By Topic

IEEE Transactions on Information Forensics and Security

Issue 4 • April 2014

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):539 - 540
    Request permission for commercial reuse | PDF file iconPDF (372 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):541 - 542
    Request permission for commercial reuse | PDF file iconPDF (373 KB)
    Freely Available from IEEE
  • A Hybrid Scheme for Authenticating Scalable Video Codestreams

    Publication Year: 2014, Page(s):543 - 553
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1647 KB) | HTML iconHTML

    A scalable video coding (SVC) codestream consists of one base layer and possibly several enhancement layers. The base layer, which contains the lowest quality and resolution images, is the foundation of the SVC codestream and must be delivered to recipients, whereas enhancement layers contain richer contour/texture of images in order to supplement the base layer in resolution, quality, and tempora... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection

    Publication Year: 2014, Page(s):554 - 567
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2024 KB) | HTML iconHTML

    Graphics editing programs of the last generation provide ever more powerful tools, which allow for the retouching of digital images leaving little or no traces of tampering. The reliable detection of image forgeries requires, therefore, a battery of complementary tools that exploit different image properties. Techniques based on the photo-response non-uniformity (PRNU) noise are among the most val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multitouch Gesture-Based Authentication

    Publication Year: 2014, Page(s):568 - 582
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3356 KB) | HTML iconHTML

    This paper investigates multitouch gestures for user authentication on touch sensitive devices. A canonical set of 22 multitouch gestures was defined using characteristics of hand and finger movement. Then, a multitouch gesture matching algorithm robust to orientation and translation was developed. Two different studies were performed to evaluate the concept. First, a single session experiment was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harnessing Motion Blur to Unveil Splicing

    Publication Year: 2014, Page(s):583 - 595
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2407 KB) | HTML iconHTML

    The extensive availability of sophisticated image editing tools has rendered it relatively easy to produce fake images. Image splicing is a form of tampering in which an original image is altered by copying a portion from a different source. Because the phenomenon of motion blur is a common occurrence in hand-held cameras, we propose a passive method to automatically detect image splicing using bl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution

    Publication Year: 2014, Page(s):596 - 606
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2674 KB) | HTML iconHTML

    Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks on Kuribayashi's Fingerprinting Scheme

    Publication Year: 2014, Page(s):607 - 609
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    The main threat against fingerprinting systems is collusion attacks. The attack most commonly assumed in the literature is a combination of averaging the collusion fingerprints and additive noise. In this correspondence, we demonstrate that the recently proposed fingerprinting scheme of Kuribayashi's is very vulnerable to certain nonlinear collusion attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme

    Publication Year: 2014, Page(s):610 - 623
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2212 KB) | HTML iconHTML

    When a binary fingerprinting codeword is embedded into multimedia content by using a spread-spectrum (SS) watermarking scheme, it is difficult for colluders to perform a symbol-wise attack using their codewords. As discussed in regard to SS fingerprinting schemes, averaging their copies is a cost-effective attack from the signal processing point of view. If the number of colluders is known, an opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?

    Publication Year: 2014, Page(s):624 - 632
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1561 KB) | HTML iconHTML

    Relay transmission can enhance coverage and throughput, whereas it can be vulnerable to eavesdropping attacks due to the additional transmission of the source message at the relay. Thus, whether or not one should use relay transmission for secure communication is an interesting and important problem. In this paper, we consider the transmission of a confidential message from a source to a destinati... View full abstract»

    Open Access
  • New Forensic ENF Reference Database for Media Recording Authentication Based on Harmony Search Technique Using GIS and Wide Area Frequency Measurements

    Publication Year: 2014, Page(s):633 - 644
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2842 KB) | HTML iconHTML

    In forensic sciences, verification of digital media recordings is an important aspect. Electrical network frequency (ENF) criterion is a promising technique for media recording authentication. The ENF reference database is recorded from a single point on the power grid based on the fact that the ENF variation is the same across all points on the grid. This fact is not valid in case of system distu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of Lightweight WG-8 Stream Cipher

    Publication Year: 2014, Page(s):645 - 652
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2470 KB) | HTML iconHTML

    WG-8 is a new lightweight variant of the well-known Welch-Gong (WG) stream cipher family, and takes an 80-bit secret key and an 80-bit initial vector (IV) as inputs. So far no attack on the WG-8 stream cipher has been published except the attacks by the designers. This paper shows that there exist Key-IV pairs for WG-8 that can generate keystreams, which are exact shifts of each other throughout t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Relation of Random Grid and Deterministic Visual Cryptography

    Publication Year: 2014, Page(s):653 - 665
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    Visual cryptography is a special type of secret sharing. Two models of visual cryptography have been independently studied: 1) deterministic visual cryptography, introduced by Naor and Shamir, and 2) random grid visual cryptography, introduced by Kafri and Keren. In this paper, we show that there is a strict relation between these two models. In particular, we show that to any random grid scheme c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification

    Publication Year: 2014, Page(s):666 - 680
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2774 KB) | HTML iconHTML

    Identifying criminals and victims in images (e.g., child pornography and masked gunmen) can be a challenging task, especially when neither their faces nor tattoos are observable. Skin mark patterns and blood vessel patterns are recently proposed to address this problem. However, they are invisible in low-resolution images and dense androgenic hair can cover them completely. Medical research result... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

    Publication Year: 2014, Page(s):681 - 694
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2244 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication overhead and energy consumption. The research community proposed a loss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry

    Publication Year: 2014, Page(s):695 - 708
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1969 KB) | HTML iconHTML

    The personal identification number (PIN) is a well-known authentication method used in various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the conventional PIN-entry method is vulnerable to shoulder-surfing attacks. Consequently, various shoulder-surfing resistant methods have been proposed. However, the security analyses used to justify these proposed methods ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • {\rm PROFIL}_{R} : Toward Preserving Privacy and Functionality in Geosocial Networks

    Publication Year: 2014, Page(s):709 - 718
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Profit is the main participation incentive for social network providers. Its reliance on user profiles, built from a wealth of voluntarily revealed personal information, exposes users to a variety of privacy vulnerabilities. In this paper, we propose to take first steps toward addressing the conflict between profit and privacy in geosocial networks. We introduce PROFILR, a framework for constructi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

    Publication Year: 2014, Page(s):719 - 729
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1791 KB) | HTML iconHTML

    This paper considers the security of transmission in buffer-aided decode-and-forward cooperative wireless networks. An eavesdropper which can intercept the data transmission from both the source and relay nodes is considered to threaten the security of transmission. Finite size data buffers are assumed to be available at every relay in order to avoid having to select concurrently the best source-t... View full abstract»

    Open Access
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2014, Page(s): 730
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2014, Page(s):731 - 732
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Special issue on biometric spoofing and countermeasures

    Publication Year: 2014, Page(s): 733
    Request permission for commercial reuse | PDF file iconPDF (392 KB)
    Freely Available from IEEE
  • Special issue on signal processing for big data

    Publication Year: 2014, Page(s): 734
    Request permission for commercial reuse | PDF file iconPDF (645 KB)
    Freely Available from IEEE
  • Special issue on spatial audio

    Publication Year: 2014, Page(s): 735
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy