By Topic

IEEE Transactions on Information Forensics and Security

Issue 3 • Date Sept. 2006

Filter Results

Displaying Results 1 - 17 of 17
  • Table of contents

    Publication Year: 2006, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Block QIM watermarking games

    Publication Year: 2006, Page(s):293 - 310
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (943 KB) | HTML iconHTML

    While binning is a fundamental approach to blind data embedding and watermarking, an attacker may devise various strategies to reduce the effectiveness of practical binning schemes. The problem analyzed in this paper is design of worst-case noise distributions against L-dimensional lattice quantization index modulation (QIM) watermarking codes. The cost functions considered are 1) probability of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior forensics for scalable multiuser collusion: fairness versus effectiveness

    Publication Year: 2006, Page(s):311 - 329
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1005 KB) | HTML iconHTML

    Multimedia security systems involve many users with different objectives and users influence each other's performance. To have a better understanding of multimedia security systems and offer stronger protection of multimedia, behavior forensics formulate the dynamics among users and investigate how they interact with and respond to each other. This paper analyzes the behavior forensics in multimed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques

    Publication Year: 2006, Page(s):330 - 341
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1625 KB) | HTML iconHTML

    In this paper, the authors propose a watermarking scheme that embeds both image-dependent and fixed-part marks for dual protection (content authentication and copyright claim) of JPEG images. To achieve the goals of efficiency, imperceptibility, and robustness, a compressed-domain informed embedding algorithm, which incorporates the Lagrangian multiplier optimization approach and an adjustment pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gray Hausdorff distance measure for comparing face images

    Publication Year: 2006, Page(s):342 - 349
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    Human face recognition is considered to be one of the toughest problems in the domain of pattern recognition. The variations in face images due to differing expression, pose and illumination are some of the key issues to be addressed in developing a face recognition system. In this paper, a new measure called gray Hausdorff distance (denoted by Hpg) is proposed to compare the gray image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face identification using novel frequency-domain representation of facial asymmetry

    Publication Year: 2006, Page(s):350 - 359
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1237 KB) | HTML iconHTML

    Face recognition is a challenging task. This paper introduces a novel set of biometrics, defined in the frequency domain and representing a form of "facial asymmetry." A comparison with existing spatial asymmetry measures suggests that the frequency-domain representation provides an efficient approach for performing human identification in the presence of severe expressions and for expression clas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fake finger detection by skin distortion analysis

    Publication Year: 2006, Page(s):360 - 373
    Cited by:  Papers (54)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5322 KB) | HTML iconHTML

    Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a serious threat for unattended applications. This work introduces a new approach for discriminating fake fingers from real ones, based on the analysis of skin distortion. The user is required to move the finger while pressing it against the scanner surface, thus deliberately exaggerating the skin disto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of message source and destination from network intercepts

    Publication Year: 2006, Page(s):374 - 385
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB) | HTML iconHTML

    We consider the problem of estimating the endpoints (source and destination) of a transmission in a network based on partial measurement of the transmission path. Possibly asynchronous sensors placed at various points within the network provide the basis for endpoint estimation by indicating that a specific transmission has been intercepted at their assigned locations. During a training phase, tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of autoregressive speech watermarking model under guessing attack

    Publication Year: 2006, Page(s):386 - 390
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The security of the "autoregressive (AR) watermark in AR host" signal model is investigated. It is demonstrated through analysis and Monte Carlo simulation that the AR watermarking model is asymptotically as secure as the "white watermark in white host" model under the guessing attack View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matrix embedding for large payloads

    Publication Year: 2006, Page(s):390 - 395
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    Matrix embedding is a previously introduced coding method that is used in steganography to improve the embedding efficiency (increase the number of bits embedded per embedding change). Higher embedding efficiency translates into better steganographic security. This gain is more important for long messages than for shorter ones because longer messages are, in general, easier to detect. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graphical passwords based on robust discretization

    Publication Year: 2006, Page(s):395 - 399
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    This paper generalizes Blonder's graphical passwords to arbitrary images and solves a robustness problem that this generalization entails. The password consists of user-chosen click points in a displayed image. In order to store passwords in cryptographically hashed form, we need to prevent small uncertainties in the click points from having any effect on the password. We achieve this by introduci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2006, Page(s): 400
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2006, Page(s):401 - 402
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Special issue on music information retrieval (MIR)

    Publication Year: 2006, Page(s): 403
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Special issue on human detection and recognition

    Publication Year: 2006, Page(s): 404
    Request permission for commercial reuse | PDF file iconPDF (300 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy