By Topic

Information Forensics and Security, IEEE Transactions on

Issue 9 • Date Sept. 2013

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2013 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (276 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 1413 - 1414
    Save to Project icon | Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 1415 - 1416
    Save to Project icon | Request Permissions | PDF file iconPDF (169 KB)  
    Freely Available from IEEE
  • “Seeing” ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing

    Publication Year: 2013 , Page(s): 1417 - 1432
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2687 KB) |  | HTML iconHTML  

    Electric Network Frequency (ENF) fluctuates slightly over time from its nominal value of 50 Hz/60 Hz. The fluctuations in ENF remain consistent across the entire power grid including when measured at physically distant geographical locations. The light intensity from such indoor lighting as fluorescent lamps and incandescent bulbs, which are connected to the power mains, varies in accordance with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Reusability of Secure Sketches and Fuzzy Extractors

    Publication Year: 2013 , Page(s): 1433 - 1445
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2785 KB) |  | HTML iconHTML  

    Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a public sketch, which is later used to reproduce the original biometric and all derived information exactly from a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distal-Interphalangeal-Crease-Based User Authentication System

    Publication Year: 2013 , Page(s): 1446 - 1455
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2618 KB) |  | HTML iconHTML  

    Touchless-based fingerprint recognition technology is thought to be an alternative to touch-based systems to solve problems of hygienic, latent fingerprints, and maintenance. However, there are few studies about touchless fingerprint recognition systems due to the lack of a large database and the intrinsic drawback of low ridge-valley contrast of touchless fingerprint images. This paper proposes a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Median Filtering Forensics Using an Autoregressive Model

    Publication Year: 2013 , Page(s): 1456 - 1468
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2719 KB) |  | HTML iconHTML  

    In order to verify the authenticity of digital images, researchers have begun developing digital forensic techniques to identify image editing. One editing operation that has recently received increased attention is median filtering. While several median filtering detection techniques have recently been developed, their performance is degraded by JPEG compression. These techniques suffer similar d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unicasting on the Secrecy Graph

    Publication Year: 2013 , Page(s): 1469 - 1481
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3197 KB) |  | HTML iconHTML  

    We consider the secrecy capacity of unicast channels of ad hoc networks exposed to randomly located eavesdroppers, as modeled by S-Graphs. Expressions that quantify the impact of fading and of the density of legitimate nodes relative to that of eavesdroppers are obtained, in terms of the probability that secrecy capacities of unicast channels are nonzero. The results indicate that depending on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity results and super-activation for wiretap channels with active wiretappers

    Publication Year: 2013 , Page(s): 1482 - 1496
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4101 KB) |  | HTML iconHTML  

    The classical wiretap channel models secure communication in the presence of a nonlegitimate wiretapper who has to be kept ignorant. Traditionally, the wiretapper is passive in the sense that he only tries to eavesdrop the communication using his received channel output. In this paper, more powerful active wiretappers are studied. In addition to eavesdropping, these wiretappers are able to influen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks

    Publication Year: 2013 , Page(s): 1497 - 1507
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2207 KB) |  | HTML iconHTML  

    Collaborative spectrum sensing is a key technology in cognitive radio networks (CRNs). Although mobility is an inherent property of wireless networks, there has been no prior work studying the performance of collaborative spectrum sensing under attacks in mobile CRNs. Existing solutions based on user trust for secure collaborative spectrum sensing cannot be applied to mobile scenarios, since they ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding

    Publication Year: 2013 , Page(s): 1508 - 1518
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3227 KB) |  | HTML iconHTML  

    We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently selects good data carrying pixel locations (DCPL) associated with “ l-shaped” patterns than block-based methods. Our method employs a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification

    Publication Year: 2013 , Page(s): 1519 - 1530
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1771 KB) |  | HTML iconHTML  

    Over 20 studies have been published in the past decade involving file and data type classification for digital forensics and information security applications. Methods using n-grams as inputs have proven the most successful across a wide variety of types; however, there are mixed results regarding the utility of unigrams and bigrams as inputs independently. In this study, we use support vector mac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind Verification of Digital Image Originality: A Statistical Approach

    Publication Year: 2013 , Page(s): 1531 - 1540
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1713 KB) |  | HTML iconHTML  

    Many methods for verifying the integrity of digital images employ various fingerprints associated with acquisition devices. Data on an acquisition device and fingerprints are extracted from an image and confronted with a reference data set that includes all possible fingerprints of the acquisition device. This allows us to draw a conclusion whether the digital image has been modified or not. Thus ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized Random Grid and Its Applications in Visual Cryptography

    Publication Year: 2013 , Page(s): 1541 - 1553
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (8760 KB) |  | HTML iconHTML  

    Random grid (RG) is a method to implement visual cryptography (VC) without pixel expansion. However, a reconstructed secret with lower visual quality reveals in RG-based VC due to the fact that average light transmission of a share is fixed at 1/2. In this work, we introduce the concept of generalized RG, where the light transmission of a share becomes adjustable, and adopt generalized RG to imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2013 , Page(s): B1554
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013 , Page(s): 1555
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013 , Page(s): 1556 - 1557
    Save to Project icon | Request Permissions | PDF file iconPDF (131 KB)  
    Freely Available from IEEE
  • Special issue on visual signal processing for wireless networks

    Publication Year: 2013 , Page(s): 1558
    Save to Project icon | Request Permissions | PDF file iconPDF (319 KB)  
    Freely Available from IEEE
  • Special Issue on Signal Process for Situational Awareness from Networked Sensors and Social Media

    Publication Year: 2013 , Page(s): 1559
    Save to Project icon | Request Permissions | PDF file iconPDF (913 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy