By Topic

IEEE Transactions on Information Forensics and Security

Issue 8 • Date Aug. 2013

Filter Results

Displaying Results 1 - 21 of 21
  • Front Cover

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2141 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):1257 - 1258
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):1259 - 1260
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation

    Publication Year: 2013, Page(s):1261 - 1273
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9269 KB) | HTML iconHTML

    A new image decomposition scheme, called the adaptive directional total variation (ADTV) model, is proposed to achieve effective segmentation and enhancement for latent fingerprint images in this work. The proposed model is inspired by the classical total variation models, but it differentiates itself by integrating two unique features of fingerprints; namely, scale and orientation. The proposed A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks

    Publication Year: 2013, Page(s):1274 - 1279
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1002 KB) | HTML iconHTML

    The success of a side-channel attack depends mainly on three factors, namely, the cipher algorithm, the attack platform, and the measurement noise. In this paper, we consider a class of side-channel attacks known as differential cache attacks on Feistel ciphers, and develop a theoretical framework to understand the relationship between the attack's success, the target platform, and the cipher algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

    Publication Year: 2013, Page(s):1280 - 1293
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1757 KB) | HTML iconHTML

    To date, as one of the most popular online social networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. Twitter spammers can achieve their malicious goals such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and launching other underground illicit activities. Due to the significance and indispen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Static-Runtime Information Flow and Declassification Enforcement

    Publication Year: 2013, Page(s):1294 - 1305
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB) | HTML iconHTML

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we introduce a hybrid static-runtime enforcement mechanism that works on unannotated program code and supports ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Measure of Watermarking Security: The Effective Key Length

    Publication Year: 2013, Page(s):1306 - 1317
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2639 KB) | HTML iconHTML

    Whereas the embedding distortion, the payload, and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measure of watermarking security, called the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices

    Publication Year: 2013, Page(s):1318 - 1330
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2767 KB) | HTML iconHTML

    The man-in-the-middle (MITM) attack is the major threat for handheld devices to agree on a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. Apart from insecurely typing passwords into handheld devices or comparing long hexadecimal keys displayed on the devices' screens, many other human-verifiable protocols have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior Modeling

    Publication Year: 2013, Page(s):1331 - 1342
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2158 KB) | HTML iconHTML

    This paper presents a worst-case-aware design methodology for an oscillator-based true random number generator (TRNG) that produces highly random bit streams even under deterministic noise. We propose a stochastic behavior model to efficiently determine design parameters, and identify a class of deterministic noise under which the randomness gets the worst. They can be used to directly estimate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute-Based Encryption With Verifiable Outsourced Decryption

    Publication Year: 2013, Page(s):1343 - 1354
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2976 KB) | HTML iconHTML

    Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts. One of the main efficiency drawbacks of the existing ABE schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments

    Publication Year: 2013, Page(s):1355 - 1370
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4954 KB) | HTML iconHTML

    This paper proposes a forensic technique to localize duplicated image regions based on Zernike moments of small image blocks. We exploit rotation invariance properties to reliably unveil duplicated regions after arbitrary rotations. We devise a novel block matching procedure based on locality sensitive hashing and reduce false positives by examining the moments' phase. A massive experimental test ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient (n,k) Information Dispersal Algorithm Based on Fermat Number Transforms

    Publication Year: 2013, Page(s):1371 - 1383
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3394 KB) | HTML iconHTML

    The (n,k) information dispersal algorithm (IDA) is a coding technique converting a digital source file into n small digital files (shadows), and the receipt of any k out of the n shadows can losslessly reconstruct the source file. This paper presents an encoding and two decoding algorithms of (n,k) IDA via the fast Fermat number transform (FNT). The proposed encoding algorithm requires O(nlog k) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Identity Disclosure Control for Hypergraph-Based Data Publishing

    Publication Year: 2013, Page(s):1384 - 1396
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1680 KB) | HTML iconHTML

    Data publishing based on hypergraphs is becoming increasingly popular due to its power in representing multirelations among objects. However, security issues have been little studied on this subject, while most recent work only focuses on the protection of relational data or graphs. As a major privacy breach, identity disclosure reveals the identification of entities with certain background knowle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wiretap Channels With Side Information—Strong Secrecy Capacity and Optimal Transceiver Design

    Publication Year: 2013, Page(s):1397 - 1408
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2432 KB) | HTML iconHTML

    The wiretap channel models the communication scenario where two legitimate users want to communicate in such a way that a wiretapper is kept ignorant. In this paper, the wiretap channel with side information is studied, where the wiretapper has additional side information available. This side information allows the wiretapper to restrict the transmitted message to a certain subset of messages befo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013, Page(s): 1409
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):1410 - 1411
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Call for papers special issue on perception inspired video processing

    Publication Year: 2013, Page(s): 1412
    Request permission for commercial reuse | PDF file iconPDF (523 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Blank page

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy