By Topic

IEEE Transactions on Information Forensics and Security

Issue 10 • Date Oct. 2013

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (276 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1555 - 1556
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1557 - 1558
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy

    Publication Year: 2013, Page(s):1559 - 1561
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Hardware Acceleration of Background Modeling in the Compressed Domain

    Publication Year: 2013, Page(s):1562 - 1574
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1767 KB) | HTML iconHTML

    In intelligent video surveillance systems, scalability (of the number of simultaneous video streams) is important. Two key factors which hinder scalability are the time spent in decompressing the input video streams, and the limited computational power of the processor. This paper demonstrates how a combination of algorithmic and hardware techniques can overcome these limitations, and significantl... View full abstract»

    Open Access
  • The Large-Scale Crowd Behavior Perception Based on Spatio-Temporal Viscous Fluid Field

    Publication Year: 2013, Page(s):1575 - 1589
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3641 KB) | HTML iconHTML

    Over the past decades, a wide attention has been paid to crowd control and management in the intelligent video surveillance area. Among the tasks for automatic surveillance video analysis, crowd motion modeling lays a crucial foundation for numerous subsequent analysis but encounters many unsolved challenges due to occlusions among pedestrians, complicated motion patterns in crowded scenarios, etc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video Anomaly Search in Crowded Scenes via Spatio-Temporal Motion Context

    Publication Year: 2013, Page(s):1590 - 1599
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1867 KB) | HTML iconHTML

    Video anomaly detection plays a critical role for intelligent video surveillance. We present an abnormal video event detection system that considers both spatial and temporal contexts. To characterize the video, we first perform the spatio-temporal video segmentation and then propose a new region-based descriptor called “Motion Context,” to describe both motion and appearance informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute Regularization Based Human Action Recognition

    Publication Year: 2013, Page(s):1600 - 1609
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2047 KB) | HTML iconHTML

    Recently, attributes have been introduced as a kind of high-level semantic information to help improve the classification accuracy. Multitask learning is an effective methodology to achieve this goal, which shares low-level features between attributes and actions. Yet such methods neglect the constraints that attributes impose on classes, which may fail to constrain the semantic relationship betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Spatio-Temporal Scene Structure for Wide-Area Activity Analysis in Unconstrained Environments

    Publication Year: 2013, Page(s):1610 - 1619
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1731 KB) | HTML iconHTML

    Surveillance videos in unconstrained environments typically consist of long duration sequences of activities which occur at different spatio-temporal locations and can involve multiple people acting simultaneously. Often, the activities have contextual relationships with one another. Although context has been studied in the past for the purpose of activity recognition, the use of context in recogn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carried Object Detection in Videos Using Color Information

    Publication Year: 2013, Page(s):1620 - 1631
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2768 KB) | HTML iconHTML

    Automatic baggage detection has become a subject of significant practical interest in recent years. In this paper, we propose an approach to baggage detection in CCTV video footage that uses color information to address some of the vital shortcomings of state-of-the-art algorithms. The proposed approach consists of typical steps used in baggage detection, namely, the estimation of moving direction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transferring Training Instances for Convenient Cross-View Object Classification in Surveillance

    Publication Year: 2013, Page(s):1632 - 1641
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1923 KB) | HTML iconHTML

    Automatic object classification is an important issue in traffic scene surveillance. Appearance variation due to perspective distortion is one of the most difficult problems for moving object detection, tracking, and recognition. We propose an active transfer learning approach to bridge the gap between appearance variations under two different scenes. Only a small number of training samples are re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New View-Invariant Feature for Cross-View Gait Recognition

    Publication Year: 2013, Page(s):1642 - 1653
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1592 KB) | HTML iconHTML

    Human gait is an important biometric feature which is able to identify a person remotely. However, change of view causes significant difficulties for recognizing gaits. This paper proposes a new framework to construct a new view-invariant feature for cross-view gait recognition. Our view-normalization process is performed in the input layer (i.e., on gait silhouettes) to normalize gaits from arbit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Subcategories Parts-Based Representation for One Sample Face Identification

    Publication Year: 2013, Page(s):1654 - 1664
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3615 KB) | HTML iconHTML

    Small sample set, occlusion, and illumination variations are the critical obstacles for a face identification system towards practical application. In this paper, we propose a probabilistic generative model for parts-based data representation to address these difficulties. In our approach, multiple subcategories corresponding to the individual face parts, such as nose, mouth, eye, and so forth, ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Tracking and Recognition at a Distance: A Coaxial and Concentric PTZ Camera System

    Publication Year: 2013, Page(s):1665 - 1677
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2351 KB) | HTML iconHTML

    Face recognition has been regarded as an effective method for subject identification at a distance because of its covert and remote sensing capability. However, face images have a low resolution when they are captured at a distance (say, larger than 5 meters) thereby degrading the face matching performance. To address this problem, we propose an imaging system consisting of static and pan-tilt-zoo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authenticating Lossy Surveillance Video

    Publication Year: 2013, Page(s):1678 - 1687
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1928 KB) | HTML iconHTML

    Public camera feeds are increasingly being opened to use by multiple authorities (e.g., police, fire, traffic) as well as to the public. Because of the difficulty and insecurity of sharing cryptographic keys, these data are available in the clear. However, authorities must have a mechanism to assure trust in the video, that is, to authenticate it. While lossless video is straightforward to authent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos

    Publication Year: 2013, Page(s):1688 - 1699
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1453 KB) | HTML iconHTML

    With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013, Page(s): 1700
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):1701 - 1702
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Special issue on visual signal processing for wireless networks

    Publication Year: 2013, Page(s): 1703
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • Special Issue on Signal Process for Situational Awareness from Networked Sensors and Social Media

    Publication Year: 2013, Page(s): 1704
    Request permission for commercial reuse | PDF file iconPDF (913 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy