IEEE Transactions on Information Forensics and Security

Issue 1 • Jan. 2014

Filter Results

Displaying Results 1 - 20 of 20
  • Front Cover

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (263 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):3 - 4
    Request permission for commercial reuse | |PDF file iconPDF (373 KB)
    Freely Available from IEEE
  • Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs

    Publication Year: 2014, Page(s):5 - 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (789 KB) | HTML iconHTML

    To ensure the authenticity, integrity, and confidentiality of bundles, the in-transit Protocol Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the Consultative Committee for Space Data Systems bundle security protocol (BSP) specification suggests four IPsec style security headers to provide four aspects of security services. However, this specification leaves... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gabor Ordinal Measures for Face Recognition

    Publication Year: 2014, Page(s):14 - 26
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3284 KB) | HTML iconHTML

    Great progress has been achieved in face recognition in the last three decades. However, it is still challenging to characterize the identity related features in face images. This paper proposes a novel facial feature extraction method named Gabor ordinal measures (GOM), which integrates the distinctiveness of Gabor features and the robustness of ordinal measures as a promising solution to jointly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Scalable System for Stealthy P2P-Botnet Detection

    Publication Year: 2014, Page(s):27 - 38
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2297 KB) | HTML iconHTML

    Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

    Publication Year: 2014, Page(s):39 - 50
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (6496 KB) | HTML iconHTML

    In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions

    Publication Year: 2014, Page(s):51 - 61
    Cited by:  Papers (72)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4369 KB) | HTML iconHTML

    We investigate the problem of human identity and gender recognition from gait sequences with arbitrary walking directions. Most current approaches make the unrealistic assumption that persons walk along a fixed direction or a pre-defined path. Given a gait sequence collected from arbitrary walking directions, we first obtain human silhouettes by background subtraction and cluster them into several... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Performance Fingerprint Matching System for Large Databases Based on GPU

    Publication Year: 2014, Page(s):62 - 71
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2439 KB) | HTML iconHTML

    Fingerprints are the biometric features most used for identification. They can be characterized through some particular elements called minutiae. The identification of a given fingerprint requires the matching of its minutiae against the minutiae of other fingerprints. Hence, fingerprint matching is a key process. The efficiency of current matching algorithms does not allow their use in large fing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data-Centric OS Kernel Malware Characterization

    Publication Year: 2014, Page(s):72 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2653 KB) | HTML iconHTML

    Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of malicious code or matching malicious code sequences. However, modern malware has been employing advanced strategies, such as reusing legitimate code or obfuscating malware code to circumvent the detection. As a new perspective to complement c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Image Sharing by Diverse Image Media

    Publication Year: 2014, Page(s):88 - 98
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2339 KB) | HTML iconHTML

    Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares. Hence, VSS schemes suffer from a transmission risk problem for the secre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

    Publication Year: 2014, Page(s):99 - 108
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1567 KB) | HTML iconHTML

    Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats, but als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks

    Publication Year: 2014, Page(s):109 - 124
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3081 KB) | HTML iconHTML

    Storage nodes are expected to be placed as an intermediate tier of large scale sensor networks for caching the collected sensor readings and responding to queries with benefits of power and storage saving for ordinary sensors. Nevertheless, an important issue is that the compromised storage node may not only cause the privacy problem, but also return fake/incomplete query results. We propose a sim... View full abstract»

    Open Access
  • Privacy-Preserving Authenticated Key-Exchange Over Internet

    Publication Year: 2014, Page(s):125 - 140
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (619 KB) | HTML iconHTML

    Key-exchange, in particular Diffie-Hellman key-exchange (DHKE), is among the core cryptographic mechanisms for ensuring network security. For key-exchange over the Internet, both security and privacy are desired. In this paper, we develop a family of privacy-preserving authenticated DHKE protocols named deniable Internet key-exchange (DIKE), both in the traditional PKI setting and in the identity-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2014, Page(s):B141 - B142
    Request permission for commercial reuse | |PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security - EDICS

    Publication Year: 2014, Page(s): 143
    Request permission for commercial reuse | |PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):144 - 145
    Request permission for commercial reuse | |PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | |PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | |PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy