By Topic

IEEE Transactions on Information Forensics and Security

Issue 5 • May 2013

Filter Results

Displaying Results 1 - 21 of 21
  • Front Cover

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):701 - 702
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):703 - 704
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Payload Attribution via Character Dependent Multi-Bloom Filters

    Publication Year: 2013, Page(s):705 - 716
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2015 KB) | HTML iconHTML

    Network forensic analysts employ payload attribution systems (PAS) as an investigative tool, which enables them to store and summarize large amounts of network traffic, including full packet payload. Hence an investigator could query the system for a specific string and check whether any of the packets transmitted previously in the network contained that specific string. As a shortcoming, the prev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical-Layer Security in Distributed Wireless Networks Using Matching Theory

    Publication Year: 2013, Page(s):717 - 732
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4363 KB) | HTML iconHTML

    We consider the use of physical-layer security in a wireless communication system where multiple jamming nodes assist multiple source-destination nodes in combating unwanted eavesdropping from a single eavesdropper. In particular, we propose a distributed algorithm that matches each source-destination pair with a particular jammer. Our algorithm caters for three channel state information (CSI) ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes

    Publication Year: 2013, Page(s):733 - 743
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5300 KB) | HTML iconHTML

    A conventional threshold (k out of n) visual secret sharing scheme encodes one secret image P into n transparencies (called shares) such that any group of k transparencies reveals P when they are superimposed, while that of less than k ones cannot. We define and develop general constructions for threshold multiple-secret visual cryptographic schemes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model

    Publication Year: 2013, Page(s):744 - 753
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1900 KB) | HTML iconHTML Multimedia Media

    Estimation of the parameters of the electric network signal, usually present in many audio and video recordings, is known to have several important forensic applications. In this paper, we consider the problem of estimating the base frequency and signal to noise ratio (SNR). Although the electric network signal is present via its base frequency and its integer multiplies, recent estimators in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks

    Publication Year: 2013, Page(s):754 - 768
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2184 KB) | HTML iconHTML

    We deal with the challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, compared to the extensive exploration on the defense against node replication attacks in static networks, only a few solutions in mobile networks have been presented. Moreover, while most of the existing schemes in static networks rely on the witness-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hashing Based Fast Palmprint Identification for Large-Scale Databases

    Publication Year: 2013, Page(s):769 - 778
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1528 KB) | HTML iconHTML

    In this paper, we present two hashing based techniques for fast palmprint identification. We first propose three properties required by a hash function and then introduce our first fast identification method based on orientation pattern (OP) hashing. We give the definition of OP and demonstrate that it meets all the requirements of the hash function, and thus, would be appropriate for hashing base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding

    Publication Year: 2013, Page(s):779 - 788
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2662 KB) | HTML iconHTML

    Recently, code construction approaching the rate-distortion bound of reversible data hiding has been proposed by Lin , in which the coding/decoding process needs the optimal probability distribution of marked-signals as parameters. Therefore, the efficiency and accuracy of estimating the optimal marked-signal distribution will greatly influence the speeds of encoding and decoding. In this paper, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D Face Recognition Under Occlusion Using Masked Projection

    Publication Year: 2013, Page(s):789 - 802
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2001 KB) | HTML iconHTML

    With advances in sensor technology, the three-dimensional (3-D) face has become an emerging biometric modality, preferred especially in high security applications. However, dealing with occlusions covering the facial surface is a great challenge, which should be handled to enable applicability to fully automatic security systems. In this paper, we propose a fully automatic 3-D face recognition sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Related Key Chosen IV Attack on Grain-128a Stream Cipher

    Publication Year: 2013, Page(s):803 - 809
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1780 KB) | HTML iconHTML

    The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Ågren, Hell, Johansson, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware

    Publication Year: 2013, Page(s):810 - 820
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1617 KB) | HTML iconHTML

    Cryptanalysis, i.e., the study of methods for breaking cryptographic algorithms, can greatly benefit from hardware acceleration as a key aspect enabling high-performance attacks. This work investigates the new opportunities inherently provided by a particular class of hardware technologies, i.e., reconfigurable hardware devices, addressing the cryptanalysis of the SHA-1 hash function as a case stu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data

    Publication Year: 2013, Page(s):821 - 828
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1462 KB) | HTML iconHTML

    The concept of legal professional privilege (LPP) in the Common Law is to enable a client to make full disclosure to his legal advisor for seeking advice without worrying that anything so disclosed will be used against him. Thus, some of the communications and documents between a legal advisor and his client can be excluded as evidence for prosecution. Protection of LPP information in the physical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2013, Page(s):829 - 830
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2013, Page(s): 831
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):832 - 833
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Call for Papers: IEEE Signal Processing Society, IEEE Journal of Selected Topics in Signal Processing - Special Issue on Perception Inspired Video Processing

    Publication Year: 2013, Page(s): 834
    Request permission for commercial reuse | PDF file iconPDF (523 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy