IEEE Transactions on Information Forensics and Security

Issue 4 • April 2015

Filter Results

Displaying Results 1 - 25 of 25
  • Front Cover

    Publication Year: 2015, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (267 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2015, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):695 - 696
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):697 - 698
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Guest Editorial: Special Issue on Biometric Spoofing and Countermeasures

    Publication Year: 2015, Page(s):699 - 702
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (1898 KB) | HTML iconHTML
    Freely Available from IEEE
  • Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features

    Publication Year: 2015, Page(s):703 - 715
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2710 KB) | HTML iconHTML

    Vulnerability of iris recognition systems remains a challenge due to diverse presentation attacks that fail to assure the reliability when adopting these systems in real-life scenarios. In this paper, we present an in-depth analysis of presentation attacks on iris recognition systems especially focusing on the photo print attacks and the electronic display (or screen) attack. To this extent, we in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack of Mechanical Replicas: Liveness Detection With Eye Movements

    Publication Year: 2015, Page(s):716 - 725
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1383 KB) | HTML iconHTML

    This paper investigates liveness detection techniques in the area of eye movement biometrics. We investigate a specific scenario, in which an impostor constructs an artificial replica of the human eye. Two attack scenarios are considered: 1) the impostor does not have access to the biometric templates representing authentic users, and instead utilizes average anatomical values from the relevant li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pupil Dynamics for Iris Liveness Detection

    Publication Year: 2015, Page(s):726 - 735
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2152 KB) | HTML iconHTML

    The primary objective of this paper is to propose a complete methodology for eye liveness detection based on pupil dynamics. This method may serve as a component of presentation attack detection in iris recognition systems, making them more secure. Due to a lack of public databases that would support this paper, we have built our own iris capture device to register pupil size changes under visible... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Recognition on Consumer Devices: Reflections on Replay Attacks

    Publication Year: 2015, Page(s):736 - 745
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1776 KB) | HTML iconHTML

    Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Smart consumer devices, such as tablets and phones, have the potential to act as biometric readers authenticating user transactions. However, the use of these devices in uncontrolled environments is highly susceptible to replay attacks, where these biometric data are captured and replayed at a later t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face Spoof Detection With Image Distortion Analysis

    Publication Year: 2015, Page(s):746 - 761
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3941 KB) | HTML iconHTML Multimedia Media

    Automatic face recognition is now widely used in applications ranging from deduplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person's face could be used to gain access to facilities or services. While a number o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Face Spoofing Using Visual Dynamics

    Publication Year: 2015, Page(s):762 - 777
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3189 KB) | HTML iconHTML

    Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, valid access from printed media or replayed videos is by exploiting the information dynamics of the video content, such as blinking e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis

    Publication Year: 2015, Page(s):778 - 786
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3142 KB) | HTML iconHTML

    Biometric systems based on face recognition have been shown unreliable under the presence of face-spoofing images. Hence, automatic solutions for spoofing detection became necessary. In this paper, face-spoofing detection is proposed by searching for Moiré patterns due to the overlap of the digital grids. The conditions under which these patterns arise are first described, and their detect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Use of Client Identity Information for Face Antispoofing

    Publication Year: 2015, Page(s):787 - 796
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1407 KB) | HTML iconHTML

    With biometrics playing the role of a password which cannot be replaced if stolen, the necessity of establishing counter-measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of antispoofing systems is to classify the biometric evidence based on features discriminating between real accesses and spoofing attacks. For the first time, to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Person-Specific Face Antispoofing With Subject Domain Adaptation

    Publication Year: 2015, Page(s):797 - 809
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4936 KB) | HTML iconHTML

    Face antispoofing is important to practical face recognition systems. In previous works, a generic antispoofing classifier is trained to detect spoofing attacks on all subjects. However, due to the individual differences among subjects, the generic classifier cannot generalize well to all subjects. In this paper, we propose a person-specific face antispoofing approach. It recognizes spoofing attac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information

    Publication Year: 2015, Page(s):810 - 820
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1950 KB) | HTML iconHTML

    In the field of speaker verification (SV) it is nowadays feasible and relatively easy to create a synthetic voice to deceive a speech driven biometric access system. This paper presents a synthetic speech detector that can be connected at the front-end or at the back-end of a standard SV system, and that will protect it from spoofing attacks coming from state-of-the-art statistical Text to Speech ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Speaker Verification and Antispoofing in the $i$ -Vector Space

    Publication Year: 2015, Page(s):821 - 832
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9989 KB) | HTML iconHTML

    Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis, and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection

    Publication Year: 2015, Page(s):833 - 848
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7455 KB) | HTML iconHTML Multimedia Media

    In this paper, we address the problem of assessing the overall quality of forgery detection approaches for artificial sweat printed latent fingerprints placed at crime scenes. It is very important to have reliable detection mechanisms tested on manifold characteristics caused for example by different surfaces, printers and during acquisition, avoiding misleading crime scene investigations. Today o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Investigation of Local Descriptors for Biometric Spoofing Detection

    Publication Year: 2015, Page(s):849 - 863
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6703 KB) | HTML iconHTML

    Biometric authentication systems are quite vulnerable to sophisticated spoofing attacks. To keep a good level of security, reliable spoofing detection tools are necessary, preferably implemented as software modules. The research in this field is very active, with local descriptors, based on the analysis of microtextural features, gaining more and more popularity, because of their excellent perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

    Publication Year: 2015, Page(s):864 - 879
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4801 KB) | HTML iconHTML

    Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or spoofed) and, despite the recent advances in spoofing detection, current solutions often rely on domain knowledge, specific biometric reading systems, and attack types. We assume a very limited kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2015, Page(s): 880
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2015, Page(s):881 - 882
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • computational imaging

    Publication Year: 2015, Page(s): 883
    Request permission for commercial reuse | PDF file iconPDF (961 KB)
    Freely Available from IEEE
  • signal and information processing over networks

    Publication Year: 2015, Page(s): 884
    Request permission for commercial reuse | PDF file iconPDF (816 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2015, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Blank page

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy