IEEE Transactions on Information Forensics and Security

Issue 3  Part 1 • Sept. 2007

 This issue contains several parts.Go to:  Part 2 

Filter Results

Displaying Results 1 - 21 of 21
  • Table of contents

    Publication Year: 2007, Page(s):C1 - C4
    Request permission for commercial reuse | |PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2007, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Double-Sided Watermark Embedding and Detection

    Publication Year: 2007, Page(s):297 - 310
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (648 KB) | HTML iconHTML

    Spread-spectrum schemes embed additive or multiplicative watermarks into the host contents for copyright protection. However, their performances are reduced by the interference from the host contents. Thus, in this work, we introduce a simple double-sided technique to utilize this interference for performance improvements. Different from the previous host interference rejection schemes, it does no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion

    Publication Year: 2007, Page(s):311 - 320
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (563 KB) | HTML iconHTML

    Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of difference expansion. The first scheme takes the coordinates of vertices as the cover data and hides data by modifying the differences between the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform

    Publication Year: 2007, Page(s):321 - 330
    Cited by:  Papers (159)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2095 KB) | HTML iconHTML

    This paper proposes a high capacity reversible image watermarking scheme based on integer-to-integer wavelet transforms. The proposed scheme divides an input image into nonoverlapping blocks and embeds a watermark into the high-frequency wavelet coefficients of each block. The conditions to avoid both underflow and overflow in the spatial domain are derived for an arbitrary wavelet and block size.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Wireless Transmission of Compressed Latent Fingerprint Images

    Publication Year: 2007, Page(s):331 - 340
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2529 KB) | HTML iconHTML

    Maximizing the potential of latent fingerprints from crime scenes in the identification of suspects requires the rapid transfer of the latent from the scene to a remote fingerprint bureau. Transmission over restricted-bandwidth cellular wireless networks requires the latent images to be compressed but without compromising the likelihood of a match being achieved. We present details of experiments ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes

    Publication Year: 2007, Page(s):341 - 349
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1753 KB) | HTML iconHTML

    The purpose of data hiding with reversibility property is to recover the original cover media after extracting the hidden data from the stegomedia. In this paper, we propose a reversible data-hiding scheme for embedding secret data in VQ-compressed codes based on the declustering strategy and the similarity property of adjacent areas in a natural image. Two declustering methods are proposed using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking Protocol for Web Context

    Publication Year: 2007, Page(s):350 - 363
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1041 KB) | HTML iconHTML

    Digital watermarking is considered to be a main technology for the copyright protection of multimedia digital content distributed on the Internet. However, watermarking procedures can effectively support copyright protection processes only if they are applied by employing specific watermarking protocols, which define the scheme of the interactions that have to take place among the entities involve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels

    Publication Year: 2007, Page(s):364 - 375
    Cited by:  Papers (179)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1450 KB) | HTML iconHTML

    To establish a secure communications link between any two transceivers, the communicating parties require some shared secret, or key, with which to encrypt the message so that it cannot be understood by an enemy observer. Using the theory of reciprocity for antennas and electromagnetic propagation, a key distribution method is proposed that uses the ultrawideband (UWB) channel pulse response betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical Models for Assessing the Individuality of Fingerprints

    Publication Year: 2007, Page(s):391 - 401
    Cited by:  Papers (31)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2214 KB) | HTML iconHTML

    Following the Daubert ruling in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of the U.S. versus Byron C. Mitchell and, subsequently, in 20 other cases involving fingerprint evidence. The main concern with the admissibility of fingerprint evidence is the problem of individualization, namely, that the fundamental premise for asserting the uniqueness of fingerpr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Memetic Fingerprint Matching Algorithm

    Publication Year: 2007, Page(s):402 - 412
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (631 KB) | HTML iconHTML

    Minutiae point pattern matching is the most common approach for fingerprint verification. Although many minutiae point pattern matching algorithms have been proposed, reliable automatic fingerprint verification remains as a challenging problem, both with respect to recovering the optimal alignment and the construction of an adequate matching function. In this paper, we develop a memetic fingerprin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry

    Publication Year: 2007, Page(s):413 - 429
    Cited by:  Papers (60)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2822 KB) | HTML iconHTML

    This paper proposes novel ways to deal with pose variations in a 2-D face recognition scenario. Using a training set of sparse face meshes, we built a point distribution model and identified the parameters which are responsible for controlling the apparent changes in shape due to turning and nodding the head, namely the pose parameters. Based on them, we propose two approaches for pose correction:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Warping-Based Offline Signature Recognition

    Publication Year: 2007, Page(s):430 - 437
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (840 KB) | HTML iconHTML

    Offline signature recognition is an important form of biometric identification that can be used for various purposes. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. In this paper, we explore a novel approach for reducing the variability associated with matching signatures based on curve warping. Existing techniques, such as th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing Digital Forgeries in Interlaced and Deinterlaced Video

    Publication Year: 2007, Page(s):438 - 449
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1759 KB) | HTML iconHTML

    With the advent of high-quality digital video cameras and sophisticated video editing software, it is becoming increasingly easier to tamper with digital video. A growing number of video surveillance cameras are also giving rise to an enormous amount of video data. The ability to ensure the integrity and authenticity of these data poses considerable challenges. We describe two techniques for detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing Digital Forgeries in Complex Lighting Environments

    Publication Year: 2007, Page(s):450 - 461
    Cited by:  Papers (130)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1551 KB) | HTML iconHTML

    The availability of sophisticated digital imaging technology has given rise to digital forgeries that are increasing in sophistication and frequency. We describe a technique for exposing such fakes by detecting inconsistencies in lighting. We show how to approximate complex lighting environments with a low-dimensional model and, further, how to estimate the model's parameters from a single image. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unicity Distance of Robust Image Hashing

    Publication Year: 2007, Page(s):462 - 467
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (502 KB) | HTML iconHTML

    An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image similarity comparison. Usually, an image-hashing scheme is required to be robust and secure, and the security issue is particularly important in applications, such as multimedia authentication, watermarking, and fingerprinting. In this paper,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure

    Publication Year: 2007, Page(s):468 - 484
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (889 KB) | HTML iconHTML

    In this paper, we propose a new family of wireless networks-the multimodal wireless networks. These networks offer multiple functionalities realized on the same infrastructure. A multimodal wireless network has two modes of operation: 1) the communication mode, when the network is used as a traditional wireless communication network, and 2) the surveillance mode, when the network is used as a dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2007, Page(s): 485
    Request permission for commercial reuse | |PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2007, Page(s):486 - 487
    Request permission for commercial reuse | |PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 2008 IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'08)

    Publication Year: 2007, Page(s): 488
    Request permission for commercial reuse | |PDF file iconPDF (487 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2007, Page(s): C3
    Request permission for commercial reuse | |PDF file iconPDF (31 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy