default search action
WIFS 2012: Costa Adeje, Tenerife, Spain
- 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012. IEEE 2012, ISBN 978-1-4673-2285-0
- Xuanbin Si, Jianjiang Feng, Jie Zhou:
Detecting fingerprint distortion from a single image. 1-6 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:
Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensors. 7-12 - Chengwei Huang, Boris A. Efraty, Uday Kurkure, Manos Papadakis, Shishir K. Shah, Ioannis A. Kakadiaris:
Facial landmark configuration for improved detection. 13-18 - Jürgen Metzler:
Two-stage appearance-based re-identification of humans in low-resolution videos. 19-24 - Emanuele Maiorana, Daniele Blasi, Patrizio Campisi:
Biometric template protection using turbo codes and modulation constellations. 25-30 - Brian DeCann, Arun Ross:
Can a "poor" verification system be a "good" identification system? A preliminary study. 31-36 - Gabriel Hospodar, Roel Maes, Ingrid Verbauwhede:
Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. 37-42 - Sviatoslav Voloshynovskiy, Maurits Diephuis, Fokko Beekhof, Oleksiy J. Koval, Bruno Keel:
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS). 43-48 - Thijs Veugen:
Improving the DGK comparison protocol. 49-54 - Tommaso Pignata, Riccardo Lazzeretti, Mauro Barni:
General function evaluation in a STPC setting via piecewise linear approximation. 55-60 - Bing-Rong Lin, Ye Wang, Shantanu Rane:
A framework for privacy preserving statistical analysis on distributed databases. 61-66 - Ravi Garg, Avinash L. Varna, Min Wu:
Modeling and analysis of Electric Network Frequency signal for timestamp verification. 67-72 - Yannis Panagakis, Constantine Kotropoulos:
Telephone handset identification by feature selection and sparse representations. 73-78 - Andreas Peter, Thomas Hartmann, Sascha Müller, Stefan Katzenbeisser:
Privacy-preserving architecture for forensic image recognition. 79-84 - Maik Schott, Ronny Merkel, Jana Dittmann:
Sequence detection of overlapping latent fingerprints using a short-term aging feature. 85-90 - Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
Semantic based DNS forensics. 91-96 - Juan A. Elices, Fernando Pérez-González:
Fingerprinting a flow of messages to an anonymous server. 97-102 - Tomás Pevný, Martin Rehák, Martin Grill:
Detecting anomalous network hosts by means of PCA. 103-108 - Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
Forensic analysis of wireless networking evidence of Android smartphones. 109-114 - Fernando Pérez-González, Carmela Troncoso:
A Least Squares approach to user profiling in pool mix-based anonymous communication systems. 115-120 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Mapping evidence graphs to attack graphs. 121-126 - Tiziano Bianchi, Alessandro Piva:
Reverse engineering of double JPEG compression in the presence of image resizing. 127-132 - Fokko Beekhof, Sviatoslav Voloshynovskiy, Farzad Farhadzadeh:
Content authentication and identification under informed attacks. 133-138 - Thomas Gloe:
Forensic analysis of ordered data structures on the example of JPEG files. 139-144 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices. 145-150 - David Vazquez-Padin, Marco Fontani, Tiziano Bianchi, Pedro Comesaña, Alessandro Piva, Mauro Barni:
Detection of video double encoding with GOP size estimation. 151-156 - Miguel Masciopinto, Pedro Comesaña:
IPTV streaming source classification. 157-162 - Jessica J. Fridrich:
Effect of cover quantization on steganographic fisher information. 163-168 - Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
An efficient JPEG steganographic scheme using uniform embedding. 169-174 - Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak:
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting. 175-180 - Xiao-Ming Chen, Michael Arnold, Peter G. Baum, Gwenaël J. Doërr:
AC-3 bit stream watermarking. 181-186 - Teddy Furon, Arnaud Guyader, Frédéric Cérou:
Decoding fingerprints using the Markov Chain Monte Carlo method. 187-192 - Pascal Schöttle, Stefan Korff, Rainer Böhme:
Weighted stego-image steganalysis for naive content-adaptive embedding. 193-198 - Mauro Barni, Benedetta Tondi:
Optimum forensic and counter-forensic strategies for source identification with training data. 199-204 - David Vazquez-Padin, Pedro Comesaña:
ML estimation of the resampling factor. 205-210 - Pedro Comesaña:
Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains. 211-216 - Sergio Bravo-Solorio, Chang-Tsun Li, Asoke K. Nandi:
Watermarking method with exact self-propagating restoration capabilities. 217-222 - Ion Caciula, Dinu Coltuc:
Capacity control of reversible watermarking by two-thresholds embedding. 223-227 - Pham Hai Dang Le, Matthias O. Franz:
How to find relevant training data: A paired bootstrapping approach to blind steganalysis. 228-233 - Vojtech Holub, Jessica J. Fridrich:
Designing steganographic distortion using directional filters. 234-239 - Thijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen:
Dynamic traitor tracing for arbitrary alphabets: Divide and conquer. 240-245 - Hajer Fradi, Jean-Luc Dugelay:
Low level crowd analysis using frame-wise normalized feature for people counting. 246-251 - Duc-Tien Dang-Nguyen, Giulia Boato, Francesco G. B. De Natale:
Identify computer generated characters by analysing facial expressions variation. 252-257 - Sabrina Gerbracht, Eduard A. Jorswieck, Gan Zheng, Björn E. Ottersten:
Non-regenerative two-hop wiretap channels using interference neutralization. 258-263 - Romeo Giuliano, Alessandro Neri, Damiano Valletta:
End-to-end secure connection in heterogeneous networks for critical scenarios. 264-269 - Holger Boche, Rafael F. Wyrembelski:
Comparison of different attack classes in arbitrarily varying wiretap channels. 270-275 - Jiangyuan Li, Athina P. Petropulu:
Optimality of beamforming for secrecy capacity of MIMO wiretap channels. 276-281 - Yupeng Liu, Athina P. Petropulu:
Destination assisted cooperative jamming for wireless physical layer security. 282-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.