By Topic

IEEE Transactions on Information Forensics and Security

Issue 4 • Date Dec. 2007

Filter Results

Displaying Results 1 - 23 of 23
  • Table of contents

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2007, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking

    Publication Year: 2007, Page(s):645 - 654
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2727 KB) | HTML iconHTML

    Digital watermarking is an efficient and promising approach to protect intellectual property rights of digital media. Spread spectrum (SS) is one of the most widely used image watermarking schemes because of its robustness against attacks and its support for the exploitation of the properties of the human visual system (HVS). To maximize the watermark strength without introducing visual artifacts,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks

    Publication Year: 2007, Page(s):655 - 663
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2759 KB) | HTML iconHTML

    Synchronization is crucial to design a robust image watermarking scheme. In this paper, a novel feature-based image watermarking scheme against desynchronization attacks is proposed. The robust feature points, which can survive various signal-processing and affine transformation, are extracted by using the Harris-Laplace detector. A local characteristic region (LCR) construction method based on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks

    Publication Year: 2007, Page(s):664 - 682
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2290 KB) | HTML iconHTML

    This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decode-Time Forensic Watermarking of AAC Bitstreams

    Publication Year: 2007, Page(s):683 - 696
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1411 KB) | HTML iconHTML

    In digital rights-management systems, forensic watermarking complements encryption and deters the capture and unauthorized redistribution of the rendered content. In this paper, we propose a novel watermarking method which is integrated into the advanced audio coding (AAC) standard's decoding process. For predefined frequency bands, the method intercepts and modifies the scale factors, which are u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collusion-Resistant Video Fingerprinting for Large User Group

    Publication Year: 2007, Page(s):697 - 709
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1708 KB) | HTML iconHTML

    Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking copies of the content distributed to users. Most existing multimedia fingerprinting schemes consider a user set on the scale of thousands. However, in such real-world applications as video-on-demand distribution, the number of potential users can be as many as 10-100 million. This large user size dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant

    Publication Year: 2007, Page(s):710 - 720
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    Side channel attacks exploit physical information leaked during the operation of a cryptographic device (e.g., a smart card). The confidential data, which can be leaked from side channels, are timing of operations, power consumption, and electromagnetic emanation. In this paper, we propose a preprocessing method based on the fourth-order cumulant, which aims to improve the performance of side chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles

    Publication Year: 2007, Page(s):721 - 733
    Cited by:  Papers (45)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (758 KB) | HTML iconHTML

    Fingerprint indexing is a key technique in automatic fingerprint identification systems (AFIS). However, handling fingerprint distortion is still a problem. This paper concentrates on a more accurate fingerprint indexing algorithm that efficiently retrieves the top N possible matching candidates from a huge database. To this end, we design a novel feature based on minutia neighborhood struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of Fingerprint Image-Quality Estimation Methods

    Publication Year: 2007, Page(s):734 - 743
    Cited by:  Papers (82)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3387 KB) | HTML iconHTML

    One of the open issues in fingerprint verification is the lack of robustness against image-quality degradation. Poor-quality images result in spurious and missing features, thus degrading the performance of the overall system. Therefore, it is important for a fingerprint recognition system to estimate the quality and validity of the captured fingerprint images. In this work, we review existing app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint-Based Fuzzy Vault: Implementation and Performance

    Publication Year: 2007, Page(s):744 - 757
    Cited by:  Papers (188)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1821 KB) | HTML iconHTML

    Reliable information security mechanisms are required to combat the rising magnitude of identity theft in our society. While cryptography is a powerful tool to achieve information security, one of the main challenges in cryptosystems is to maintain the secrecy of the cryptographic keys. Though biometric authentication can be used to ensure that only the legitimate user has access to the secret key... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Projective Invariants in Hand Geometry Biometrics

    Publication Year: 2007, Page(s):758 - 768
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB) | HTML iconHTML

    Our research focuses on finding mathematical representations of biometric features that are not only distinctive, but also invariant to projective transformations. We have chosen hand geometry technology to work with, because it has wide public awareness and acceptance and most important, large space for improvement. Unlike the traditional hand geometry technologies, the hand descriptor in our han... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape-Driven Gabor Jets for Face Description and Authentication

    Publication Year: 2007, Page(s):769 - 780
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2096 KB) | HTML iconHTML

    This paper proposes, through the combination of concepts and tools from different fields within the computer vision community, an alternative path to the selection of key points in face images. The classical way of attempting to solve the face recognition problem using algorithms which encode local information is to localize a predefined set of points in the image, extract features from the region... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Horizontal and Vertical 2DPCA-Based Discriminant Analysis for Face Verification on a Large-Scale Database

    Publication Year: 2007, Page(s):781 - 792
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1757 KB) | HTML iconHTML

    This paper first discusses some theoretical properties of 2D principal component analysis (2DPCA) and then presents a horizontal and vertical 2DPCA-based discriminant analysis (HVDA) method for face verification. The HVDA method, which applies 2DPCA horizontally and vertically on the image matrices (2D arrays), achieves lower computational complexity than the traditional PCA and Fisher linear disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships

    Publication Year: 2007, Page(s):793 - 808
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1366 KB) | HTML iconHTML

    Many wireless networks are susceptible to spoofing attacks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via device authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management and more extensive computations. In this paper, we propose noncryptographic mechanisms that are complementary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to "A framework for robust watermarking of H.264 encoded video with controllable detection performance"

    Publication Year: 2007, Page(s): 809
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB) | HTML iconHTML

    In the March 2007 paper named above (pp. 14-23), the authors found the following error. The optimality of the detector is only valid for c = 2, which is a Gaussian distribution. The performance and results of the detector when c ≠ 2 as presented in the paper are still valid. However, in this case the detector is suboptimal. Equations (21)??(26) and (28) should be modified as described and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of Reviewers

    Publication Year: 2007, Page(s):810 - 811
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2007, Page(s): 812
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2007, Page(s):813 - 814
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Special issue on Integration of Context and Content for Multimedia Managemetn

    Publication Year: 2007, Page(s):815 - 816
    Request permission for commercial reuse | PDF file iconPDF (606 KB)
    Freely Available from IEEE
  • 2007 Index IEEE Transactions on Information Forensics and Security Vol. 2

    Publication Year: 2007, Page(s):817 - 827
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • 9th International Conference on Signal Processing (ICSP'08)

    Publication Year: 2007, Page(s): 828
    Request permission for commercial reuse | PDF file iconPDF (572 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2007, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy