IEEE Transactions on Information Forensics and Security

Issue 2 • Feb. 2013

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (298 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):269 - 270
    Request permission for commercial reuse | |PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):271 - 272
    Request permission for commercial reuse | |PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Detecting Covert Channels in Computer Networks Based on Chaos Theory

    Publication Year: 2013, Page(s):273 - 282
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1657 KB) | HTML iconHTML

    Covert channels via the widely used TCP/IP protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in TCP/IP protocols and propose a new effective method to detect the existence of hidden information in TCP initial sequence numbers (ISNs), which is known as one of the most difficult covert channels to be detected. Our method uses phase s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online/Offline Signatures for Low-Power Devices

    Publication Year: 2013, Page(s):283 - 294
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3017 KB) | HTML iconHTML

    When digital signature is applied on low-power devices, like smart cards, wireless sensors and RFID tags, some specific properties, e.g., better offline storage, more modular and flexible deployment, are desired. To meet these needs, a new variant of the Fiat-Shamir transformation for digital signatures, referred to as Γ -transformation, is introduced and formalized in this work. Following ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition

    Publication Year: 2013, Page(s):295 - 304
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1670 KB) | HTML iconHTML

    A novel direction for efficiently describing face images is proposed by exploring the relationships between both gradient orientations and magnitudes of different local image structures. Presented in this paper are not only a novel feature set called patterns of orientation difference (POD) but also several improvements to our previous algorithm called patterns of oriented edge magnitudes (POEM). ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics

    Publication Year: 2013, Page(s):305 - 313
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1931 KB) | HTML iconHTML

    This paper presents a novel method of fusing multiple biometrics on the matching score level. We estimate the likelihood ratios of the fused biometric scores, via individual receiver operating characteristics (ROC) which construct the Naive Bayes classifier. Using a limited number of operation points on the ROC, we are able to realize reliable and robust estimation of the Naive Bayes probability w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels

    Publication Year: 2013, Page(s):314 - 323
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1885 KB) | HTML iconHTML

    This paper investigates physical-layer security-energy trade-offs from an information theoretic perspective. The metric of partial secrecy is introduced as the amount of distortion that can be guaranteed at the eavesdropper, and three different channel models are proposed to capture various transmission strategies to achieve partial secrecy. It is shown that a range of secrecy-energy operating poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages

    Publication Year: 2013, Page(s):324 - 334
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3420 KB) | HTML iconHTML

    To increase the spectral efficiency of future wireless networks, it is important to wisely integrate multiple services at the physical layer. Here the efficient integration of confidential services in the three-node bidirectional relay channel is studied. A relay node establishes a bidirectional communication between two other nodes using a decode-and-forward protocol, which is also known as two-w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revealing the Traces of JPEG Compression Anti-Forensics

    Publication Year: 2013, Page(s):335 - 349
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2818 KB) | HTML iconHTML

    Due to the lossy nature of transform coding, JPEG introduces characteristic traces in the compressed images. A forensic analyst might reveal these traces by analyzing the histogram of discrete cosine transform (DCT) coefficients and exploit them to identify local tampering, copy-move forgery, etc. At the same time, it has been recently shown that a knowledgeable adversary can possibly conceal the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint Combination for Privacy Protection

    Publication Year: 2013, Page(s):350 - 360
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1977 KB) | HTML iconHTML

    We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Cover Quantization on Steganographic Fisher Information

    Publication Year: 2013, Page(s):361 - 373
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2973 KB) | HTML iconHTML

    The square-root law of imperfect steganography ties the embedding change rate and the cover length with statistical detectability. In this paper, we extend the law to consider the effects of cover quantization. Assuming the individual cover elements are quantized i.i.d. samples drawn from an underlying continuous-valued “precover” distribution, the steganographic Fisher information s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts

    Publication Year: 2013, Page(s):374 - 389
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2144 KB) | HTML iconHTML

    In this work, we propose and experiment a 3-D face recognition approach capable of performing accurate face matching also in the case where just parts of probe scans are available. This is obtained through an original face representation and matching solution that first extracts keypoints of the 3-D depth image of the face and then measures how the face depth changes along facial curves connecting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure RFID Tag Ownership Transfer Based on Quadratic Residues

    Publication Year: 2013, Page(s):390 - 401
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2728 KB) | HTML iconHTML

    In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preserving Data Sharing With Anonymous ID Assignment

    Publication Year: 2013, Page(s):402 - 413
    Cited by:  Papers (21)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2370 KB) | HTML iconHTML

    An algorithm for anonymous sharing of private data among N parties is developed. This technique is used iteratively to assign these nodes ID numbers ranging from 1 to N. This assignment is anonymous in that the identities received are unknown to the other members of the group. Resistance to collusion among other members is verified in an information theoretic sense when private commu... View full abstract»

    Open Access
  • On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT

    Publication Year: 2013, Page(s):414 - 419
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1125 KB) | HTML iconHTML

    We consider the secure transmission in ergodic fast Rayleigh fading multiple-input single-output single-antenna-eavesdropper (MISOSE) wiretap channels. We assume that the statistics of both the legitimate and eavesdropper channels are the only available channel state information at the transmitter (CSIT). By introducing a new secrecy capacity upper bound, we prove that the secrecy capacity is achi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013, Page(s): 420
    Request permission for commercial reuse | |PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):421 - 422
    Request permission for commercial reuse | |PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • J-STSP call for special issue proposals

    Publication Year: 2013, Page(s): 423
    Request permission for commercial reuse | |PDF file iconPDF (765 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2013, Page(s): 424
    Request permission for commercial reuse | |PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | |PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | |PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy