By Topic

# IET Information Security

## Filter Results

Displaying Results 1 - 9 of 9
• ### Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification

Publication Year: 2011, Page(s):1 - 9
Cited by:  Papers (2)
| | PDF (651 KB)

The identification of a person on the basis of scanned images of handwriting is a useful biometric technique with application in forensic document analysis. This study describes the design and implementation of a system that identifies the writer using offline Arabic handwritten text. The key point is using multiple features to capture different aspects of handwriting individuality and to operate ... View full abstract»

• ### Steganalysis of JPEG steganography with complementary embedding strategy

Publication Year: 2011, Page(s):10 - 18
Cited by:  Papers (1)
| | PDF (224 KB)

Recently, a new high-performance JPEG steganography with a complementary embedding strategy (JPEG-CES) was presented. It can disable many specific steganalysers such as the Chi-square family and S family detectors, which have been used to attack J-Steg, JPHide, F5 and OutGuess successfully. In this work, a study on the security performance of JPEG-CES is reported. Our theoretical analysis demonstr... View full abstract»

• ### Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients

Publication Year: 2011, Page(s):19 - 25
Cited by:  Papers (3)
| | PDF (699 KB)

Robust audio hash function defines a feature vector that characterises the audio signal, independent of content preserving manipulations, such as MP3 compression, amplitude boosting/cutting, low-pass filtering etc. In this study, the authors propose a new audio hash function based on the non-negative matrix factorisation (NMF) of mel-frequency cepstral coefficients (MFCCs). Their work is motivated... View full abstract»

• ### Steganalysis of compressed speech to detect covert voice over Internet protocol channels

Publication Year: 2011, Page(s):26 - 32
Cited by:  Papers (7)
| | PDF (249 KB)

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are unused bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection ... View full abstract»

• ### Self-checking alternating logic bit-parallel gaussian normal basis multiplier with type-t

Publication Year: 2011, Page(s):33 - 42
Cited by:  Papers (2)
| | PDF (629 KB)

This work develops a novel self-checking alternating logic (SCAL) bit-parallel Gaussian normal basis (GNB) multiplier with type-t over GF(2m). The proposed GNB multiplier is with both concurrent error-detection and off-line testing capabilities. The concurrent error-detection capability can give countermeasure to fault-based cryptanalysis. The off-line testing capability supports the design-for-te... View full abstract»

• ### New watermark-removal method based on Eigen-image energy

Publication Year: 2011, Page(s):43 - 50
| | PDF (727 KB)

Most watermark-removal methods treat watermarks as noise and apply denoising approaches to remove them. However, denoising methods remove not only this watermark energy, but also some of the energy of the original image. A trade-off therefore exists: if not enough of the watermark is removed, then it will still be detected by probabilistic methods, but if too much is removed, the image quality wil... View full abstract»

• ### Cheating immune visual cryptography scheme

Publication Year: 2011, Page(s):51 - 59
Cited by:  Papers (2)
| | PDF (864 KB)

Most cheating immune visual cryptography schemes (CIVCS) are based on a traditional visual cryptography scheme (VCS) and are designed to avoid cheating when the secret image of the original VCS is to be recovered. However, all the known CIVCS have some drawbacks. Most usual drawbacks include the following: the scheme needs an online trusted authority, or it requires additional shares for the purpo... View full abstract»

• ### Hardware-software co-design of an iris recognition algorithm

Publication Year: 2011, Page(s):60 - 68
Cited by:  Papers (4)
| | PDF (460 KB)

This study describes the implementation of an iris recognition algorithm based on hardware-software co-design. The system architecture consists of a general-purpose 32-bit microprocessor and several slave coprocessors that accelerate the most intensive calculations. The whole iris recognition algorithm has been implemented on a low-cost Spartan 3 FPGA, achieving significant reduction in execution ... View full abstract»

• ### Quantum entanglement and non-locality based secure computation for future communication

Publication Year: 2011, Page(s):69 - 79
Cited by:  Papers (1)
| | PDF (823 KB)

Traditionally, the authors could establish secure computation protocols using variants of public key cryptology whose security is based on hard mathematics problems. However, classical protocols will become insecure owing to the emergence of quantum algorithms like Shors. In this paper, the authors demonstrate that nanoscale phenomenon can be applied not only in device level but also in high layer... View full abstract»

## Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

## Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org