IEEE Transactions on Information Forensics and Security

Issue 2 • Feb. 2016

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2016, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (285 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2016, Page(s): C2
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):217 - 218
    Request permission for commercial reuse | |PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):219 - 220
    Request permission for commercial reuse | |PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Content-Adaptive Steganography by Minimizing Statistical Detectability

    Publication Year: 2016, Page(s):221 - 234
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2531 KB) | HTML iconHTML

    Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using classifiers equipped with rich image models. In this paper, we pursue an alternative approach based on a locally estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Security of Permutation-Only Image Encryption Schemes

    Publication Year: 2016, Page(s):235 - 246
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2339 KB) | HTML iconHTML

    Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanaly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption

    Publication Year: 2016, Page(s):247 - 257
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (911 KB) | HTML iconHTML

    We introduce a new encryption notion called distance-based encryption (DBE) to apply biometrics in identity-based encryption. In this notion, a ciphertext encrypted with a vector and a threshold value can be decrypted with a private key of another vector, if and only if the distance between these two vectors is less than or equal to the threshold value. The adopted distance measurement is called M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regional Patterns and Vulnerability Analysis of Chinese Web Passwords

    Publication Year: 2016, Page(s):258 - 272
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3433 KB) | HTML iconHTML

    Current research on password security pays much attention on users who speak Indo-European languages (English, Spanish, and so on), and thus the countermeasures are heavily influenced by Indo-European speakers' choices as well. However, languages have a strong impact on passwords. Analysis without considering other languages (e.g., Chinese) might lead to some biased results, such as Chinese passwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Piggyback Marking for IP Traceback

    Publication Year: 2016, Page(s):273 - 288
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2522 KB) | HTML iconHTML

    IP traceback is a solution for attributing cyber attacks, and it is also useful for accounting user traffic and network diagnosis. Marking-based traceback (MBT) has been considered a promising traceback approach, and has received considerable attention. However, we find that the traceback message delivery problem in MBT, which is important to the successful completion of a traceback, has not been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

    Publication Year: 2016, Page(s):289 - 302
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2981 KB) | HTML iconHTML

    Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. In this paper, we propose a hardware-enhanced architecture, GuardOL, to perform online malware detection. GuardOL is a combined approach using processor ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Foundations of History Independence

    Publication Year: 2016, Page(s):303 - 312
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1441 KB) | HTML iconHTML

    The way data structures organize data is often a function of the sequence of past operations. The organization of data is referred to as the data structure's state, and the sequence of past operations constitutes the data structure's history. A data structure state can, therefore, be used as an oracle to derive information about its history. For history-sensitive applications, such as privacy in e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing

    Publication Year: 2016, Page(s):313 - 327
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2006 KB) | HTML iconHTML

    In this paper, the security of the compressed sensing (CS) framework as a form of data confidentiality is analyzed. Two important properties of one-time random linear measurements acquired using a Gaussian independent identically distributed matrix are outlined: 1) the measurements reveal only the energy of the sensed signal and 2) only the energy of the measurements leaks information about the si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Parenting Phylogeny Relationships in Digital Images

    Publication Year: 2016, Page(s):328 - 343
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2582 KB) | HTML iconHTML

    Recently, several studies have been concerned with modeling the parenthood relationships between near duplicates in a set of images. Two images share a parenthood relationship if one is obtained by applying transformations to the other. However, this is not the only form of parenting that can exist among images. An image might be a composition created through the combination of the semantic inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles

    Publication Year: 2016, Page(s):344 - 357
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2598 KB) | HTML iconHTML

    This paper tackles a recent challenge in identifying culprit actors, who try to hide confidential payload with steganography, among many innocent actors in social media networks. The problem is called steganographer detection problem and is significantly different from the traditional stego detection problem that classifies an individual object as a cover or a stego. To solve the steganographer de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where You Are Is Who You Are: User Identification by Matching Statistics

    Publication Year: 2016, Page(s):358 - 372
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2077 KB) | HTML iconHTML Multimedia Media

    Most users of online services have unique behavioral or usage patterns. These behavioral patterns can be exploited to identify and track users by using only the observed patterns in the behavior. We study the task of identifying users from statistics of their behavioral patterns. In particular, we focus on the setting in which we are given histograms of users' data collected during two different e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers

    Publication Year: 2016, Page(s):373 - 387
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1894 KB) | HTML iconHTML

    In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Publication Year: 2016, Page(s):388 - 399
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1781 KB) | HTML iconHTML

    For a user to store data in the cloud, using services provided by multiple cloud storage providers (CSPs) is a promising approach to increase the level of data availability and confidentiality, as it is unlikely that different CSPs are out of service at the same time or collude with each other to extract information of a user. This paper investigates the problem of storing data reliably and secure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Theory and the IrisCode

    Publication Year: 2016, Page(s):400 - 409
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2288 KB) | HTML iconHTML

    Iris recognition has legendary resistance to false matches, and the tools of information theory can help to explain why. The concept of entropy is fundamental to understanding biometric collision avoidance. This paper analyses the bit sequences of IrisCodes computed both from real iris images and from synthetic white noise iris images, whose pixel values are random and uncorrelated. The capacity o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relay Broadcast Channel With Confidential Messages

    Publication Year: 2016, Page(s):410 - 425
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1152 KB) | HTML iconHTML

    In this paper, we investigate the effects of a trusted relay node on the secrecy of the broadcast channel by considering the model of relay broadcast channel with confidential messages (RBC-CM). Inner and outer bounds on the capacity-equivocation region of the RBC-CM are provided, and the capacity results are further explained via a degraded Gaussian example, which we call the degraded Gaussian re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on “Joint Global and Local Structure Discriminant Analysis”

    Publication Year: 2016, Page(s):426 - 428
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (317 KB) | HTML iconHTML

    Joint global and local structure discriminant analysis (JGLDA) is a recently-developed linear discriminant analysis approach, which considers the diversity of data across classes. In this communication, however, we will show that the discussion on the characterization of within-class locality and within-class diversity of previous efforts on local linear discriminant analysis (LLDA) and JGLDA is f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rebuttal to “Comments on ‘Joint Global and Local Structure Discriminant Analysis”’

    Publication Year: 2016, Page(s):429 - 430
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (296 KB) | HTML iconHTML

    In the above paper, the authors pointed out that our motivation was flawed in our previous paper, and provided some comments. In this paper, we point out the inexact understanding and representation in the comment paper and then present a detail explanation for our previous paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2016, Page(s): 431
    Request permission for commercial reuse | |PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2016, Page(s):432 - 433
    Request permission for commercial reuse | |PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Special issue on distributed information processing in social networks

    Publication Year: 2016, Page(s): 434
    Request permission for commercial reuse | |PDF file iconPDF (602 KB)
    Freely Available from IEEE
  • Special issue on inference and learning over networks

    Publication Year: 2016, Page(s): 435
    Request permission for commercial reuse | |PDF file iconPDF (627 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Patrizio Campisi
University of Roma TRE, Italy