By Topic

IEEE Transactions on Information Forensics and Security

Issue 2 • Date June 2009

Filter Results

Displaying Results 1 - 16 of 16
  • Table of contents

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2009, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks

    Publication Year: 2009, Page(s):165 - 178
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Due to the dynamic, distributed, and heterogeneous nature of today's networks, intrusion detection systems (IDSs) have become a necessary addition to the security infrastructure and are widely deployed as a complementary line of defense to classical security approaches. In this paper, we address the intrusion detection problem in heterogeneous networks consisting of nodes with different noncorrela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication

    Publication Year: 2009, Page(s):179 - 192
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB) | HTML iconHTML

    This paper studies the problem of achieving watermark semifragility in watermark-based authentication systems through a composite hypothesis testing approach. Embedding a semifragile watermark serves to distinguish legitimate distortions caused by signal-processing manipulations from illegitimate ones caused by malicious tampering. This leads us to consider authentication verification as a composi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents

    Publication Year: 2009, Page(s):193 - 206
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2001 KB) | HTML iconHTML

    A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requireme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms

    Publication Year: 2009, Page(s):207 - 216
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1421 KB) | HTML iconHTML

    This paper presents a novel and flexible benchmarking tool based on genetic algorithms (GA) and designed to assess the robustness of any digital image watermarking system. The main idea is to evaluate robustness in terms of perceptual quality, measured by weighted peak signal-to-noise ratio. Through a stochastic approach, we optimize this quality metric, by finding the minimal degradation that nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition Under Occlusions and Variant Expressions With Partial Similarity

    Publication Year: 2009, Page(s):217 - 230
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2234 KB) | HTML iconHTML

    Recognition in uncontrolled situations is one of the most important bottlenecks for practical face recognition systems. In particular, few researchers have addressed the challenge to recognize noncooperative or even uncooperative subjects who try to cheat the recognition system by deliberately changing their facial appearance through such tricks as variant expressions or disguise (e.g., by partial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parametric Correlation Framework for the Statistical Evaluation and Estimation of Biometric-Based Classification Performance in a Single Environment

    Publication Year: 2009, Page(s):231 - 241
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In this paper, we propose parametric correlation models for the assessment of biometric classification error rates. Correctly specified correlations are integral to variance estimation and the corresponding inferential quantities which depend upon these estimates. We present methodology here for false match and false nonmatch error rates for a single environment. This paper generalizes other work ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation

    Publication Year: 2009, Page(s):242 - 256
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1038 KB) | HTML iconHTML

    In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurrent downlink transmissions. In this paper, this basic idea is explored from an information-theoretic standpoint by focusing on a two-cell scenario where the involved base stations (BSs) are connected via a finite-capacity b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations

    Publication Year: 2009, Page(s):257 - 267
    Cited by:  Papers (13)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Modern obfuscation techniques are intended to discourage reverse engineering and malicious tampering of software programs. We study control-flow obfuscation, which works by modifying the control flow of the program to be obfuscated, and observe that it is difficult to evaluate the robustness of these obfuscation techniques. In this paper, we present a framework for quantitative analysis of control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2009, Page(s): 268
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2009, Page(s):269 - 270
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • IEEE International Symposium on Signal Processing and Information Technology

    Publication Year: 2009, Page(s): 271
    Request permission for commercial reuse | PDF file iconPDF (550 KB)
    Freely Available from IEEE
  • Special issue on Processing Reverberant Speech

    Publication Year: 2009, Page(s): 272
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2009, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Blank page [back cover]

    Publication Year: 2009, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy