By Topic

Information Forensics and Security, IEEE Transactions on

Issue 1 • Date March 2006

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2006 , Page(s): c1 - c4
    Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2006 , Page(s): c2
    Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • Editorial Introducing T-IFS

    Publication Year: 2006 , Page(s): 1 - 2
    Request Permissions | PDF file iconPDF (160 KB) |  | HTML iconHTML  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic facial expression recognition using facial animation parameters and multistream HMMs

    Publication Year: 2006 , Page(s): 3 - 11
    Cited by:  Papers (45)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (776 KB) |  | HTML iconHTML  

    The performance of an automatic facial expression recognition system can be significantly improved by modeling the reliability of different streams of facial expression information utilizing multistream hidden Markov models (HMMs). In this paper, we present an automatic multistream HMM facial expression recognition system and analyze its performance. The proposed system utilizes facial animation p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal authentication using 3-D finger geometry

    Publication Year: 2006 , Page(s): 12 - 21
    Cited by:  Papers (22)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (856 KB) |  | HTML iconHTML  

    In this paper, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on the environment and the placement of the hand, and this greatly cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification

    Publication Year: 2006 , Page(s): 22 - 34
    Cited by:  Papers (12)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (872 KB) |  | HTML iconHTML  

    Authentication of handwritten signatures is becoming increasingly important. With a rapid increase in the number of people who access Tablet PCs and PDAs, online signature verification is one of the most promising techniques for signature verification. This paper proposes a new algorithm that performs a Monte Carlo based Bayesian scheme for online signature verification. The new algorithm consists... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The NTMAC for authentication of noisy messages

    Publication Year: 2006 , Page(s): 35 - 42
    Cited by:  Papers (16)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    This paper introduces a new construct, called the Noise Tolerant Message Authentication Code (NTMAC), for noisy message authentication. The NTMAC can tolerate a small number of errors, such as might be caused by a noisy communications channel. The NTMAC uses a conventional Message Authentication Code (MAC) in its constructions and it inherits the conventional MAC's resistance to forgeries. Further... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and design of secure watermark-based authentication systems

    Publication Year: 2006 , Page(s): 43 - 55
    Cited by:  Papers (34)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    This paper focuses on a coding approach for effective analysis and design of secure watermark-based multimedia authentication systems. We provide a design framework for semi-fragile watermark-based authentication such that both objectives of robustness and fragility are effectively controlled and achieved. Robustness and fragility are characterized as two types of authentication errors. The authen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate Message Authentication Codes for N -ary Alphabets

    Publication Year: 2006 , Page(s): 56 - 67
    Cited by:  Papers (8)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1336 KB) |  | HTML iconHTML  

    Approximate message authentication codes (AMACs) for binary alphabets have been introduced recently as noise-tolerant authenticators. Different from conventional “hard” message authentications that are designed to detect even the slightest changes in messages, AMACs are designed to tolerate a small amount of noise in messages for applications where slight noise is acceptable, such as i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A clustering based approach to perceptual image hashing

    Publication Year: 2006 , Page(s): 68 - 79
    Cited by:  Papers (40)  |  Patents (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (816 KB) |  | HTML iconHTML  

    A perceptual image hash function maps an image to a short binary string based on an image's appearance to the human eye. Perceptual image hashing is useful in image databases, watermarking, and authentication. In this paper, we decouple image hashing into feature extraction (intermediate hash) followed by data clustering (final hash). For any perceptually significant feature extractor, we propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An accurate analysis of scalar quantization-based data hiding

    Publication Year: 2006 , Page(s): 80 - 86
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    This paper comes to fill a gap in watermarking theory, analyzing the exact performance of the scalar Costa scheme (SCS) facing additive Gaussian attacks when the usual approximation of high-resolution quantization is not valid, thus taking into account the host statistics. The analysis is focused on the assessment of the probability of error, showing new results, an although it is valid in a gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking relying on cover signal content to hide synchronization marks

    Publication Year: 2006 , Page(s): 87 - 101
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1696 KB) |  | HTML iconHTML  

    In watermarking, the exploitation of synchronization marks embedded within the cover signal has been widely used to provide robustness against geometrical distortions. However, in most schemes, synchronization marks are easily detectable which makes them vulnerable to malicious removal or tampering. Relying on embedded signals which exhibit strong reference features to recover synchronization can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wet paper codes with improved embedding efficiency

    Publication Year: 2006 , Page(s): 102 - 110
    Cited by:  Papers (39)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1832 KB) |  | HTML iconHTML  

    Wet paper codes were previously proposed as a tool for construction of steganographic schemes with arbitrary (nonshared) selection channels. In this paper, we propose a new approach to wet paper codes using random linear codes of small codimension that at the same time improves the embedding efficiency (number of random message bits embedded per embedding change). Practical algorithms are given an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis using higher-order image statistics

    Publication Year: 2006 , Page(s): 111 - 119
    Cited by:  Papers (115)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1440 KB) |  | HTML iconHTML  

    Techniques for information hiding (steganography) are becoming increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages is also becoming considerably more difficult. We describe a universal approach to steganalysis for detecting the presence of hidden messages embedded within digital images. We show that, within multiscale, multiori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2006 , Page(s): 120
    Request Permissions | PDF file iconPDF (20 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2006 , Page(s): 121 - 122
    Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • IEEE copyright form

    Publication Year: 2006 , Page(s): 123 - 124
    Request Permissions | PDF file iconPDF (1058 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2006 , Page(s): c3
    Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy