IEEE Transactions on Information Forensics and Security

Issue 1 • Jan. 2016

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2016, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (285 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2016, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | |PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Manifold Learning and Spectral Clustering for Image Phylogeny Forests

    Publication Year: 2016, Page(s):5 - 18
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3754 KB) | HTML iconHTML Multimedia Media

    The ever-increasing number of gadgets being used to create digital content, as well as the easiness in sharing, editing, and republishing this content, brings the problem of dealing with a large amount of digital objects (e.g., images or videos) whose content is very similar. Some issues faced by investigators of digital crimes when analyzing this type of data include finding the original source o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JPGcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files

    Publication Year: 2016, Page(s):19 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2523 KB) | HTML iconHTML

    In this paper, we present a new tool for forensic recovery of single and multi-fragment JPEG/JFIF data files. First, we discuss the basic design and the technical methods composing our proposed data carving algorithm. Next, we compare the performance of our method with the well-known Adroit Photo Forensics (APF) state-of-the art tool. This comparison is centered on both the carving results as well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

    Publication Year: 2016, Page(s):35 - 45
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1521 KB) | HTML iconHTML

    We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent an attribute for the three possible values (n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter

    Publication Year: 2016, Page(s):46 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1124 KB) | HTML iconHTML

    In this paper, we investigate the ergodic secrecy capacity of the fast fading Gaussian wiretap channel when only the statistics of the channel state information are known at the transmitter. We derive conditions for the existence of degradedness and a positive ergodic secrecy capacity under the usual stochastic order, the convex order, and the increasing convex order between the legitimate and eav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra

    Publication Year: 2016, Page(s):59 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5908 KB) | HTML iconHTML

    Linear algebra operations on private distributed data are frequently required in several practical scenarios (e.g., statistical analysis and privacy preserving databases). We present universally composable two-party protocols to compute inner products, determinants, eigenvalues, and eigenvectors. These protocols are built for a two-party scenario where the inputs are provided by mutually distrustf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels

    Publication Year: 2016, Page(s):74 - 85
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2491 KB) | HTML iconHTML

    In this paper, we study the multiple-input multiple-output wiretap channel for simultaneous wireless information and power transfer, in which there is a base station (BS), an information-decoding (ID) user, and an energy-harvesting (EH) user. The messages intended to the ID user is required to be kept confidential to the EH user. Our objective is to design the optimal transmit covariance matrix at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Change Detection for Voltage Quality Monitoring in Smart Grids

    Publication Year: 2016, Page(s):86 - 99
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2445 KB) | HTML iconHTML

    This paper considers the real-time voltage quality monitoring in smart grid systems. The goal is to detect the occurrence of disturbances in the nominal sinusoidal voltage signal as quickly as possible such that protection measures can be taken in time. Based on an autoregressive model for the disturbance, we propose a generalized local likelihood ratio detector, which processes meter readings seq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees

    Publication Year: 2016, Page(s):100 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1290 KB) | HTML iconHTML

    In many existing incentive-based mobile sensing applications, the sensing job owner runs an auction with the mobile phone users to maximize its purchased sensing resource. We notice that both the mobile phone users and the job owner could behave dishonestly to pursue their own interests. This motivates us to design secure and dependable auction mechanisms that generate the correct, promising outpu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Android Encrypted Network Traffic to Identify User Actions

    Publication Year: 2016, Page(s):114 - 125
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4509 KB) | HTML iconHTML

    Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization

    Publication Year: 2016, Page(s):126 - 140
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5267 KB) | HTML iconHTML

    Although sensor pattern noise (SPN) has been proved to be an effective means to uniquely identify digital cameras, some non-unique artifacts, shared among cameras undergo the same or similar in-camera processing procedures, often give rise to false identifications. Therefore, it is desirable and necessary to suppress these unwanted artifacts so as to improve the accuracy and reliability. In this p... View full abstract»

    Open Access
  • A Joint Source-Channel Adaptive Scheme for Wireless H.264/AVC Video Authentication

    Publication Year: 2016, Page(s):141 - 153
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4515 KB) | HTML iconHTML

    Authentication has become an emerging issue for video streaming over lossy networks. Although the advanced video coding standards, such as H.264/AVC, efficiently reduce the amount of data to be transmitted, the coding dependency brings new challenges in designing efficient stream authentication scheme. In this paper, we propose a novel joint-designed-layered source-channel adaptive scheme that int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Harvesting for Physical-Layer Security in OFDMA Networks

    Publication Year: 2016, Page(s):154 - 162
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (980 KB) | HTML iconHTML

    In this paper, we study the simultaneous wireless information and power transfer in downlink multiuser orthogonal frequency-division multiple access systems, where each user applies power splitting to coordinate the energy harvesting and secrecy information decoding processes. Assuming equal power allocation across subcarriers, we formulate an optimization problem to maximize the aggregate harvest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Permanence of EEG Signals for Biometric Recognition

    Publication Year: 2016, Page(s):163 - 175
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2713 KB) | HTML iconHTML

    Brain signals have been investigated for more than a century in the medical field. However, despite the broad interest in clinical applications, their use as a biometric identifier has been only recently considered by the scientific community. In this paper, we focus on the permanence across time of brain signals, specifically of electroencephalographic (EEG) signals, issue of paramount importance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profiling Online Social Behaviors for Compromised Account Detection

    Publication Year: 2016, Page(s):176 - 187
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2379 KB) | HTML iconHTML

    Account compromization is a serious threat to users of online social networks (OSNs). While relentless spammers exploit the established trust relationships between account owners and their friends to efficiently spread malicious spam, timely detection of compromised accounts is quite challenging due to the well established trust relationship between the service providers, account owners, and their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

    Publication Year: 2016, Page(s):188 - 199
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2200 KB) | HTML iconHTML

    Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the users' sensitive data will be protected from exposure. Given an encrypted database, users typically submit queries similar to the following examples: 1) How many employees in an organization make over U.S. $100000? 2) What is the average age of factory workers suffering from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Image Hashing With Ring Partition and Invariant Vector Distance

    Publication Year: 2016, Page(s):200 - 214
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4395 KB) | HTML iconHTML

    Robustness and discrimination are two of the most important objectives in image hashing. We incorporate ring partition and invariant vector distance to image hashing algorithm for enhancing rotation robustness and discriminative capability. As ring partition is unrelated to image rotation, the statistical features that are extracted from image rings in perceptually uniform color space, i.e., CIE L... View full abstract»

    Open Access
  • [Blank page]

    Publication Year: 2016, Page(s):215 - 216
    Request permission for commercial reuse | |PDF file iconPDF (3 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2016, Page(s): 217
    Request permission for commercial reuse | |PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2016, Page(s):218 - 219
    Request permission for commercial reuse | |PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Special issue on distributed information processing in social networks

    Publication Year: 2016, Page(s): 220
    Request permission for commercial reuse | |PDF file iconPDF (602 KB)
    Freely Available from IEEE
  • Special issue on inference and learning over networks

    Publication Year: 2016, Page(s): 221
    Request permission for commercial reuse | |PDF file iconPDF (626 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy