default search action
1st WIFS 2009: London, UK
- First IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, December 6-9, 2009. IEEE 2009, ISBN 978-1-4244-5279-8
Watermarking and Perceptual Models
- Rony Darazi, Pilar Callau Uson, Benoît Macq:
Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital Cinema. 1-5 - Antonis Mairgiotis, Nikolaos Galatsanos:
A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detection. 6-10 - Federica Battisti, Marco Carli, Alessandro Neri:
QIM-DM watermarking optimization based on inter-frequency contrast masking in the DCT domain. 11-15
Forensics
- Steven J. Simske, Margaret Sturgill, Paul Everest, George Guillory:
A system for forensic analysis of large image sets. 16-20 - Matthias Kirchner, Thomas Gloe:
On resampling detection in re-compressed images. 21-25 - Aravind K. Mikkilineni, Deen King-Smith, Saul B. Gelfand, Edward J. Delp:
Forensic characterization of RF devices. 26-30 - Johan Garcia, Thijs Holleboom:
Retention of micro-fragments in cluster slack - A first model. 31-35
Traitor Tracing
- José Moreira, Marcel Fernandez, Miguel Soriano:
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes. 36-40 - Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos fingerprinting codes in the combined digit model. 41-45 - Luis Pérez-Freire, Teddy Furon:
Blind decoder for binary probabilistic traitor tracing codes. 46-50 - Yen-Wei Huang, Pierre Moulin:
Capacity-achieving fingerprint decoding. 51-55 - Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. 56-60
Biometry
- Francesco Beritelli, Andrea Spadaccini:
Heart sounds quality analysis for automatic cardiac biometry applications. 61-65 - Takao Murakami, Kenta Takahashi:
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test. 66-70 - Yige Wang, Shantanu Rane, Anthony Vetro:
Leveraging reliable bits: ECC design considerations for practical secure biometric systems. 71-75 - Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak:
Fast identification algorithms for forensic applications. 76-80 - Abhishek Nagar, Anil K. Jain:
On the security of non-invertible fingerprint template transforms. 81-85 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof:
Privacy enhancement of common randomness based authentication: Key rate maximized case. 86-90
Privacy and Anonymity
- Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider, Vladimir Kolesnikov:
Efficient privacy-preserving classification of ECG signals. 91-95 - Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:
Privacy-preserving user clustering in a social network. 96-100 - Fabio Dellutri, Luigi Laura, Vittorio Ottaviani, Giuseppe F. Italiano:
Extracting social networks from seized smartphones and web data. 101-105 - Michaël Sterckx, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Efficient implementation of anonymous credentials on Java Card smart cards. 106-110
Content Fingerprinting
- Avinash L. Varna, Min Wu:
Modeling content fingerprints using markov random fields. 111-115 - Wei-Hong Chuang, Avinash L. Varna, Min Wu:
Modeling and analysis of ordinal ranking in content fingerprinting. 116-120 - Mehrdad Fatourechi, Xudong Lv, Z. Jane Wang, Rabab K. Ward:
Towards automated image hashing based on the Fast Johnson-Lindenstrauss Transform (FJLT). 121-125 - Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski:
Security of robust audio hashes. 126-130
Watermarking, Steganography and Information Hiding
- Tomás Filler, Jessica J. Fridrich:
Wet ZZW construction for steganography. 131-135 - Maria V. Ortiz Segovia, George T.-C. Chiu, Jan P. Allebach:
Using forms for information hiding and coding in electrophotographic documents. 136-140 - Chuhong Fei, Raymond H. Kwong, Deepa Kundur:
Secure semi-fragilewatermarking for image authentication. 141-145 - Michele Scagliola, Fernando Pérez-González, Pietro Guccione:
An extended analysis of discrete fourier tranform - rational dither modulation for non-white hosts. 146-150 - Matthew Gaubatz, Steven J. Simske:
Printer-scanner identification via analysis of structured security deterrents. 151-155
Non-White Hosts
- Tian-Tsong Ng, Mao-Pei Tsui:
Camera response function signature for digital forensics - Part I: Theory and data selection. 156-160 - Tian-Tsong Ng:
Camera response function signature for digital forensics - Part II: Signature extraction. 161-165 - Nitin Khanna, Edward J. Delp:
Source scanner identification for scanned documents. 166-170 - Gökhan Gül, Ismail Avcibas:
Source cell phone camera identification based on singular value decomposition. 171-175
Non-White Hosts
- Tiziano Bianchi, Thijs Veugen, Alessandro Piva, Mauro Barni:
Processing in the encrypted domain using a composite signal representation: Pros and cons. 176-180 - Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker:
BitStalker: Accurately and efficiently monitoring bittorrent traffic. 181-185 - Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji:
RFID key establishment against active adversaries. 186-190 - Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Practical DPA attacks on MDPL. 191-195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.