By Topic

IEEE Transactions on Information Forensics and Security

Issue 1 • March 2007

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2007, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks

    Publication Year: 2007, Page(s):1 - 13
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    The uncertainties in host signal modeling due to inherent model errors and various attack distortions have prompted the introduction of robust statistics theory in the context of watermark detection. Specifically, the epsi-contamination model was applied to describe the host signals, and statistically robust (SR) watermark detectors assuming known embedding strengths were derived. In this work, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance

    Publication Year: 2007, Page(s):14 - 23
    Cited by:  Papers (72)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    As H.264 digital video becomes more prevalent, the need for copyright protection and authentication methods that are appropriate for this standard will emerge. This paper proposes a robust watermarking algorithm for H.264. We employ a human visual model adapted for a 4 times 4 discrete cosine transform block to increase the payload and robustness while limiting visual distortion. A key-dependent a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique

    Publication Year: 2007, Page(s):24 - 30
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique is proposed. The data embedding is disguised such that the stegodocument appears to be the product of a collaborative writing effort. Text segments in the document are degenerated, mimicking to be the work of an author with inferior writing skills, with the secret message embedded in the choices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Feature Extraction for Learning-Based Image Steganalysis

    Publication Year: 2007, Page(s):31 - 45
    Cited by:  Papers (97)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    The purpose of image steganalysis is to detect the presence of hidden messages in cover photographic images. Supervised learning is an effective and universal approach to cope with the twin difficulties of unknown image statistics and unknown steganographic codes. A crucial part of the learning process is the selection of low-dimensional informative features. We investigate this problem from three... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis of Embedding in Two Least-Significant Bits

    Publication Year: 2007, Page(s):46 - 54
    Cited by:  Papers (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    This paper proposes steganalysis methods for extensions of least-significant bit (LSB) overwriting to both of the two lowest bit planes in digital images: there are two distinct embedding paradigms. The author investigates how detectors for standard LSB replacement can be adapted to such embedding, and how the methods of "structural steganalysis", which gives the most sensitive detectors for stand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning Discriminant Person-Specific Facial Models Using Expandable Graphs

    Publication Year: 2007, Page(s):55 - 68
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3807 KB) | HTML iconHTML

    In this paper, a novel algorithm for finding discriminant person-specific facial models is proposed and tested for frontal face verification. The most discriminant features of a person's face are found and a deformable model is placed in the spatial coordinates that correspond to these discriminant features. The discriminant deformable models, for verifying the person's identity, that are learned ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parameter-Free Framework for General Supervised Subspace Learning

    Publication Year: 2007, Page(s):69 - 76
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    Supervised subspace learning techniques have been extensively studied in biometrics literature; however, there is little work dedicated to: 1) how to automatically determine the subspace dimension in the context of supervised learning, and 2) how to explicitly guarantee the classification performance on a training set. In this paper, by following our previous work on unified subspace learning fram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Generation and Analysis of Synthetic Iris Images

    Publication Year: 2007, Page(s):77 - 90
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6200 KB) | HTML iconHTML

    The popularity of iris biometric has grown considerably over the past two to three years. It has resulted in the development of a large number of new iris encoding and processing algorithms. Since there are no publicly available large-scale and even medium-size data bases, neither of the newly designed algorithms has undergone extensive testing. The designers claim exclusively high recognition per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonintrusive component forensics of visual sensors using output images

    Publication Year: 2007, Page(s):91 - 106
    Cited by:  Papers (100)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1206 KB) | HTML iconHTML

    Rapid technology development and the widespread use of visual sensors have led to a number of new problems related to protecting intellectual property rights, handling patent infringements, authenticating acquisition sources, and identifying content manipulations. This paper introduces nonintrusive component forensics as a new methodology for the forensic analysis of visual sensing information, ai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2007, Page(s): 107
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2007, Page(s):108 - 109
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Second International Workshop on Computational Advances in Multi-Channel Sensor Array Processing (CAMSAP 2007)

    Publication Year: 2007, Page(s): 110
    Request permission for commercial reuse | PDF file iconPDF (593 KB)
    Freely Available from IEEE
  • IEEE Workshop on Signal Processing Systems (SIPS 2007)

    Publication Year: 2007, Page(s): 111
    Request permission for commercial reuse | PDF file iconPDF (511 KB)
    Freely Available from IEEE
  • Special issue on Signal Processing and Networking for Dynamic Spectrum Access

    Publication Year: 2007, Page(s): 112
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2007, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Blank page [back cover]

    Publication Year: 2007, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy