By Topic

Information Forensics and Security, IEEE Transactions on

Issue 1 • Date March 2009

Filter Results

Displaying Results 1 - 20 of 20
  • Table of contents

    Publication Year: 2009 , Page(s): C1 - C4
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Editorial

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (158 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2009 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Spread-Spectrum Watermarking Security

    Publication Year: 2009 , Page(s): 2 - 24
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1059 KB) |  | HTML iconHTML  

    This paper presents both theoretical and practical analyses of the security offered by watermarking and data hiding methods based on spread spectrum. In this context, security is understood as the difficulty of estimating the secret parameters of the embedding function based on the observation of watermarked signals. On the theoretical side, the security is quantified from an information-theoretic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hyperbolic RDM for Nonlinear Valumetric Distortions

    Publication Year: 2009 , Page(s): 25 - 35
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (676 KB) |  | HTML iconHTML  

    Quantization-based watermarking techniques are sensitive to valumetric scaling, a wide class of distortions applied to images and videos, such as contrast change or gamma correction. Several methods have been proposed to counteract valumetric attacks, but the common approach to the problem is to take only the linear ones into account. This paper presents an extension to the rational dither modulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Blind Watermarking of Point-Sampled Geometry

    Publication Year: 2009 , Page(s): 36 - 48
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2014 KB) |  | HTML iconHTML  

    Digital watermarking for copyright protection of 3-D meshes cannot be directly applied to point clouds, since we need to derive consistent connectivity information, which might change due to attacks, such as noise addition and cropping. Schemes for point clouds operate only on the geometric data and, hence, are generic and applicable to mesh-based representations of 3-D models. For building generi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Motion-Incoherent Components in Video Streams

    Publication Year: 2009 , Page(s): 49 - 58
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (661 KB) |  | HTML iconHTML  

    Motion coherency has recently been identified as a desirable property for watermarks embedded within video streams in order to withstand temporal frame averaging along the motion axis. Nevertheless, no tool has been proposed to easily evaluate the motion coherency of a given watermarking system. Today, this assessment relies on a computationally expensive procedure, namely, (1) embed a watermark, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprinting With Minimum Distance Decoding

    Publication Year: 2009 , Page(s): 59 - 69
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (843 KB) |  | HTML iconHTML  

    This paper adopts an information-theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates. Achievable rates, under this detection rule, are characterized in two scenarios. First, we consider the averaging attack where a random coding argument is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding Schemes for Relay-Assisted Information Embedding

    Publication Year: 2009 , Page(s): 70 - 85
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    Cooperative information embedding deals with the problem of embedding unperceived information into some cover signal by different users or partners, cooperatively. It models applications in which embedded signals, or watermarks, transmitted over wireless networks need to be reinforced in order to withstand channel impairments. In cooperative information embedding, each embedder that can reinforce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Implementation of the Discrete Fourier Transform in the Encrypted Domain

    Publication Year: 2009 , Page(s): 86 - 97
    Cited by:  Papers (17)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (602 KB) |  | HTML iconHTML  

    Signal-processing modules working directly on encrypted data provide an elegant solution to application scenarios where valuable signals must be protected from a malicious processing device. In this paper, we investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain by using the homomorphic properties of the underlying cryptosystem. Several important issues are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal Authentication Using Finger Knuckle Surface

    Publication Year: 2009 , Page(s): 98 - 110
    Cited by:  Papers (33)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4294 KB) |  | HTML iconHTML  

    This paper investigates a new approach for personal authentication using fingerback surface imaging. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. The finger geometry features can be simultaneously acquired from the same image at the same time and integrated to further improve the user-identification accuracy o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Face Recognition via Narrowband Spectral Range Selection Using Jeffrey Divergence

    Publication Year: 2009 , Page(s): 111 - 122
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3557 KB) |  | HTML iconHTML  

    In order to achieve improved recognition performance in comparison with conventional broadband images, this paper addresses a new method that automatically specifies the optimal spectral range for multispectral face images according to given illuminations. The novelty of our method lies in the introduction of a distribution separation measure and the selection of the optimal spectral range by rank... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scanner Identification Using Feature-Based Processing and Analysis

    Publication Year: 2009 , Page(s): 123 - 139
    Cited by:  Papers (15)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3142 KB) |  | HTML iconHTML  

    Digital images can be obtained through a variety of sources including digital cameras and scanners. In many cases, the ability to determine the source of a digital image is important. This paper presents methods for authenticating images that have been acquired using flatbed desktop scanners. These methods use scanner fingerprints based on statistics of imaging sensor pattern noise. To capture dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks

    Publication Year: 2009 , Page(s): 140 - 150
    Cited by:  Papers (11)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (812 KB) |  | HTML iconHTML  

    Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure monitoring, etc. Such mission-critical applications demand that security service be ldquoanywhere,rdquo ldquoanytime,rdquo and ldquoanyhow.rdquo However, it is challenging to design a key management scheme in current mission-critical networks to fulfill the required attributes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic Behavior of the ZZW Embedding Construction

    Publication Year: 2009 , Page(s): 151 - 154
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    We analyze the asymptotic behavior of the embedding construction for steganography proposed by Zhang, Zhang, and Wang (ZZW) at the 10th information hiding by deriving a closed-form expression for the limit between embedding efficiency of the ZZW construction and the theoretical upper bound as a function of relative payload. This result confirms the experimental observation made in the original pub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing Digital Forgeries From JPEG Ghosts

    Publication Year: 2009 , Page(s): 154 - 160
    Cited by:  Papers (71)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1175 KB) |  | HTML iconHTML  

    When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head onto another person's body. If these images were originally of different JPEG compression quality, then the digital composite may contain a trace of the original compression qualities. To this end, we describe a technique to detect whether the part of an image was initi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2009 , Page(s): 161
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2009 , Page(s): 162 - 163
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • IEEE International Workshop on Information Forensics and Security (WIFS)

    Publication Year: 2009 , Page(s): 164
    Save to Project icon | Request Permissions | PDF file iconPDF (590 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2009 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy