By Topic

Information Forensics and Security, IEEE Transactions on

Issue 2 • Date June 2010

Filter Results

Displaying Results 1 - 22 of 22
  • Table of contents

    Publication Year: 2010 , Page(s): C1 - C4
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2010 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Edge Adaptive Image Steganography Based on LSB Matching Revisited

    Publication Year: 2010 , Page(s): 201 - 214
    Cited by:  Papers (39)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (6400 KB) |  | HTML iconHTML  

    The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis by Subtractive Pixel Adjacency Matrix

    Publication Year: 2010 , Page(s): 215 - 224
    Cited by:  Papers (62)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    This paper presents a method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching. First, arguments are provided for modeling the differences between adjacent pixels using first-order and second-order Markov chains. Subsets of sample transition probability matrices ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

    Publication Year: 2010 , Page(s): 225 - 239
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1080 KB) |  | HTML iconHTML  

    In matrix embedding (ME)-based steganography, the host coefficients are minimally perturbed such that the transmitted bits fall in a coset of a linear code, with the syndrome conveying the hidden bits. The corresponding embedding distortion and vulnerability to steganalysis are significantly less than that of conventional quantization index modulation (QIM)-based hiding. However, ME is less robust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information-Theoretically Secret Key Generation for Fading Wireless Channels

    Publication Year: 2010 , Page(s): 240 - 254
    Cited by:  Papers (56)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1318 KB) |  | HTML iconHTML  

    The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind Authentication: A Secure Crypto-Biometric Verification Protocol

    Publication Year: 2010 , Page(s): 255 - 268
    Cited by:  Papers (15)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1093 KB) |  | HTML iconHTML  

    Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key Extraction From General Nondiscrete Signals

    Publication Year: 2010 , Page(s): 269 - 279
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (442 KB) |  | HTML iconHTML  

    We address the problem of designing optimal schemes for the generation of secure cryptographic keys from continuous noisy data. We argue that, contrary to the discrete case, a universal fuzzy extractor does not exist. This implies that in the continuous case, key extraction schemes have to be designed for particular probability distributions. We extend the known definitions of the correctness and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source Camera Identification Using Enhanced Sensor Pattern Noise

    Publication Year: 2010 , Page(s): 280 - 287
    Cited by:  Papers (24)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (794 KB) |  | HTML iconHTML  

    Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints of imaging devices, have been proved as an effective way for digital device identification. However, as we demonstrate in this work, the limitation of the current method of extracting SPNs is that the SPNs extracted from images can be severely contaminated by details from scenes, and as a result, the identific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Network Anomaly Detection and Visualization

    Publication Year: 2010 , Page(s): 288 - 299
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1701 KB) |  | HTML iconHTML  

    Various approaches have been developed for quantifying and displaying network traffic information for determining network status and in detecting anomalies. Although many of these methods are effective, they rely on the collection of long-term network statistics. Here, we present an approach that uses short-term observations of network features and their respective time averaged entropies. Acute c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-Based Traitor-Tracing Technique Using Traffic Pattern

    Publication Year: 2010 , Page(s): 300 - 313
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1198 KB) |  | HTML iconHTML  

    Today, with the rapid advance in broadband technology, streaming technology is applied to many applications, such as content delivery systems and web conference systems. On the other hand, we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM systems, and enables content... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Embedding in Electronic Inks

    Publication Year: 2010 , Page(s): 314 - 323
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1062 KB) |  | HTML iconHTML  

    This paper presents a novel lossless data embedding algorithm for electronic inks. The proposed algorithm first computes the analytical ink-curve for each stroke as a set of smoothly concatenated cubic Bezier curves. During embedding, a set of data carrier points on the ink-curve are evaluated, perturbed, and then inserted into the original point array. Our proposed smooth ink-curve generation met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing Witness Anonymity Under Peer-to-Peer Settings

    Publication Year: 2010 , Page(s): 324 - 336
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (534 KB) |  | HTML iconHTML  

    In this paper, we introduce the concept of witness anonymity for peer-to-peer systems, as well as other systems with the peer-to-peer nature. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest peers who report on the misbehavior of other peers) and accountability (for malicious peers that attempt to misuse the anonymity feature to slander honest peers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Leakage in Fuzzy Commitment Schemes

    Publication Year: 2010 , Page(s): 337 - 348
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (461 KB) |  | HTML iconHTML  

    In 1999, Juels and Wattenberg introduced the fuzzy commitment scheme. This scheme is a particular realization of a binary biometric secrecy system with chosen secret keys. It became a popular technique for designing biometric secrecy systems, since it is convenient and easy to implement using standard error-correcting codes. This paper investigates privacy- and secrecy-leakage in fuzzy commitment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SVD-Based Universal Spatial Domain Image Steganalysis

    Publication Year: 2010 , Page(s): 349 - 353
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (268 KB) |  | HTML iconHTML  

    This paper is concerned with the universal (blind) image steganalysis problem and introduces a novel method to detect especially spatial domain steganographic methods. The proposed steganalyzer models linear dependencies of image rows/columns in local neighborhoods using singular value decomposition transform and employs content independency provided by a Wiener filtering process. Experimental res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Automatic Identification of Signatures of Steganography Software

    Publication Year: 2010 , Page(s): 354 - 358
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (115 KB) |  | HTML iconHTML  

    A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized regularities in output media caused by weak implementations of steganography algorithms. Fast and accurate detection of steganography is demonstrated experimentally here across a range of media types and a variety of steganography... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2010 , Page(s): 359
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2010 , Page(s): 360 - 361
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Special issue on Using the Physical the Layer for Securing the Next Generation of Communication Systems

    Publication Year: 2010 , Page(s): 362
    Save to Project icon | Request Permissions | PDF file iconPDF (140 KB)  
    Freely Available from IEEE
  • Special issue on New Frontiers in Rich Transcription

    Publication Year: 2010 , Page(s): 363
    Save to Project icon | Request Permissions | PDF file iconPDF (126 KB)  
    Freely Available from IEEE
  • Special issue on Adaptive Sparse Representation of Data and Applications in Signal and Image Processing

    Publication Year: 2010 , Page(s): 364
    Save to Project icon | Request Permissions | PDF file iconPDF (141 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2010 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy