By Topic

IEEE Transactions on Information Forensics and Security

Issue 6 • Date June 2014

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):887 - 888
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):889 - 890
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

    Publication Year: 2014, Page(s):891 - 904
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1855 KB) | HTML iconHTML

    Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Content Fingerpriting

    Publication Year: 2014, Page(s):905 - 920
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2387 KB) | HTML iconHTML

    Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring and, more recently, for interaction with physical objects. Over the past few years, both techniques have been well studied and their shortcomings understood. In this paper, we introduce a new framework called active content fingerprinting, which takes the best from two wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable Functions

    Publication Year: 2014, Page(s):921 - 932
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4113 KB) | HTML iconHTML

    Physical unclonable function (PUF) leverages the immensely complex and irreproducible nature of physical structures to achieve device authentication and secret information storage. To enhance the security and robustness of conventional PUFs, reconfigurable physical unclonable functions (RPUFs) with dynamically refreshable challenge-response pairs (CRPs) have emerged recently. In this paper, we pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Signature Verification on Mobile Devices

    Publication Year: 2014, Page(s):933 - 947
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3284 KB) | HTML iconHTML

    This paper studies online signature verification on touch interface-based mobile devices. A simple and effective method for signature verification is developed. An online signature is represented with a discriminative feature vector derived from attributes of several histograms that can be computed in linear time. The resulting signature template is compact and requires constant space. The algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Sketch Method for Measuring Host Connection Degree Distribution

    Publication Year: 2014, Page(s):948 - 960
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3556 KB) | HTML iconHTML

    The host connection degree distribution (HCDD) is an important metric for network security monitoring. However, it is difficult to accurately obtain the HCDD in real time for high-speed links with a massive amount of traffic data. In this paper, we propose a new sketch method to build a probabilistic traffic summary of a host's flows using a uniform Flajolet-Martin sketch combined with a small bit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags

    Publication Year: 2014, Page(s):961 - 975
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3658 KB) | HTML iconHTML

    Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwante... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection

    Publication Year: 2014, Page(s):976 - 987
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1854 KB) | HTML iconHTML

    Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there has been a growing interest in leveraging social networks to mitigate Sybil attacks. However, the existing approaches suffer from one or more drawbacks, including bootstrapping from either only known benign or known Sybil nodes, failing to tolerate noise in their prior knowledge about known benign or Syb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram

    Publication Year: 2014, Page(s):988 - 998
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3635 KB) | HTML iconHTML

    The aim of this paper is to detect abnormal events in video streams, a challenging but important subject in video surveillance. We propose a novel algorithm to address this problem. The algorithm is based on an image descriptor and a nonlinear classification method. We introduce a histogram of optical flow orientation as a descriptor encoding the moving information of each video frame. The nonline... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations

    Publication Year: 2014, Page(s):999 - 1014
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2511 KB) | HTML iconHTML

    Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thermal Facial Analysis for Deception Detection

    Publication Year: 2014, Page(s):1015 - 1023
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2052 KB) | HTML iconHTML Multimedia Media

    Thermal imaging technology can be used to detect stress levels in humans based on the radiated heat from their face. In this paper, we use thermal imaging to monitor the periorbital region's thermal variations and test whether it can offer a discriminative signature for detecting deception. We start by presenting an overview on automated deception detection and propose a novel methodology, which w... View full abstract»

    Open Access
  • Keyless Authentication in a Noisy Model

    Publication Year: 2014, Page(s):1024 - 1033
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    We study a keyless authentication problem in a new noisy model, where there is a discrete memoryless channel (DMC) W1 from sender Alice to receiver Bob and a DMC W2 from adversary Oscar to Bob. In addition, there is an insecure noiseless channel between Alice and Bob. Under this model, we characterize the condition under which an authentication from Alice to Bob is possible. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2014, Page(s): 1034
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):1035 - 1036
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Special Issue on Biometric Spoofing and Countermeasures

    Publication Year: 2014, Page(s): 1037
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • Special issue on signal processing for big data

    Publication Year: 2014, Page(s): 1038
    Request permission for commercial reuse | PDF file iconPDF (646 KB)
    Freely Available from IEEE
  • Special issue on spatial audio

    Publication Year: 2014, Page(s): 1039
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Open Access

    Publication Year: 2014, Page(s): 1040
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy