By Topic

IEEE Transactions on Information Forensics and Security

Issue 9 • Date Sept. 2014

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1337 - 1338
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1339 - 1340
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

    Publication Year: 2014, Page(s):1341 - 1355
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2532 KB) | HTML iconHTML

    Mixes, relaying routers that hide the relation between incoming and outgoing messages, are the main building block of high-latency anonymous communication networks. A number of so-called disclosure attacks have been proposed to effectively deanonymize traffic sent through these channels. Yet, the dependence of their success on the system parameters is not well-understood. We propose the least squa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transferable Multiparty Computation With Applications to the Smart Grid

    Publication Year: 2014, Page(s):1356 - 1366
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1821 KB) | HTML iconHTML

    The smart grid offers an exciting way to better manage various aspects of a given utility. This comes with an increased threat of privacy due to fine-grained information reporting from each smart meter. Privacy preserving protocols have been proposed in the literature to deal with this problem. In this paper, we look at optimizing one technique, secure multiparty computation (MPC), for application... View full abstract»

    Open Access
  • A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks

    Publication Year: 2014, Page(s):1367 - 1379
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2086 KB) | HTML iconHTML

    A robust optimization model is considered for nonzero-sum discounted stochastic games with incomplete information in order to formally formulate and analyze the intrusion detection problem in wireless sensor networks (WSNs). Security requirements of WSNs are taken into account to characterize the game parameters and model the player objectives. To generalize the problem, the game data are assumed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding

    Publication Year: 2014, Page(s):1380 - 1393
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2107 KB) | HTML iconHTML

    We investigate the performance of a watermarking system in which the encoder is forced to use a binning strategy based on antipodal binary-valued sequences. The use of antipodal binary random binning has several advantages, including the possibility of relying on simple and effective binary code constructions and the ease with which this kind of schemes can cope with amplitude scaling. By relying ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Threat Propagation for Network Security

    Publication Year: 2014, Page(s):1394 - 1405
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1457 KB) | HTML iconHTML

    Techniques for network security analysis have historically focused on the actions of the network hosts. Outside of forensic analysis, little has been done to detect or predict malicious or infected nodes strictly based on their association with other known malicious nodes. This methodology is highly prevalent in the graph analytics world, however, and is referred to as community detection. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel

    Publication Year: 2014, Page(s):1406 - 1415
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    In this paper, we study the commitment over a discrete memoryless channel W : X → Y, where both a sender and a receiver are deterministic. We call it (δh, δb)-secure if it has a hiding error δh and binding error δb. For any c ∈ (0, log |X|) and any σ ∈ (0, c), we propose a framework for a message do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing Gaits on Spatio-Temporal Feature Domain

    Publication Year: 2014, Page(s):1416 - 1423
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1416 KB) | HTML iconHTML

    Gait has been known as an effective biometric feature to identify a person at a distance, e.g., in video surveillance applications. Many methods have been proposed for gait recognitions from various different perspectives. It is found that these methods rely on appearance (e.g., shape contour, silhouette)-based analyses, which require preprocessing of foreground-background segmentation (FG/BG). Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Steganographer is the Outlier: Realistic Large-Scale Steganalysis

    Publication Year: 2014, Page(s):1424 - 1435
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2243 KB) | HTML iconHTML

    We present a method for a completely new kind of steganalysis to determine who, out of a large number of actors each transmitting a large number of objects, is hiding payload inside some of them. It has significant challenges, including unknown embedding parameters and natural deviation between innocent cover sources, which are usually avoided in steganalysis tested under laboratory conditions. Ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition by Super-Resolved 3D Models From Consumer Depth Cameras

    Publication Year: 2014, Page(s):1436 - 1449
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6713 KB) | HTML iconHTML

    Face recognition based on the analysis of 3D scans has been an active research subject over the last few years. However, the impact of the resolution of 3D scans on the recognition process has not been addressed explicitly, yet being an element of primal importance to enable the use of the new generation of consumer depth cameras for biometric purposes. In fact, these devices perform depth/color a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forensic Analysis of SIFT Keypoint Removal and Injection

    Publication Year: 2014, Page(s):1450 - 1464
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6478 KB) | HTML iconHTML

    Attacks capable of removing SIFT keypoints from images have been recently devised with the intention of compromising the correct functioning of SIFT-based copy-move forgery detection. To tackle with these attacks, we propose three novel forensic detectors for the identification of images whose SIFT keypoints have been globally or locally removed. The detectors look for inconsistencies like the abs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back to Static Analysis for Kernel-Level Rootkit Detection

    Publication Year: 2014, Page(s):1465 - 1476
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1817 KB) | HTML iconHTML

    Rootkit's main goal is to hide itself and other modules present in the malware. Their stealthy nature has made their detection further difficult, especially in the case of kernel-level rootkits. There have been many dynamic analysis techniques proposed for detecting kernel-level rootkits, while on the other hand, static analysis has not been popular. This is perhaps due to its poor performance in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics

    Publication Year: 2014, Page(s):1477 - 1490
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1229 KB) | HTML iconHTML

    The fingerprinting capacity has recently been derived as the value of a two-person zero-sum game. In this paper, we study the fingerprinting capacity games with k pirates in a new collusion model called the mixed digit model, which is inspired by the combined digit model of Škorić et al. For small k, the capacities along with optimal strategies for both players of the game are obta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework

    Publication Year: 2014, Page(s):1491 - 1501
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1531 KB) | HTML iconHTML

    A watermarking strategy for triangle surface meshes consists of modifying the vertex positions along the radial directions, in order to adjust the distribution of radial distances and thereby encode the desired payload. To guarantee that watermark embedding does not alter the center of mass, prior work formulated this task as a quadratic programming problem. In this paper, we contribute to the gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT Domain

    Publication Year: 2014, Page(s):1502 - 1517
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5427 KB) | HTML iconHTML

    Illegal distribution of a digital movie is a significant threat to the film industries. With the advent of high-speed broadband Internet access, a pirated copy of a digital video can be easily distributed to a global audience. Digital video watermarking is a possible means of limiting this type of digital distribution. In existing watermarking methods, the watermark is usually embedded into the lu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris Encoding

    Publication Year: 2014, Page(s):1518 - 1526
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1987 KB) | HTML iconHTML

    Accurate iris recognition from the distantly acquired face or eye images under less constrained environments require development of specialized strategies which can accommodate for significant image variations (e.g., scale, rotation, translation) and influence from multiple noise sources. A set of coordinate-pairs, which is referred to as geometric key in this paper is randomly generated and exclu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2014, Page(s):B1527 - B1528
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2014, Page(s): 1529
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):1530 - 1531
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Special issue on advanced signal processing techniques for radar applications

    Publication Year: 2014, Page(s): 1532
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2014, Page(s): 1533
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Xplore Digital Library

    Publication Year: 2014, Page(s): 1534
    Request permission for commercial reuse | PDF file iconPDF (1586 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy