integrity Using Limited Local Memory

    Publication Year: 2013 , Page(s): 1230 - 1242
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1152 KB) |  | HTML iconHTML  

    System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and inspect pages containing code and data of a target system under study. To avoid being infected by malicious or compromised targets, state-of-the-art system integrity monitors rely on virtualization technology to set up a tamper-proof execution environment. Consequently, the virtualization infrastructu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiaccess Channel With Partially Cooperating Encoders and Security Constraints

    Publication Year: 2013 , Page(s): 1243 - 1254
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3502 KB) |  | HTML iconHTML  

    We study a special case of Willems's two-user multiaccess channel with partially cooperating encoders from a security perspective. This model differs from Willems's setup in that only one encoder, Encoder 1, is allowed to conference; Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blank page

    Publication Year: 2013 , Page(s): 1255 - 1256
    Request Permissions | PDF file iconPDF (6 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013 , Page(s): 1257
    Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013 , Page(s): 1258 - 1259
    Request Permissions | PDF file iconPDF (131 KB)  
    Freely Available from IEEE
  • Call for papers special issue on perception inspired video processing

    Publication Year: 2013 , Page(s): 1260
    Request Permissions | PDF file iconPDF (523 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013 , Page(s): C3
    Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy