default search action
7th WIFS 2015: Roma, Italy
- 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015, Roma, Italy, November 16-19, 2015. IEEE 2015, ISBN 978-1-4673-6802-5
- Onur Günlü, Onurcan Iscan, Gerhard Kramer:
Reliable secret key generation from physical unclonable functions under varying environmental conditions. 1-6 - Tomás Pevný, Ivan Nikolaev:
Optimizing pooling function for pooled steganalysis. 1-6 - Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Forensics of high-quality JPEG images with color subsampling. 1-6 - Ram P. Krish, Julian Fiérrez, Daniel Ramos:
Integrating rare minutiae in generic fingerprint matchers for forensics. 1-6 - Marcel Fernandez, Elena Egorova, Grigory Kabatiansky:
Binary fingerprinting codes - can we prove that someone is guilty?! 1-4 - Tuan Phan Vuong, George Loukas, Diane Gan, Anatolij Bezemskij:
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. 1-6 - Andrea Grigorescu, Holger Boche, Rafael F. Schaefer:
Robust PUF based authentication. 1-6 - Lucilla Pronti, Pasquale Ferrara, Francesca Uccheddu, Anna Pelagotti, Alessandro Piva:
Identification of pictorial materials by means of optimized multispectral reflectance image processing. 1-6 - Hasan Sheikh Faridul, Gwenaël J. Doërr:
A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence. 1-6 - Ning Jia, Victor Sanchez, Chang-Tsun Li, Hassan Mansour:
The influence of segmentation on individual gait recognition. 1-6 - Andrey Garnaev, Wade Trappe:
Impact of incomplete knowledge on scanning strategy. 1-6 - Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva:
Splicebuster: A new blind image splicing detector. 1-6 - Hasan Sajid, Sen-Ching Samson Cheung:
VSig: Hand-gestured signature recognition and authentication with wearable camera. 1-6 - Abelino Jimenez, Bhiksha Raj, José Portelo, Isabel Trancoso:
Secure Modular Hashing. 1-6 - Julien Bringer, Hervé Chabanne, Firas Kraiem, Roch Lescuyer, Eduardo Soria-Vazquez:
Some applications of verifiable computation to biometric verification. 1-6 - Allen Sarkisyan, Ryan Debbiny, Ani Nahapetian:
WristSnoop: Smartphone PINs prediction using smartwatch motion sensors. 1-6 - Susan El-Naggar, Arun Ross:
Which dataset is this iris image from? 1-6 - Tan N. Nguyen, Rémi Cogranne, Guillaume Doyen, Florent Retraint:
Detection of interest flooding attacks in Named Data Networking using hypothesis testing. 1-6 - Félix Balado:
Optimum reversible data hiding and permutation coding. 1-4 - Chen Chen, Matthew C. Stamm:
Camera model identification framework using an ensemble of demosaicing features. 1-6 - Ta-Yuan Liu, Shih-Chun Lin, Yao-Win Peter Hong:
Multicasting with untrusted relays: A noncoherent secure network coding approach. 1-6 - Benedetta Tondi, Mauro Barni, Neri Merhav:
Detection games with a fully active attacker. 1-6 - Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
On the effectiveness of meta-detection for countering oracle attacks in watermarking. 1-6 - Anne Wolf, Eduard A. Jorswieck, Carsten Rudolf Janda:
Worst-case secrecy rates in MIMOME systems under input and state constraints. 1-6 - Matthias Kirchner, Sujoy Chakraborty:
A second look at first significant digit histogram restoration. 1-6 - Chau-Wai Wong, Min Wu:
Counterfeit detection using paper PUF and mobile cameras. 1-6 - Erwin Quiring, Matthias Kirchner:
Fragile sensor fingerprint camera identification. 1-6 - Abhishek Kumar Gangwar, Akanksha Joshi:
Local Gabor Rank Pattern (LGRP): A novel descriptor for face representation and recognition. 1-6 - Kannan Karthik:
Key search and adaptation based on association rules for backward secrecy. 1-6 - Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez:
Update strategies for HMM-based dynamic signature biometric systems. 1-6 - Zekeriya Erkin:
Private data aggregation with groups for smart grids in a dynamic setting using CRT. 1-6 - Paulo A. A. Esquef, José Antonio Apolinário, Luiz W. P. Biscainho:
Improved edit detection in speech via ENF patterns. 1-6 - Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. 1-6 - Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Improved 3D lighting environment estimation for image forgery detection. 1-6 - Tomás Denemark, Jessica J. Fridrich:
Side-informed steganography with additive distortion. 1-6 - Binh Van Nguyen, Kiseon Kim:
Single relay selection for secure communication in a cooperative system with multiple full-duplex decode-and-forward relays. 1-6 - Soumik Mondal, Patrick Bours:
Continuous authentication and identification for mobile devices: Combining security and forensics. 1-6 - Roger L. Easton Jr., Kevin Sacca, Gregory Heyworth, Kenneth Boydston, Chet Van Duzer, Michael Phelps:
Rediscovering text in the Yale Martellus map. 1-6 - Stéphane G. Roux, Nicolas Tremblay, Pierre Borgnat, Patrice Abry, Herwig Wendt, Paul Messier:
Multiscale anisotropic texture unsupervised clustering for photographic paper. 1-6 - Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase:
Fast target link flooding attack detection scheme by analyzing traceroute packets flow. 1-6 - Shuichiro Haruta, Kentaroh Toyoda, Iwao Sasase:
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS. 1-6 - Rémi Cogranne:
A sequential method for online steganalysis. 1-6 - Rémi Cogranne, Vahid Sedighi, Jessica J. Fridrich, Tomás Pevný:
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? 1-6 - Massimo Iuliani, Giovanni Fabbri, Alessandro Piva:
Image splicing detection based on general perspective constraints. 1-6 - Santosh Tirunagari, Norman Poh, Miroslaw Bober, David Windridge:
Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. 1-6 - Fernando Alonso-Fernandez, Reuben A. Farrugia, Josef Bigün:
Reconstruction of smartphone images for low resolution iris recognition. 1-6 - Philipp Wachter, Michael Gruhn:
Practicability study of android volatile memory forensic research. 1-6 - Hendrik Vogt, Aydin Sezgin:
Full-duplex vs. half-duplex secret-key generation. 1-6 - Suah Kim, Rolf Lussi, Xiaochao Qu, Hyoung Joong Kim:
Automatic contrast enhancement using reversible data hiding. 1-5 - Xiao Yang, Jianjiang Feng, Jie Zhou, Shutao Xia:
Detection and segmentation of latent fingerprints. 1-6 - Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy:
Information-theoretical limits of active content fingerprinting in content-based identification systems. 1-6 - Wei Fan, Kai Wang, François Cayre:
General-purpose image forensics using patch likelihood under image statistical models. 1-6 - Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
TRAP: Using Targeted ads to unveil Google personal profiles. 1-6 - Shantanu Rane, Julien Freudiger, Alejandro E. Brito, Ersin Uzun:
Privacy, efficiency & fault tolerance in aggregate computations on massive star networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.