By Topic

IEEE Transactions on Information Forensics and Security

Issue 7 • July 2014

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (337 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1041 - 1042
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1043 - 1044
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion

    Publication Year: 2014, Page(s):1045 - 1055
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1961 KB) | HTML iconHTML

    The electric network frequency (ENF) criterion is a recently developed technique for audio timestamp identification, which involves the matching between extracted ENF signal and reference data. For nearly a decade, conventional matching criterion has been based on the minimum mean squared error (MMSE) or maximum correlation coefficient. However, the corresponding performance is highly limited by l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Recognizing Faces in Videos Using Clustering-Based Re-Ranking and Fusion

    Publication Year: 2014, Page(s):1056 - 1068
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6823 KB) | HTML iconHTML

    Due to widespread applications, availability of large intra-personal variations in video and limited information content in still images, video-based face recognition has gained significant attention. Unlike still face images, videos provide abundant information that can be leveraged to address variations in pose, illumination, and expression as well as enhance the face recognition performance. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a Mathematical Model for Low-Rate Shrew DDoS

    Publication Year: 2014, Page(s):1069 - 1083
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1890 KB) | HTML iconHTML

    The shrew distributed denial of service (DDoS) attack is very detrimental for many applications, since it can throttle TCP flows to a small fraction of their ideal rate at very low attack cost. Earlier works mainly focused on empirical studies of defending against the shrew DDoS, and very few of them provided analytic results about the attack itself. In this paper, we propose a mathematical model ... View full abstract»

    Open Access
  • Spoofing Face Recognition With 3D Masks

    Publication Year: 2014, Page(s):1084 - 1097
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2762 KB) | HTML iconHTML

    Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different typ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subset Membership Encryption and Its Applications to Oblivious Transfer

    Publication Year: 2014, Page(s):1098 - 1107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    In this paper, we propose a novel cryptographic notion called subset membership encryption (SME), and provide a very efficient SME scheme. Given a system parameter generated by an encryptor (Alice), a decryptor (Bob) generates a randomized privacy-preserved attribute token P(G) from a set of attributes G. A message is encrypted using an attribute set A chosen by Alice and P(G) provided by Bob. It ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions

    Publication Year: 2014, Page(s):1108 - 1119
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3779 KB) | HTML iconHTML

    More than ever, the growing amount of exchanged digital content calls for efficient and practical techniques to protect intellectual property rights. During the past two decades, watermarking techniques have been proposed to embed and detect information within these contents, with four key requirements at hand: robustness, security, capacity, and invisibility. So far, researchers mostly focused on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Set-Based Collaborative Representation for Face Recognition

    Publication Year: 2014, Page(s):1120 - 1132
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4196 KB) | HTML iconHTML

    With the rapid development of digital imaging and communication technologies, image set-based face recognition (ISFR) is becoming increasingly important. One key issue of ISFR is how to effectively and efficiently represent the query face image set using the gallery face image sets. The set-to-set distance-based methods ignore the relationship between gallery sets, whereas representing the query s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol

    Publication Year: 2014, Page(s):1133 - 1140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2022 KB) | HTML iconHTML

    We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed protocol by facilitating dual channels at the keyboard with the assistance of a lightweight hardware module. The proposed protocol does not require users' explicit engagement in the authentication process. Empirical results show that, for a 30-day ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

    Publication Year: 2014, Page(s):1141 - 1156
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3943 KB) | HTML iconHTML

    Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to rev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EasySMS: A Protocol for End-to-End Secure Transmission of SMS

    Publication Year: 2014, Page(s):1157 - 1168
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1960 KB) | HTML iconHTML

    Nowadays, short message service (SMS) is being used in many daily life applications, including healthcare monitoring, mobile banking, mobile commerce, and so on. But when we send an SMS from one mobile phone to another, the information contained in the SMS transmit as plain text. Sometimes this information may be confidential like account numbers, passwords, license numbers, and so on, and it is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discriminative Multimetric Learning for Kinship Verification

    Publication Year: 2014, Page(s):1169 - 1178
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3140 KB) | HTML iconHTML

    In this paper, we propose a new discriminative multimetric learning method for kinship verification via facial image analysis. Given each face image, we first extract multiple features using different face descriptors to characterize face images from different aspects because different feature descriptors can provide complementary information. Then, we jointly learn multiple distance metrics with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement

    Publication Year: 2014, Page(s):1179 - 1192
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3127 KB) | HTML iconHTML

    Although some nice properties of the Delaunay triangle-based structure have been exploited in many fingerprint authentication systems and satisfactory outcomes have been reported, most of these systems operate without template protection. In addition, the feature sets and similarity measures utilized in these systems are not suitable for existing template protection techniques. Moreover, local str... View full abstract»

    Open Access
  • Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

    Publication Year: 2014, Page(s):1193 - 1205
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB) | HTML iconHTML

    Boneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal, and Kumar proposed an elegant way of achieving an IBE with efficient revocation, called revocable IBE (RIBE). In this paper, we revisit RIBE from the viewpoint of both security models and constructions. First, we introduce a rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2014, Page(s): B1206
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2014, Page(s): 1207
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):1208 - 1209
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Special issue on Advances in Hyperspectral Data Processing and Analysis

    Publication Year: 2014, Page(s): 1210
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy