By Topic

IEEE Transactions on Information Forensics and Security

Issue 5 • Date May 2014

Filter Results

Displaying Results 1 - 25 of 25
  • Front Cover

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):737 - 738
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):739 - 740
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value

    Publication Year: 2014, Page(s):741 - 751
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2853 KB) | HTML iconHTML

    This paper presents a method for detection of motion vector-based video steganography. First, the modification on the least significant bit of the motion vector is modeled. The influence of the embedding operation on the sum of absolute difference (SAD) is illustrated, which allows us to focus on the difference between the actual SAD and the locally optimal SAD after the adding-or-subtracting-one ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Image Downsampling on Steganographic Security

    Publication Year: 2014, Page(s):752 - 762
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2594 KB) | HTML iconHTML

    The accuracy of steganalysis in digital images primarily depends on the statistical properties of neighboring pixels, which are strongly affected by the image acquisition pipeline as well as any processing applied to the image. In this paper, we study how the detectability of embedding changes is affected when the cover image is downsampled prior to embedding. This topic is important for practitio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CP-ABE With Constant-Size Keys for Lightweight Devices

    Publication Year: 2014, Page(s):763 - 771
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1079 KB) | HTML iconHTML

    Lightweight devices, such as radio frequency identification tags, have a limited storage capacity, which has become a bottleneck for many applications, especially for security applications. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic tool, where the encryptor can decide the access structure that will be used to protect the sensitive data. However, current CP-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard

    Publication Year: 2014, Page(s):772 - 781
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1683 KB) | HTML iconHTML

    This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band. We propose a reliable AES-assisted DTV scheme, in which an AES-encrypted reference signal is generated at the TV transmitter and used as the sync bits of the DTV data frames. By allowing a shared secret between the transmitter and the receiver, the reference s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brain waves for automatic biometric-based user recognition

    Publication Year: 2014, Page(s):782 - 800
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2559 KB) | HTML iconHTML

    Brain signals have been investigated within the medical field for more than a century to study brain diseases like epilepsy, spinal cord injuries, Alzheimer's, Parkinson's, schizophrenia, and stroke among others. They are also used in both brain computer and brain machine interface systems with assistance, rehabilitative, and entertainment applications. Despite the broad interest in clinical appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Transmission Using MIMO Precoding

    Publication Year: 2014, Page(s):801 - 813
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1872 KB) | HTML iconHTML

    In this paper, we propose an MIMO precoding and postcoding transceiver to achieve data secrecy at the physical layer. When full channel state information (CSI) of the legitimate receiver is known to the transmitter, the proposed precoder can simultaneously maximize to receive signal-to-noise ratio (SNR) and attain secrecy. When only partial CSI is available, a modified Lloyd algorithm is proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform Embedding for Efficient JPEG Steganography

    Publication Year: 2014, Page(s):814 - 825
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3107 KB) | HTML iconHTML

    Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible statistical detectability. To this end, the framework of minimal distortion embedding is widely adopted in the development of the steganographic system, in which a well designed distortion function is of vital importance. In this paper, a class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Assisted Face Recognition: Dealing With Expression Variations

    Publication Year: 2014, Page(s):826 - 838
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3246 KB) | HTML iconHTML

    One of the most critical sources of variation in face recognition is facial expressions, especially in the frequent case where only a single sample per person is available for enrollment. Methods that improve the accuracy in the presence of such variations are still required for a reliable authentication system. In this paper, we address this problem with an analysis-by-synthesis-based scheme, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks

    Publication Year: 2014, Page(s):839 - 850
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2280 KB) | HTML iconHTML

    In this paper, we assess the physical-layer secrecy performance of the amplify-and-forward compressed sensing (AF-CS) framework when malicious eavesdropping nodes are listening. In particular, we investigate the robustness of the AF-CS scheme in the presence of a group of coordinated eavesdropping nodes under the assumption that they have corrupted channel state information. In order to fulfil thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unraveling the Effect of Textured Contact Lenses on Iris Recognition

    Publication Year: 2014, Page(s):851 - 862
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8138 KB) | HTML iconHTML

    The presence of a contact lens, particularly a textured cosmetic lens, poses a challenge to iris recognition as it obfuscates the natural iris patterns. The main contribution of this paper is to present an in-depth analysis of the effect of contact lenses on iris recognition. Two databases, namely, the IIIT-D Iris Contact Lens database and the ND-Contact Lens database, are prepared to analyze the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction

    Publication Year: 2014, Page(s):863 - 874
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1967 KB) | HTML iconHTML

    Per pixel adaptive Gaussian mixture models (GMMs) have become a popular choice for the detection of change in the video surveillance domain because of their ability to cope with many challenges characteristic for surveillance systems in real time with low memory requirements. Since their first introduction in the surveillance domain, GMM has been enhanced in many directions. In this paper, we pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Spammed Code Offset Method

    Publication Year: 2014, Page(s):875 - 884
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Helper data schemes are a security primitive used for privacy-preserving biometric databases and physical unclonable functions. One of the oldest known helper data schemes is the code offset method (COM). We propose an extension of the COM: the helper data are accompanied by many instances of fake helper data that are drawn from the same distribution as the real one. While the adversary has no way... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page - back cover]

    Publication Year: 2014, Page(s):B885 - B886
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2014, Page(s): 887
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):888 - 889
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Special Issue on Biometric Spoofing and Countermeasures

    Publication Year: 2014, Page(s): 890
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • Special issue on signal processing for big data

    Publication Year: 2014, Page(s): 891
    Request permission for commercial reuse | PDF file iconPDF (646 KB)
    Freely Available from IEEE
  • Special issue on spatial audio

    Publication Year: 2014, Page(s): 892
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2014, Page(s): 893
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy