IEEE Transactions on Information Forensics and Security

Issue 2 • Feb. 2015

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2015, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2015, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):215 - 216
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):217 - 218
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT

    Publication Year: 2015, Page(s):219 - 228
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2237 KB) | HTML iconHTML

    This paper introduces a novel feature set for steganalysis of JPEG images. The features are engineered as first-order statistics of quantized noise residuals obtained from the decompressed JPEG image using 64 kernels of the discrete cosine transform (DCT) (the so-called undecimated DCT). This approach can be interpreted as a projection model in the JPEG domain, forming thus a counterpart to the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlated Differential Privacy: Hiding Information in Non-IID Data Set

    Publication Year: 2015, Page(s):229 - 242
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2618 KB) | HTML iconHTML

    Privacy preserving on data mining and data release has attracted an increasing research interest over a number of decades. Differential privacy is one influential privacy notion that offers a rigorous and provable privacy guarantee for data mining and data release. Existing studies on differential privacy assume that in a data set, records are sampled independently. However, in real-world applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Publication Year: 2015, Page(s):243 - 255
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2548 KB) | HTML iconHTML

    Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding distortion on the texture is presented. We extract the complement, rotation, and mirroring-invariant local te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis

    Publication Year: 2015, Page(s):256 - 265
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2065 KB) | HTML iconHTML

    This paper describes a novel approach for implementation of the advanced encryption standard (AES) algorithm, which provides a significantly improved strength against first-order differential electromagnetic and power analysis with a minimal additional overhead. Our method is based on randomization in composite field arithmetic, which entails a low implementation cost while does not alter the algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness

    Publication Year: 2015, Page(s):266 - 277
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3743 KB) | HTML iconHTML

    True random number generators (TRNGs) are the basic building blocks of cryptographic implementations. They are used to generate random numbers required for security protocols, to generate ephemeral keys, and are often used in hiding or masking countermeasures to thwart implementation attacks. The protection of TRNGs is an important issue to guarantee the security of cryptographic systems but less ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks

    Publication Year: 2015, Page(s):278 - 292
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1755 KB) | HTML iconHTML

    Devising a user authentication scheme based on personal identification numbers (PINs) that is both secure and practically usable is a challenging problem. The greatest difficulty lies with the susceptibility of the PIN entry process to direct observational attacks, such as human shoulder-surfing and camera-based recording. This paper starts with an examination of a previous attempt at solving the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secrecy Transmission With a Helper: To Relay or to Jam

    Publication Year: 2015, Page(s):293 - 307
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1818 KB) | HTML iconHTML

    In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We investigate the question of which role should the helper act to improve the secrecy, to jam, or to relay. Two transmission schemes are investigated: (1) direct transmission scheme (DTS) with jamming and (2) relay transmission scheme ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking

    Publication Year: 2015, Page(s):308 - 320
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1223 KB) | HTML iconHTML

    Named data networking (NDN) is a new paradigm for the future Internet wherein interest and data packets carry content names rather than the current IP paradigm of source and destination addresses. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. However, existing heavyweight signature generation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris Recognition: What Is Beyond Bit Fragility?

    Publication Year: 2015, Page(s):321 - 332
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4601 KB) | HTML iconHTML

    The concept of fragility of some bits in the iris codes regards exclusively their within-class variation, i.e., the probability that they take different values in templates computed from different images of the same iris. This paper extends that concept, by noticing that a similar phenomenon occurs for the between-classes comparisons, i.e., some bits have higher probability than others of assuming... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the Discriminative Power of Keystroke Sound

    Publication Year: 2015, Page(s):333 - 345
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3136 KB) | HTML iconHTML

    The goal of this paper is to determine whether keystroke sound can be used to recognize a user. In this regard, we analyze the discriminative power of keystroke sound in the context of a continuous user authentication application. Motivated by the concept of digraphs used in modeling keystroke dynamics, a virtual alphabet is first learned from keystroke sound segments. Next, the digraph latency wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Joint Bayesian Method for Face Verification

    Publication Year: 2015, Page(s):346 - 354
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2107 KB) | HTML iconHTML

    Generative Bayesian models have recently become the most promising framework in classifier design for face verification. However, we report in this paper that the joint Bayesian method, a successful classifier in this framework, suffers performance degradation due to its underuse of the expectation-maximization algorithm in its training phase. To rectify the underuse, we propose a new method terme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamental Limits of Caching With Secure Delivery

    Publication Year: 2015, Page(s):355 - 370
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1707 KB) | HTML iconHTML

    Caching is emerging as a vital tool for alleviating the severe capacity crunch in modern content-centric wireless networks. The main idea behind caching is to store parts of the popular content in end-users' memory and leverage the locally stored content to reduce peak data rates. By jointly designing content placement and delivery mechanisms, recent works have shown order-wise reduction in transm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Key Management in Dynamic Wireless Sensor Networks

    Publication Year: 2015, Page(s):371 - 383
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2887 KB) | HTML iconHTML

    Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones

    Publication Year: 2015, Page(s):384 - 396
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2267 KB) | HTML iconHTML Multimedia Media

    We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean verifiers, secure against malicious clients and honest-but-curious server. We then augment our protocols with principal component analysis (PCA), which can help to improve authentication accuracy. We evaluate the performance of our protocols on an emerging application-namely, continuous authentication of smartphone us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise

    Publication Year: 2015, Page(s):397 - 408
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2881 KB) | HTML iconHTML

    Considering the channel noise was present, we presented techniques to reconstruct the feedback polynomial as well as the initial state of a scrambler placed after a channel encoder. The previous algorithms could not keep the detection performance over the design requirements, such as a false-alarm probability. Thus, we proposed a modified scheme to improve the detection capability. With multiple o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability

    Publication Year: 2015, Page(s):409 - 422
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1326 KB) | HTML iconHTML

    Due to widespread applications of 3D vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Ear Segmentation and Classification Through Indexing

    Publication Year: 2015, Page(s):423 - 435
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1881 KB) | HTML iconHTML

    Current growth trends in different biometrics applications present challenges to researchers. To address these challenges, we need new data storage and retrieval techniques to make the recognition process time efficient. This paper presents a system for time efficient 3D ear biometrics from a large biometrics database. The proposed system has two components that are primarily responsible for: 1) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2015, Page(s): 436
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2015, Page(s):437 - 438
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • computational imaging

    Publication Year: 2015, Page(s): 439
    Request permission for commercial reuse | PDF file iconPDF (965 KB)
    Freely Available from IEEE
  • signal and information processing over networks

    Publication Year: 2015, Page(s): 440
    Request permission for commercial reuse | PDF file iconPDF (817 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy