By Topic

IEEE Transactions on Information Forensics and Security

Issue 4 • April 2013

Filter Results

Displaying Results 1 - 20 of 20
  • Front Cover

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):589 - 590
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):591 - 592
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence

    Publication Year: 2013, Page(s):593 - 607
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2741 KB) | HTML iconHTML

    In this work, we present a decision fusion strategy for image forensics. We define a framework that exploits information provided by available forensic tools to yield a global judgment about the authenticity of an image. Sources of information are modeled and fused using Dempster-Shafer Theory of Evidence, since this theory allows us to handle uncertain answers from tools and lack of knowledge abo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection

    Publication Year: 2013, Page(s):608 - 618
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1968 KB) | HTML iconHTML

    We propose in this paper a novel technique to correlate statistical image noise features with three EXchangeable Image File format (EXIF) header features for manipulation detection. By formulating each EXIF feature as a weighted sum of selected statistical image noise features using sequential floating forward selection, the weights are then solved as a least squares solution for modeling the corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks

    Publication Year: 2013, Page(s):619 - 625
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1357 KB) | HTML iconHTML

    In wireless sensor networks (WSNs), security and energy consumption have been considered as long-lasting technical challenges as sensors usually suffer from complexity and energy constraints. In this paper, we study a simple and efficient physical-layer security to provide data confidentiality in a distributed detection scenario. In particular, to prevent passive eavesdropping on transmitting data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Global and Local Structure Discriminant Analysis

    Publication Year: 2013, Page(s):626 - 635
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1745 KB) | HTML iconHTML

    Linear discriminant analysis (LDA) only considers the global Euclidean geometrical structure of data for dimensionality reduction. However, previous works have demonstrated that the local geometrical structure is effective for dimensionality reduction. In this paper, a novel approach is proposed, namely Joint Global and Local-structure Discriminant Analysis (JGLDA), for linear dimensionality reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts

    Publication Year: 2013, Page(s):636 - 645
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2148 KB) | HTML iconHTML

    It has long been held that errors in received noisy ciphertexts should be eliminated using as many as possible powerful error correcting codes in order to reduce the avalanche effect on legitimate users' performance in block ciphered systems. However, the negative effect of erroneous ciphertexts on cryptanalysis by an eavesdropper has not been well understood, nor the possible measurable trade-off... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map

    Publication Year: 2013, Page(s):646 - 656
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1528 KB) | HTML iconHTML

    In the study of power grid security, the cascading failure analysis in multi-contingency scenarios has been a challenge due to its topological complexity and computational cost. Both network analyses and load ranking methods have their own limitations. In this paper, based on self-organizing map (SOM), we propose an integrated approach combining spatial feature (distance)-based clustering with ele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Electronic English Auction System With a Secure On-Shelf Mechanism

    Publication Year: 2013, Page(s):657 - 668
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2910 KB) | HTML iconHTML

    With the advances of network technology, electronic auctions have become increasingly popular in recent years. In 2012, Xiong proposed a bidder-anonymous auction scheme based on revocable ring signature to enhance the computation efficiency and provide a dispute protocol. Nevertheless, we find that it has design weaknesses and is vulnerable to denial-of-service attacks. Furthermore, in an actual e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code

    Publication Year: 2013, Page(s):669 - 681
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1065 KB) | HTML iconHTML

    Software code released to the user has the risk of reverse engineering attacks. Software obfuscation techniques can be employed to make the reverse engineering of software programs harder. In this paper, we propose a potent, stealthy, and cost-effective algorithm to obfuscate software programs. The main idea of the algorithm is to remove control flow information from the code area and hide them in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security

    Publication Year: 2013, Page(s):682 - 694
    Cited by:  Papers (72)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3518 KB) | HTML iconHTML

    A wireless network with one source, one destination, one eavesdropper, and multiple decode-and-forward relays is considered. A two-slot cooperative relaying scheme is proposed that targets at maximizing the secrecy rate. In the first slot, the source transmits the information bearing signal, and at the same time, it cooperates with the destination in jamming the eavesdropper without creating inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security - EDICS

    Publication Year: 2013, Page(s): 695
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):696 - 697
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • J-STSP call for special issue proposals

    Publication Year: 2013, Page(s): 698
    Request permission for commercial reuse | PDF file iconPDF (764 KB)
    Freely Available from IEEE
  • IEEE Xplore Digital Library

    Publication Year: 2013, Page(s): 699
    Request permission for commercial reuse | PDF file iconPDF (1792 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2013, Page(s): 700
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy