By Topic

IEEE Transactions on Information Forensics and Security

Issue 1 • March 2008

Filter Results

Displaying Results 1 - 17 of 17
  • Table of contents

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2008, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding

    Publication Year: 2008, Page(s):1 - 15
    Cited by:  Papers (31)  |  Patents (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensuring data-hiding security. Using proper and realistic apriori hypothesis on the messages distribution, it is possible to accurately estimate the secret carriers by casting this estimation problem into a blind source separation prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Image Watermarking Using Multidimensional Fourier Transforms

    Publication Year: 2008, Page(s):16 - 28
    Cited by:  Papers (73)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1018 KB) | HTML iconHTML

    This paper presents two vector watermarking schemes that are based on the use of complex and quaternion Fourier transforms and demonstrates, for the first time, how to embed watermarks into the frequency domain that is consistent with our human visual system. Watermark casting is performed by estimating the just-noticeable distortion of the images, to ensure watermark invisibility. The first metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Additive Watermark Detectors Based On A Hierarchical Spatially Adaptive Image Model

    Publication Year: 2008, Page(s):29 - 37
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (889 KB) | HTML iconHTML

    In this paper, we propose a new family of watermark detectors for additive watermarks in digital images. These detectors are based on a recently proposed hierarchical, two-level image model, which was found to be beneficial for image recovery problems. The top level of this model is defined to exploit the spatially varying local statistics of the image, while the bottom level is used to characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical-Layer Authentication

    Publication Year: 2008, Page(s):38 - 51
    Cited by:  Papers (63)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread-spectrum communications) exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Severe Image Compression on Iris Recognition Performance

    Publication Year: 2008, Page(s):52 - 61
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3592 KB) | HTML iconHTML

    We investigate three schemes for severe compression of iris images in order to assess what their impact would be on recognition performance of the algorithms deployed today for identifying people by this biometric feature. Currently, standard iris images are 600 times larger than the IrisCode templates computed from them for database storage and search; but it is administratively desired that iris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Region Ensemble for 3-D Face Recognition

    Publication Year: 2008, Page(s):62 - 73
    Cited by:  Papers (120)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2678 KB) | HTML iconHTML

    In this paper, we introduce a new system for 3D face recognition based on the fusion of results from a committee of regions that have been independently matched. Experimental results demonstrate that using 28 small regions on the face allow for the highest level of 3D face recognition. Score-based fusion is performed on the individual region match scores and experimental results show that the Bord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining Image Origin and Integrity Using Sensor Noise

    Publication Year: 2008, Page(s):74 - 90
    Cited by:  Papers (203)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6174 KB) | HTML iconHTML

    In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformity noise (PRNU), which is a unique stochastic fingerprint of imaging sensors. The PRNU is obtained using a maximum-likelihood estimator derived from a simplified model of the sensor output. Both digital forensics tasks ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification and Feature Extraction by Simplexization

    Publication Year: 2008, Page(s):91 - 100
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1756 KB) | HTML iconHTML

    Techniques for classification and feature extraction are often intertwined. In this paper, we contribute to these two aspects via the shared philosophy of simplexizing the sample set. For general classification, we present a new criteria based on the concept of -nearest-neighbor simplex (), which is constructed by the nearest neighbors, to determine the class label of a new datum. For feature extr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital image forensics via intrinsic fingerprints

    Publication Year: 2008, Page(s):101 - 117
    Cited by:  Papers (96)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1876 KB) | HTML iconHTML

    Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity and the availability of low-cost image editing software, the integrity of digital image content can no longer be taken for granted. This paper introduces a new methodology for the forensic analysis of digital camera image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An FPGA-Based Network Intrusion Detection Architecture

    Publication Year: 2008, Page(s):118 - 132
    Cited by:  Papers (20)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (925 KB) | HTML iconHTML

    Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit networks, current generation networking components for NIDS will soon be insufficient for numerous reasons; most notably because the existing methods cannot support high-performance demands. Field-programmable gate arrays (FPGAs) are a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Information Forensics and Security EDICS

    Publication Year: 2008, Page(s): 133
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Information for authors

    Publication Year: 2008, Page(s):134 - 135
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 9th International Conference on Signal Processing (ICSP'08)

    Publication Year: 2008, Page(s): 136
    Request permission for commercial reuse | PDF file iconPDF (573 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2008, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Blank page [back cover]

    Publication Year: 2008, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy