By Topic

Information Forensics and Security, IEEE Transactions on

Issue 3 • Date March 2013

Filter Results

Displaying Results 1 - 25 of 26
  • Front Cover

    Publication Year: 2013 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (336 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 425 - 426
    Save to Project icon | Request Permissions | PDF file iconPDF (170 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 427 - 428
    Save to Project icon | Request Permissions | PDF file iconPDF (171 KB)  
    Freely Available from IEEE
  • Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems

    Publication Year: 2013 , Page(s): 429 - 439
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1587 KB) |  | HTML iconHTML  

    Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent. Existing cloning attack detection methods are enslaved to the knowledge of tag identifiers (IDs). Tag IDs, however, should be protected to enable and secure privacy-sensitive applications in anonymous RFID systems. In a first step, this paper tackles cloning attack detection in anonymous RFID syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Security Degree of Freedom in Multiuser and Multieve Systems

    Publication Year: 2013 , Page(s): 440 - 449
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2147 KB) |  | HTML iconHTML  

    Secure communication in the multiuser and multieavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits an information-bearing signal to the intended receivers and artificial noise to confuse the eavesdroppers. Several processing schemes have been proposed to limit the cochannel interference (CCI). In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Source Identification Game: An Information-Theoretic Perspective

    Publication Year: 2013 , Page(s): 450 - 463
    Cited by:  Papers (15)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2785 KB) |  | HTML iconHTML  

    We introduce a theoretical framework in which to cast the source identification problem. Thanks to the adoption of a game-theoretic approach, the proposed framework permits us to derive the ultimate achievable performance of the forensic analysis in the presence of an adversary aiming at deceiving it. The asymptotic Nash equilibrium of the source identification game is derived under an assumption ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection

    Publication Year: 2013 , Page(s): 464 - 476
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3344 KB) |  | HTML iconHTML  

    This paper investigates the detection of information hidden in digital media by the least significant bit (LSB) matching scheme. In a theoretical context of known medium parameters, two important results are presented. First, based on the likelihood ratio test, we present a test that asymptotically maximizes the detection power whatever the embedding rate might be. Second, the statistical properti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Timing Channel Spyware for the CSMA/CA Protocol

    Publication Year: 2013 , Page(s): 477 - 487
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1281 KB) |  | HTML iconHTML  

    This paper presents the design and implementation of spyware communication circuits built into the widely used carrier sense multiple access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of LBP, Intensity, and Shape

    Publication Year: 2013 , Page(s): 488 - 499
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2785 KB) |  | HTML iconHTML  

    In this paper, we report our extension of the use of feature selection based on mutual information and feature fusion to improve gender classification of face images. We compare the results of fusing three groups of features, three spatial scales, and four different mutual information measures to select features. We also showed improved results by fusion of LBP features with different radii and sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

    Publication Year: 2013 , Page(s): 500 - 509
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1546 KB) |  | HTML iconHTML  

    N-gram analysis is an approach that investigates the structure of a program using bytes, characters, or text strings. A key issue with N-gram analysis is feature selection amidst the explosion of features that occurs when N is increased. The experiments within this paper represent programs as operational code (opcode) density histograms gained through dynamic analysis. A support vector machine is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Sensitive Subspace Analysis and Extensions for Face Recognition

    Publication Year: 2013 , Page(s): 510 - 519
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1602 KB) |  | HTML iconHTML  

    Conventional subspace-based face recognition methods seek low-dimensional feature subspaces to achieve high classification accuracy and assume the same loss from different types of misclassification. This assumption, however, may not hold in many practical face recognition systems as different types of misclassification could lead to different losses. Motivated by this concern, this paper proposes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for EEG-Based Concealed Information Test

    Publication Year: 2013 , Page(s): 520 - 527
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1352 KB) |  | HTML iconHTML  

    Forensic electroencephalogram (EEG)-based lie detection has recently begun using the concealed information test (CIT) as a potentially more robust alternative to the classical comparative questions test. The main problem with using CIT is that it requires an objective and fast decision algorithm under the constraint of limited available information. In this study, we developed a simple and feasibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes

    Publication Year: 2013 , Page(s): 528 - 541
    Cited by:  Papers (1)
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2345 KB)  

    We present a new attack called the snoop-forge-replay attack on keystroke-based continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and is not specific to any particular keystroke-based continuous verification method or system. It can be launched with easily available keyloggers and APIs for keystroke synthesis. Our results from 2640 experiments show that: 1) t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder

    Publication Year: 2013 , Page(s): 542 - 552
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (2688 KB) |  | HTML iconHTML  

    In this paper, the reconstruction of the feedback polynomial as well as the initial state of a linear feedback shift register (LFSR) in a synchronous scrambler placed after a channel encoder is studied. The study is first based on the assumption that the channel is noiseless and then extended to the noisy channel condition. The dual words, which are orthogonal to the codewords generated by the cha... View full abstract»

    Open Access
  • Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

    Publication Year: 2013 , Page(s): 553 - 562
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2659 KB) |  | HTML iconHTML  

    Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing

    Publication Year: 2013 , Page(s): 563 - 577
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1274 KB) |  | HTML iconHTML  

    Secure “pairing” of wireless devices based on auxiliary or out-of-band (OOB)-audio, visual, or tactile-communication is a well-established research direction. Specifically, authenticated as well as secret OOB (AS-OOB) channels have been shown to be quite useful for this purpose. Pairing can be achieved by simply transmitting the key or short password over the AS-OOB channel, avoiding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques

    Publication Year: 2013 , Page(s): 578 - 587
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1252 KB) |  | HTML iconHTML  

    Blind steganalysis of JPEG images is addressed by modeling the correlations among the DCT coefficients using K -variate (K ≥ 2) p.d.f. estimates (p.d.f.s) constructed by means of Markov random field (MRF) cliques. The reasoning of using high variate p.d.f.s together with MRF cliques for image steganalysis is explained via a classical detection problem. Although our approach ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2013 , Page(s): 588
    Save to Project icon | Request Permissions | PDF file iconPDF (5 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security - EDICS

    Publication Year: 2013 , Page(s): 589
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013 , Page(s): 590 - 591
    Save to Project icon | Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • J-STSP call for special issue proposals

    Publication Year: 2013 , Page(s): 592
    Save to Project icon | Request Permissions | PDF file iconPDF (764 KB)  
    Freely Available from IEEE
  • IEEE Xplore Digital Library

    Publication Year: 2013 , Page(s): 593
    Save to Project icon | Request Permissions | PDF file iconPDF (1793 KB)  
    Freely Available from IEEE
  • Open Access

    Publication Year: 2013 , Page(s): 594
    Save to Project icon | Request Permissions | PDF file iconPDF (1156 KB)  
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy