By Topic

IEEE Transactions on Information Forensics and Security

Issue 2 • June 2007

Filter Results

Displaying Results 1 - 24 of 24
  • Table of contents

    Publication Year: 2007, Page(s):C1 - C4
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2007, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Noniterative Algorithms for Sensitivity Analysis Attacks

    Publication Year: 2007, Page(s):113 - 126
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (977 KB) | HTML iconHTML

    Sensitivity analysis attacks constitute a powerful family of watermark "removal" attacks. They exploit vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. This paper proposes a mathematical framework for designing sensitivity analysis attacks and focuses on additive spread-spectrum embedding schemes. The detectors under attack range in complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking

    Publication Year: 2007, Page(s):127 - 139
    Cited by:  Papers (68)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3748 KB) | HTML iconHTML

    Traditional quantization index modulation (QIM) methods are based on a fixed quantization step size, which may lead to poor fidelity in some areas of the content. A more serious limitation of the original QIM algorithm is its sensitivity to valumetric changes (e.g., changes in amplitude). In this paper, we first propose using Watson's perceptual model to adaptively select the quantization step siz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of Error Distribution in Least Squares Steganalysis

    Publication Year: 2007, Page(s):140 - 148
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    This paper considers the least squares method (LSM) for estimation of the length of payload embedded by least-significant bit replacement in digital images. Errors in this estimate have already been investigated empirically, showing a slight negative bias and substantially heavy tails (extreme outliers). In this paper, (approximations for) the estimator distribution over cover images are derived: ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Constructive and Unifying Framework for Zero-Bit Watermarking

    Publication Year: 2007, Page(s):149 - 163
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (838 KB) | HTML iconHTML

    In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of content. The watermark detector checks for the presence of this particular weak signal in received contents. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical Watermarking for Printed Document Authentication

    Publication Year: 2007, Page(s):164 - 173
    Cited by:  Papers (17)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    This article describes a novel visual information concealment technique, referred to as optical watermarking, for the authentication of original printed documents. An optical watermark is a two-dimensional binary image. It can be of any shape and can be printed on any part of a document. The optical watermark is constructed by the superposition of multiple two-dimensional binary images (referred t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition

    Publication Year: 2007, Page(s):174 - 180
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    In this paper, we first develop a direct Bayesian-based support vector machine (SVM) by combining the Bayesian analysis with the SVM. Unlike traditional SVM-based face recognition methods that require one to train a large number of SVMs, the direct Bayesian SVM needs only one SVM trained to classify the face difference between intrapersonal variation and extrapersonal variation. However, the addit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hand-Geometry Recognition Using Entropy-Based Discretization

    Publication Year: 2007, Page(s):181 - 187
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    The hand-geometry-based recognition systems proposed in the literature have not yet exploited user-specific dependencies in the feature-level representation. We investigate the possibilities to improve the performance of the existing hand-geometry systems using the discretization of extracted features. This paper proposes employing discretization of hand-geometry features, using entropy-based heur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Identification From Dental X-Ray Images Based on the Shape and Appearance of the Teeth

    Publication Year: 2007, Page(s):188 - 197
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2746 KB) | HTML iconHTML

    Dental biometrics deal with human identification from dental characteristics. In this paper, we present a new technique for identifying people based upon shapes and appearances of their teeth from dental X-ray radiographs. The new technique represents each tooth by a feature vector obtained from the forcefield energy function of the grayscale image of the tooth and Fourier descriptors of the conto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing Malicious Relays in Cooperative Wireless Communications

    Publication Year: 2007, Page(s):198 - 212
    Cited by:  Papers (37)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1282 KB) | HTML iconHTML

    A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes

    Publication Year: 2007, Page(s):213 - 226
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1057 KB) | HTML iconHTML

    In secure group-oriented applications, key management schemes are employed to distribute and update keys such that unauthorized parties cannot access group communications. Key management, however, can disclose information about the dynamics of group membership, such as the group size and the number of joining and departing users. This is a threat to applications with confidential group membership ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks

    Publication Year: 2007, Page(s):227 - 239
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (713 KB) | HTML iconHTML

    In ad-hoc networks, nodes need to cooperatively forward packets for each other. Without necessary countermeasures, such networks are extremely vulnerable to injecting traffic attacks, especially those launched by insider attackers. Injecting an overwhelming amount of traffic into the network can easily cause network congestion and decrease the network lifetime. In this paper, we focus on those inj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis

    Publication Year: 2007, Page(s):240 - 253
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    In cooperative ad-hoc networks, nodes belong to the same authority and pursue the common goals, and will usually unconditionally help each other. Consequently, without necessary countermeasures, such networks are extremely vulnerable to insider attacks, especially under noise and imperfect monitoring. In this paper, we present a game theoretic analysis of securing cooperative ad-hoc networks again... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Robust Audio Hashing

    Publication Year: 2007, Page(s):254 - 266
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    We present a novel theoretical analysis of the Philips audio fingerprinting method proposed by Haitsma, Kalker, and Oostveen (2001). Although this robust hashing algorithm exhibits very good performance, the method has only been partially analyzed in the literature. Hence, there is a clear need for a more complete analysis which allows both performance prediction and systematic optimization. We ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cascade Framework for a Real-Time Statistical Plate Recognition System

    Publication Year: 2007, Page(s):267 - 282
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2677 KB) | HTML iconHTML

    This paper describes a plate recognition system that can process images rapidly at high accuracy rates. This system is designed to meet the requirements of performance, computational speed, and adaptation for vehicle surveillance applications, such as stolen car detection systems. These requirements are satisfied by adopting a cascade framework, utilizing plate characteristics, and developing fast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Scalar DC–QIM for Zero-Bit Watermarking

    Publication Year: 2007, Page(s):283 - 289
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3126 KB) | HTML iconHTML

    Quantization-based schemes, such as scalar distortion compensated quantization index modulation (DC-QIM), have demonstrated some performance merits in data hiding, which is mainly a transmission problem. However, a number of applications can be stated in terms of the watermark detection problem (also named zero-bit watermarking), and this situation has been seldom addressed in the literature for q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2007, Page(s): 290
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2007, Page(s):291 - 292
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Special issue on Multimedia Applications in Mobile/Wireless Context

    Publication Year: 2007, Page(s): 293
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Special issue on MIMO-Optimized Transmission Systems for Delivering Data and Rich Content

    Publication Year: 2007, Page(s): 294
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Special issue on Genomic and Proteomic Signal Processing

    Publication Year: 2007, Page(s): 295
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)

    Publication Year: 2007, Page(s): 296
    Request permission for commercial reuse | PDF file iconPDF (573 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2007, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy