By Topic

IEEE Transactions on Information Forensics and Security

Issue 4 • Date Dec. 2006

Filter Results

Displaying Results 1 - 21 of 21
  • Table of contents

    Publication Year: 2006, Page(s):C1 - C4
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2006, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management

    Publication Year: 2006, Page(s):405 - 420
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2046 KB) | HTML iconHTML

    In this paper, we deal with the design of high-rate multilevel 2-D bar codes for the print-and-scan channel. First, we introduce a framework for evaluating the performance limits of these codes by studying an intersymbol-interference (ISI)-free, synchronous, and noiseless print-and-scan channel, where the input and output alphabets are finite and the printer device uses halftoning to simulate mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of Lattice-Based Data Hiding Against the Known Message Attack

    Publication Year: 2006, Page(s):421 - 439
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1038 KB) | HTML iconHTML

    Security of quantization index modulation (QIM) watermarking methods is usually sought through a pseudorandom dither signal which randomizes the codebook. This dither plays the role of the secret key (i.e., a parameter only shared by the watermarking embedder and decoder), which prevents unauthorized embedding and/or decoding. However, if the same dither signal is reused, the observation of severa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization

    Publication Year: 2006, Page(s):440 - 456
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1490 KB) | HTML iconHTML

    Multimedia security systems have many users with different objectives and they influence each other's performance and decisions. Behavior forensics analyzes how users with conflicting interests interact with and respond to each other. Such investigation enables a thorough understanding of multimedia security systems and helps the digital rights enforcer offer stronger protection of multimedia. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gaussian Mixture Modeling of Short-Time Fourier Transform Features for Audio Fingerprinting

    Publication Year: 2006, Page(s):457 - 463
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    In audio fingerprinting, an audio clip must be recognized by matching an extracted fingerprint to a database of previously computed fingerprints. The fingerprints should reduce the dimensionality of the input significantly, provide discrimination among different audio clips, and, at the same time, be invariant to distorted versions of the same audio clip. In this paper, we design fingerprints addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • `Print and Scan' Resilient Data Hiding in Images

    Publication Year: 2006, Page(s):464 - 478
    Cited by:  Papers (32)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3482 KB) | HTML iconHTML

    Print-scan resilient data hiding finds important applications in document security and image copyright protection. This paper proposes methods to hide information into images that achieve robustness against printing and scanning with blind decoding. The selective embedding in low frequencies scheme hides information in the magnitude of selected low-frequency discrete Fourier transform coefficients... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection

    Publication Year: 2006, Page(s):479 - 492
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7001 KB) | HTML iconHTML

    We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation

    Publication Year: 2006, Page(s):493 - 501
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2648 KB) | HTML iconHTML

    The reversible steganographic method allows an original image to be completely reconstructed from the stegoimage after the extraction of the embedded data. The traditional reversible embedding schemes are not suitable for images compressed using vector quantization (VQ) and usually require the use of the location map for reversibility. In this paper, we propose a reversible embedding scheme for VQ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain

    Publication Year: 2006, Page(s):502 - 516
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1232 KB) | HTML iconHTML

    In this paper, we present effective steganalysis techniques for digital video sequences based on interframe collusion that exploits the temporal statistical visibility of a hidden message. Steganalysis is the process of detecting, with high probability, the presence of covert data in multimedia. Present image steganalysis algorithms when applied directly to video sequences on a frame-by-frame basi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CRC–NTMAC for Noisy Message Authentication

    Publication Year: 2006, Page(s):517 - 523
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    We present a new message authentication code (MAC) called the cyclic redundancy check-noise-tolerant message authentication code (CRC-NTMAC). The CRC-NTMAC improves upon the recently developed NTMAC. Unlike conventional MACs, such as the keyed-hash MAC (HMAC), the CRC-NTMAC and NTMAC tolerate a modest number of errors, such as might be caused by a noisy communications channel. Furthermore, both ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Fundamental Limitations of Proving Data Theft

    Publication Year: 2006, Page(s):524 - 531
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    We show software agents that operate on input plaintext, transmit the result, and have the property that characterizes the operation as theft of plaintext amounts to solving a hard cryptographic problem. Such agents employ what we call a "questionable encryption scheme" in which it is computationally intractable to determine if the output is an asymmetric ciphertext or nonce. We therefore show a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint Retrieval for Identification

    Publication Year: 2006, Page(s):532 - 542
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1753 KB) | HTML iconHTML

    This paper presents a front-end filtering algorithm for fingerprint identification, which uses orientation field and dominant ridge distance as retrieval features. We propose a new distance measure that better quantifies the similarity evaluation between two orientation fields than the conventional Euclidean and Manhattan distance measures. Furthermore, fingerprints in the data base are clustered ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Image Recovery Algorithm for Visible Watermarked Images

    Publication Year: 2006, Page(s):543 - 550
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3379 KB) | HTML iconHTML

    A novel image recovery algorithm for removing visible watermarks is presented. Independent component analysis (ICA) is utilized to separate source images from watermarked and reference images. Three independent component analysis approaches are examined in the proposed algorithm, which includes joint approximate diagonalization of eigenmatrices, second-order blind identification, and FastICA. More... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of reviewers

    Publication Year: 2006, Page(s):551 - 553
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2006, Page(s): 554
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2006, Page(s):555 - 556
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • IEEE Transactions on Multimedia

    Publication Year: 2006, Page(s): 557
    Request permission for commercial reuse | PDF file iconPDF (322 KB)
    Freely Available from IEEE
  • 2007 International Conference on Multimedia & Expo (ICME)

    Publication Year: 2006, Page(s): 558
    Request permission for commercial reuse | PDF file iconPDF (573 KB)
    Freely Available from IEEE
  • 2006 Index

    Publication Year: 2006, Page(s):559 - 564
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2006, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy