By Topic

IEEE Transactions on Information Forensics and Security

Issue 8 • Date Aug. 2014

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (337 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1207 - 1208
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1209 - 1210
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality

    Publication Year: 2014, Page(s):1211 - 1226
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2845 KB) | HTML iconHTML

    This paper proposes a JPEG anti-forensic method, which aims at removing from a given image the footprints left by JPEG compression, in both the spatial domain and DCT domain. With reasonable loss of image quality, the proposed method can defeat existing forensic detectors that attempt to identify traces of the image JPEG compression history or JPEG anti-forensic processing. In our framework, first... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collusion-Resistance in Optimistic Fair Exchange

    Publication Year: 2014, Page(s):1227 - 1239
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1776 KB) | HTML iconHTML

    Optimistic fair exchange (OFE) is a type of cryptographic protocols aimed at solving the fair exchange problem over open networks with the help of a third party to settle disputes between exchanging parties. It is well known that a third party is necessary in the realization of a fair exchange protocol. However, a fully trusted third party may not be available over open networks. In this paper, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks

    Publication Year: 2014, Page(s):1240 - 1250
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1250 KB) | HTML iconHTML

    In this paper, we investigate the security issue of a two-hop amplify-and-forward multiple-input multiple-output wireless relay network in the existence of a multiantenna eavesdropper. The optimal scheme to achieve the secrecy capacity involves a nonconvex optimization and is still an open problem. Aiming to find an efficient way to enhance the secrecy rate with a tractable complexity, we propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Security of Trustee-Based Social Authentications

    Publication Year: 2014, Page(s):1251 - 1263
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2288 KB) | HTML iconHTML

    Recently, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user's friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user's trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation on Cost Assignment in Spatial Image Steganography

    Publication Year: 2014, Page(s):1264 - 1277
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3064 KB) | HTML iconHTML

    Relating the embedding cost in a distortion function to statistical detectability is an open vital problem in modern steganography. In this paper, we take one step forward by formulating the process of cost assignment into two phases: 1) determining a priority profile and 2) specifying a cost-value distribution. We analytically show that the cost-value distribution determines the change rate of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Attack-Type Uncertainty Into Network Protection

    Publication Year: 2014, Page(s):1278 - 1287
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2107 KB) | HTML iconHTML

    Network security against possible attacks involves making decisions under uncertainty. Not only may one be ignorant of the place, the power, or the time of potential attacks, one may also be largely ignorant of the attacker's purpose. To illustrate this phenomenon, this paper proposes a simple Bayesian game-theoretic model of allocating defensive (scanning) effort among nodes of a network in which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities

    Publication Year: 2014, Page(s):1288 - 1298
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2374 KB) | HTML iconHTML

    Automated biometrics identification using finger knuckle images has increasingly generated interest among researchers with emerging applications in human forensics and biometrics. Prior efforts in the biometrics literature have only investigated the major finger knuckle patterns that are formed on the finger surface joining proximal phalanx and middle phalanx bones. This paper investigates the pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First Quantization Matrix Estimation From Double Compressed JPEG Images

    Publication Year: 2014, Page(s):1299 - 1310
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2841 KB) | HTML iconHTML

    One of the most common problems in the image forensics field is the reconstruction of the history of an image or a video. The data related to the characteristics of the camera that carried out the shooting, together with the reconstruction of the (possible) further processing, allow us to have some useful hints about the originality of the visual document under analysis. For example, if an image h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior

    Publication Year: 2014, Page(s):1311 - 1321
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2370 KB) | HTML iconHTML

    Identity deception has become an increasingly important issue in the social media environment. The case of blocked users initiating new accounts, often called sockpuppetry, is widely known and past efforts, which have attempted to detect such users, have been primarily based on verbal behavior (e.g., using profile data or lexical features in text). Although these methods yield a high detection acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skull Identification via Correlation Measure Between Skull and Face Shape

    Publication Year: 2014, Page(s):1322 - 1332
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2008 KB) | HTML iconHTML

    Skull identification is an important subject for research in forensic medicine. Current research can be divided into two categories: 1) craniofacial superimposition and 2) craniofacial reconstruction. Both categories rely essentially on the accurate extraction and representation of the intrinsic relationship between the skull and face in terms of the morphology, which still remain unsolved. They h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2014, Page(s): 1333
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):1334 - 1335
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Special issue on Advances in Hyperspectral Data Processing and Analysis

    Publication Year: 2014, Page(s): 1336
    Request permission for commercial reuse | PDF file iconPDF (236 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy