By Topic

IEEE Transactions on Information Forensics and Security

Issue 2 • Date June 2006

Filter Results

Displaying Results 1 - 19 of 19
  • Table of contents

    Publication Year: 2006, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Biometrics: a tool for information security

    Publication Year: 2006, Page(s):125 - 143
    Cited by:  Papers (275)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3016 KB) | HTML iconHTML

    Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?," or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EyeCerts

    Publication Year: 2006, Page(s):144 - 153
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2120 KB) | HTML iconHTML

    In this paper, we propose EyeCerts, a biometric system for the identification of people which achieves offline verification of certified, cryptographically secure documents. An EyeCert is a printed document which certifies the association of content on the document with a biometric feature-a compressed version of a human iris in this work. The system is highly cost-effective since it does not requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of iris-based identification system at the matching score level

    Publication Year: 2006, Page(s):154 - 168
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2008 KB) | HTML iconHTML

    Practical iris-based identification systems are easily accessible for data collection at the matching score level. In a typical setting, a video camera is used to collect a single frontal view image of good quality. The image is then preprocessed, encoded, and compared with all entries in the biometric database resulting in a single highest matching score. In this paper, we assume that multiple sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for distorted fingerprint matching based on local triangle feature set

    Publication Year: 2006, Page(s):169 - 177
    Cited by:  Papers (30)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2264 KB) | HTML iconHTML

    Coping with nonlinear distortions in fingerprint matching is a challenging task. This paper proposes a novel method, a fuzzy feature match (FFM) based on a local triangle feature set to match the deformed fingerprints. The fingerprint is represented by the fuzzy feature set: the local triangle feature set. The similarity between the fuzzy feature set is used to characterize the similarity between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teeth segmentation in digitized dental X-ray films using mathematical morphology

    Publication Year: 2006, Page(s):178 - 189
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5568 KB) | HTML iconHTML

    Automating the process of postmortem identification of individuals using dental records is receiving increased attention. Teeth segmentation from dental radiographic films is an essential step for achieving highly automated postmortem identification. In this paper, we offer a mathematical morphology approach to the problem of teeth segmentation. We also propose a grayscale contrast stretching tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security

    Publication Year: 2006, Page(s):190 - 204
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital camera identification from sensor pattern noise

    Publication Year: 2006, Page(s):205 - 214
    Cited by:  Papers (276)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1104 KB) | HTML iconHTML

    In this paper, we propose a new method for the problem of digital camera identification from its images based on the sensor's pattern noise. For each camera under investigation, we first determine its reference pattern noise, which serves as a unique identification fingerprint. This is achieved by averaging the noise obtained from multiple images using a denoising filter. To identify the camera fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust and secure image hashing

    Publication Year: 2006, Page(s):215 - 230
    Cited by:  Papers (207)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1752 KB) | HTML iconHTML

    Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint coding and embedding techniques for MultimediaFingerprinting

    Publication Year: 2006, Page(s):231 - 247
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3760 KB) | HTML iconHTML

    Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful attack where several different fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprints. One major category of collusion-resistant fingerprinting employs an explic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Boneh-Shaw fingerprinting scheme is better than we thought

    Publication Year: 2006, Page(s):248 - 255
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Digital fingerprinting is a forensic method against illegal copying. The distributor marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates due to this fingerprint. To work against a coalition of several pirates, the fingerprinting scheme must be based on a collusion-secure code. This paper addresses binary collusion-se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient spatial image watermarking via new perceptual masking and blind detection schemes

    Publication Year: 2006, Page(s):256 - 274
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3512 KB) | HTML iconHTML

    The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask and a new detection scheme are proposed. The proposed spatial perceptual mask is based on the cover image prediction error sequence and matches very well with the properties of the human visual system. It exhibits superior performance compared to existing spatial masking schemes. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis for Markov cover data with applications to images

    Publication Year: 2006, Page(s):275 - 287
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1384 KB) | HTML iconHTML

    The difficult task of steganalysis, or the detection of the presence of hidden data, can be greatly aided by exploiting the correlations inherent in typical host or cover signals. In particular, several effective image steganalysis techniques are based on the strong interpixel dependencies exhibited by natural images. Thus, existing theoretical benchmarks based on independent and identically distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2006, Page(s): 288
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2006, Page(s):289 - 290
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Special issue on adaptive waveform design for agile sensing and communication

    Publication Year: 2006, Page(s): 291
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Call for papers on network-aware multimedia processing and communications

    Publication Year: 2006, Page(s): 292
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy