IEEE Transactions on Information Forensics and Security

Issue 11 • Nov. 2013

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (222 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1705 - 1706
    Request permission for commercial reuse | |PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1707 - 1708
    Request permission for commercial reuse | |PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Compact Video Fingerprinting via Structural Graphical Models

    Publication Year: 2013, Page(s):1709 - 1721
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3445 KB) | HTML iconHTML

    Much previous work in video fingerprinting has focused on robustness and security issues, but the compactness requirement, i.e., the hash should be of a short length with acceptable robustness and discriminability, continues to be a significant practical challenge. In this paper, we propose a video fingerprinting method with explicit attention on compactness. First, we develop a new graphical repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative Intellectual Property Protection Using Physical-Level Characterization

    Publication Year: 2013, Page(s):1722 - 1730
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (900 KB) | HTML iconHTML

    Hardware metering, the extraction of unique and persistent identifiers (IDs), is a crucial process for numerous integrated circuit (IC) intellectual property protection tasks. The currently known hardware metering approaches, however, are subject to alternations due to device aging, since they employ unstable manifestational IC properties. We, on the other hand, have developed the first robust har... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference

    Publication Year: 2013, Page(s):1731 - 1745
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4253 KB) | HTML iconHTML

    Leveraging a wireless multipath channel as the source of common randomness, many key generation methods have been proposed according to the information-theory security. However, existing schemes suffer a low generation rate and a low entropy, and mainly rely on nodes' mobility. To overcome this limitation, we present a key generation protocol with known artificial interference, named SmokeGrenade,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Recording Location Identification Using Acoustic Environment Signature

    Publication Year: 2013, Page(s):1746 - 1759
    Cited by:  Papers (16)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2281 KB) | HTML iconHTML

    An audio recording is subject to a number of possible distortions and artifacts. Consider, for example, artifacts due to acoustic reverberation and background noise. The acoustic reverberation depends on the shape and the composition of the room, and it causes temporal and spectral smearing of the recorded sound. The background noise, on the other hand, depends on the secondary audio source activi... View full abstract»

    Open Access
  • Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT

    Publication Year: 2013, Page(s):1760 - 1774
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3041 KB) | HTML iconHTML

    We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT), and each receiver feeds back its channel output to a different transmitter. We refer to this model as MIMO X-channel with asymmetric output feedback and delayed CSIT. The transmitters are equipped... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study

    Publication Year: 2013, Page(s):1775 - 1789
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1792 KB) | HTML iconHTML

    Rigorously characterizing the statistical properties of cyber attacks is an important problem. In this paper, we propose the first statistical framework for rigorously analyzing honeypot-captured cyber attack data. The framework is built on the novel concept of stochastic cyber attack process, a new kind of mathematical objects for describing cyber attacks. To demonstrate use of the framework, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

    Publication Year: 2013, Page(s):1790 - 1801
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2758 KB) | HTML iconHTML

    Data access control is an effective way to ensure data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks

    Publication Year: 2013, Page(s):1802 - 1814
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2509 KB) | HTML iconHTML

    We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks

    Publication Year: 2013, Page(s):1815 - 1826
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2046 KB) | HTML iconHTML

    We present analytical models and simulation results that characterize the impacts of the following factors on the propagation of cross-site scripting (XSS) worms in online social networks (OSNs): 1) user behaviors, namely, the probability of visiting a friend's profile versus a stranger's; 2) the highly clustered structure of communities; and 3) community sizes. Our analyses and simulation results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic Environment Identification and Its Applications to Audio Forensics

    Publication Year: 2013, Page(s):1827 - 1837
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1785 KB) | HTML iconHTML

    An audio recording is subject to a number of possible distortions and artifacts. Consider, for example, artifacts due to acoustic reverberation and background noise. The acoustic reverberation depends on the shape and the composition of a room, and it causes temporal and spectral smearing of the recorded sound. The background noise, on the other hand, depends on the secondary audio source activiti... View full abstract»

    Open Access
  • Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding

    Publication Year: 2013, Page(s):1838 - 1849
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1764 KB) | HTML iconHTML

    Conventional image hashing maps invariant features of each digital image into a unique, compact, robust, and secure signature, which can be used as an index for fast content identification and copyright protection. This paper addresses an important issue of compressing the real-valued image hashes into short binary signatures, which can support fast image identification using Hamming distance metr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors

    Publication Year: 2013, Page(s):1850 - 1859
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1736 KB) | HTML iconHTML

    Flow watermarks efficiently link packet flows in a network in order to thwart various attacks such as stepping stones. We study the problem of designing good flow watermarks. Earlier flow watermarking schemes mostly considered substitution errors, neglecting the effects of packet insertions and deletions that commonly happen within a network. More recent schemes considered packet deletions but oft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

    Publication Year: 2013, Page(s):1860 - 1875
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4010 KB) | HTML iconHTML

    The security and privacy preservation issues are prerequisites for vehicular ad hoc networks. Recently, secure and privacy enhancing communication schemes (SPECS) was proposed and focused on intervehicle communications. SPECS provided a software-based solution to satisfy the privacy requirement and gave lower message overhead and higher successful rate than previous solutions in the message verifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PUF Modeling Attacks on Simulated and Silicon Data

    Publication Year: 2013, Page(s):1876 - 1891
    Cited by:  Papers (84)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1837 KB) | HTML iconHTML

    We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. If successful, this algorithm can subsequently impersonate the Strong PUF, and can be cloned and d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2013, Page(s): B1892
    Request permission for commercial reuse | |PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2013, Page(s): 1893
    Request permission for commercial reuse | |PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2013, Page(s):1894 - 1895
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Special issue on Facial Biometrics in the wild

    Publication Year: 2013, Page(s): 1896
    Request permission for commercial reuse | |PDF file iconPDF (318 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | |PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | |PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy