BITCQ

Transactions_on_Information_Forensics_and_Security

Size: 372.5 MB
Magnet link

Name Size
Transactions_on_Information_Forensics_and_Security/2006-1/A_Clustering_Based_Approach_to_Perceptual_Image_Hashing.pdf 780 KB
Transactions_on_Information_Forensics_and_Security/2006-1/A_Markov_Chain_Monte_Carlo_Algorithm_for_Bayesian_Dynamic_Signature_Verificatio.pdf 825 KB
Transactions_on_Information_Forensics_and_Security/2006-1/An_Accurate_Analysis_of_Scalar_Quantization-Based_Data_Hiding.pdf 340 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Analysis_and_Design_of_Secure_Watermark-Based_Authentication_Systems.pdf 477 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Approximate_Message_Authentication_Codes_for_N_-ary_Alphabets.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2006-1/Automatic_Facial_Expression_Recognition_Using_Facial_Animation_Parameters_and_Mu.pdf 746 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Editorial_Introducing_T-IFS.pdf 141 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Personal_Authentication_Using_3-D_Finger_Geometry.pdf 805 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Steganalysis_Using_Higher-Order_Image_Statistics.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2006-1/The_NTMAC_for_Authentication_of_Noisy_Messages.pdf 254 KB
Transactions_on_Information_Forensics_and_Security/2006-1/Watermarking_Relying_on_Cover_Signal_Content_to_Hide_Synchronization_Marks.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2006-1/Wet_Paper_Codes_With_Improved_Embedding_Efficiency.pdf 728 KB
Transactions_on_Information_Forensics_and_Security/2006-2/An_Algorithm_for_Distorted_Fingerprint_Matching_Based_on_Local_Triangle_Feature_.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Biometrics_A_Tool_for_Information_Security.pdf 2.8 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Digital_Camera_Identification_From_Sensor_Pattern_Noise.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Efficient_Spatial_Image_Watermarking_via_New_Perceptual_Masking_and_Blind_Detec.pdf 3.3 MB
Transactions_on_Information_Forensics_and_Security/2006-2/EyeCerts.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Joint_Coding_and_Embedding_Techniques_for_Multimedia_Fingerprinting.pdf 3.5 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Performance_Analysis_of_Iris-Based_Identification_System_at_the_Matching_Score_.pdf 1.9 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Reducing_Delay_and_Enhancing_DoS_Resistance_in_Multicast_Authentication_Through_.pdf 831 KB
Transactions_on_Information_Forensics_and_Security/2006-2/Robust_and_Secure_Image_Hashing.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Steganalysis_for_Markov_Cover_Data_With_Applications_to_Images.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2006-2/Teeth_Segmentation_in_Digitized_Dental_X-Ray_Films_Using_Mathematical_Morphology.pdf 5.1 MB
Transactions_on_Information_Forensics_and_Security/2006-2/The_Boneh–Shaw_Fingerprinting_Scheme_is_Better_Than_We_Thought.pdf 235 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Behavior_Forensics_for_Scalable_Multiuser_Collusion_Fairness_Versus_Effectivenes.pdf 965 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Block_QIM_Watermarking_Games.pdf 869 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Correspondence.pdf 177 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Dual_Protection_of_JPEG_Images_Based_on_Informed_Embedding_and_Two-Stage_Waterma.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2006-3/Estimation_of_Message_Source_and_Destination_From_Network_Intercepts.pdf 614 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Face_Identification_Using_Novel_Frequency-Domain_Representation_of_Facial_Asymm.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2006-3/Fake_Finger_Detection_by_Skin_Distortion_Analysis.pdf 5 MB
Transactions_on_Information_Forensics_and_Security/2006-3/Graphical_Passwords_Based_on_Robust_Discretization.pdf 159 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Gray_Hausdorff_Distance_Measure_for_Comparing_Face_Images.pdf 805 KB
Transactions_on_Information_Forensics_and_Security/2006-3/Matrix_Embedding_for_Large_Payloads.pdf 301 KB
Transactions_on_Information_Forensics_and_Security/2006-4/A_Set_Theoretic_Framework_for_Watermarking_and_Its_Application_to_Semifragile_Ta.pdf 6.5 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Correspondence.pdf 3.2 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Digital_Video_Steganalysis_Exploiting_Statistical_Visibility_in_the_Temporal_Dom.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Fingerprint_Retrieval_for_Identification.pdf 1.7 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Gaussian_Mixture_Modeling_of_Short-Time_Fourier_Transform_Features_for_Audio_Fin.pdf 422 KB
Transactions_on_Information_Forensics_and_Security/2006-4/Multilevel_2-D_Bar_Codes_Toward_High-Capacity_Storage_Modules_for_Multimedia_Sec.pdf 1.9 MB
Transactions_on_Information_Forensics_and_Security/2006-4/On_Fundamental_Limitations_of_Proving_Data_Theft.pdf 305 KB
Transactions_on_Information_Forensics_and_Security/2006-4/Print_and_Scan_Resilient_Data_Hiding_in_Images.pdf 3.3 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Reversible_Steganography_for_VQ-Compressed_Images_Using_Side_Matching_and_Reloca.pdf 2.5 MB
Transactions_on_Information_Forensics_and_Security/2006-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Known_Message_Attack.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2006-4/The_CRC–NTMAC_for_Noisy_Message_Authentication.pdf 448 KB
Transactions_on_Information_Forensics_and_Security/2006-4/Traitor-Within-Traitor_Behavior_Forensics_Strategy_and_Risk_Minimization.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2007-1/A_Framework_for_Robust_Watermarking_of_H.264-Encoded_Video_With_Controllable_Det.pdf 654 KB
Transactions_on_Information_Forensics_and_Security/2007-1/A_New_Steganographic_Method_for_Data_Hiding_in_Microsoft_Word_Documents_by_a_Cha.pdf 504 KB
Transactions_on_Information_Forensics_and_Security/2007-1/A_Parameter-Free_Framework_for_General_Supervised_Subspace_Learning.pdf 843 KB
Transactions_on_Information_Forensics_and_Security/2007-1/Learning_Discriminant_Person-Specific_Facial_Models_Using_Expandable_Graphs.pdf 3.5 MB
Transactions_on_Information_Forensics_and_Security/2007-1/Nonintrusive_Component_Forensics_of_Visual_Sensors_Using_Output_Images.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2007-1/On_Generation_and_Analysis_of_Synthetic_Iris_Images.pdf 5.7 MB
Transactions_on_Information_Forensics_and_Security/2007-1/Optimized_Feature_Extraction_for_Learning-Based_Image_Steganalysis.pdf 552 KB
Transactions_on_Information_Forensics_and_Security/2007-1/Statistically_Robust_Detection_of_Multiplicative_Spread-Spectrum_Watermarks.pdf 902 KB
Transactions_on_Information_Forensics_and_Security/2007-1/Steganalysis_of_Embedding_in_Two_Least-Significant_Bits.pdf 378 KB
Transactions_on_Information_Forensics_and_Security/2007-2/A_Cascade_Framework_for_a_Real-Time_Statistical_Plate_Recognition_System.pdf 2.6 MB
Transactions_on_Information_Forensics_and_Security/2007-2/A_Constructive_and_Unifying_Framework_for_Zero-Bit_Watermarking.pdf 839 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Analysis_and_Protection_of_Dynamic_Membership_Information_for_Group_Key_Distribu.pdf 981 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Correspondence.pdf 923 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Defense_Against_Injecting_Traffic_Attacks_in_Wireless_Mobile_Ad-Hoc_Networks.pdf 724 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Derivation_of_Error_Distribution_in_Least_Squares_Steganalysis.pdf 551 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Hand-Geometry_Recognition_Using_Entropy-Based_Discretization.pdf 784 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Human_Identification_From_Dental_X-Ray_Images_Based_on_the_Shape_and_Appearance.pdf 2.6 MB
Transactions_on_Information_Forensics_and_Security/2007-2/Noniterative_Algorithms_for_Sensitivity_Analysis_Attacks.pdf 972 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Optical_Watermarking_for_Printed_Document_Authentication.pdf 573 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Performance_Analysis_of_Robust_Audio_Hashing.pdf 874 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Securing_Cooperative_Ad-Hoc_Networks_Under_Noise_and_Imperfect_Monitoring_Strate.pdf 820 KB
Transactions_on_Information_Forensics_and_Security/2007-2/Tracing_Malicious_Relays_in_Cooperative_Wireless_Communications.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2007-2/Using_Perceptual_Models_to_Improve_Fidelity_and_Provide_Resistance_to_Valumetric.pdf 3.4 MB
Transactions_on_Information_Forensics_and_Security/2007-2/Using_Support_Vector_Machines_to_Enhance_the_Performance_of_Bayesian_Face_Recogn.pdf 348 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/A_Memetic_Fingerprint_Matching_Algorithm.pdf 625 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Channel_Identification_Secret_Sharing_Using_Reciprocity_in_Ultrawideband_Channe.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Double-Sided_Watermark_Embedding_and_Detection.pdf 635 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Complex_Lighting_Environments.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Interlaced_and_Deinterlaced_Video.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Lossless_Data_Embedding_With_High_Embedding_Capacity_Based_on_Declustering_for_V.pdf 1.7 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Multimodal_Wireless_Networks_Communication_and_Surveillance_on_the_Same_Infrastr.pdf 912 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Data-Hiding_Scheme_for_2-D_Vector_Maps_Based_on_Difference_Expansion.pdf 567 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Image_Watermarking_Based_on_Integer-to-Integer_Wavelet_Transform.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_Wireless_Transmission_of_Compressed_Latent_Fingerprint_Images.pdf 2.4 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_and_Secure_Image_Hashing_via_Non-Negative_Matrix_Factorizations.pdf 3.4 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Statistical_Models_for_Assessing_the_Individuality_of_Fingerprints.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Toward_Pose-Invariant_2-D_Face_Recognition_Through_Point_Distribution_Models_and.pdf 2.7 MB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Unicity_Distance_of_Robust_Image_Hashing.pdf 474 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Warping-Based_Offline_Signature_Recognition.pdf 753 KB
Transactions_on_Information_Forensics_and_Security/2007-3-1/Watermarking_Protocol_for_Web_Context.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Based_on_Warped_Example_Faces.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Using_Local_Appearance-Based_Models.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_With_the_Geodesic_Polar_Representation.pdf 3.3 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/A_Novel_Discriminant_Non-Negative_Matrix_Factorization_Algorithm_With_Applicatio.pdf 658 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/An_Evaluation_of_Image_Sampling_and_Compression_for_Human_Iris_Recognition.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Biometric_Identification_Based_on_Frequency_Analysis_of_Cardiac_Sounds.pdf 426 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Class-Specific_Kernel-Discriminant_Analysis_for_Face_Verification.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Components_and_Their_Topology_for_Robust_Face_Detection_in_the_Presence_of_Parti.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Correspondence.pdf 702 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Face_Verification_Using_Template_Matching.pdf 849 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Guest_Editorial_Special_Issue_on_Human_Detection_and_Recognition.pdf 33 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Multiscale_Representation_for_3-D_Face_Recognition.pdf 846 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Palmprint_Classification_Using_Multiple_Advanced_Correlation_Filters_and_Palm-S.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Protecting_Biometric_Templates_With_Sketch_Theory_and_Practice.pdf 684 KB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Real-Time_Face_Detection_and_Motion_Analysis_With_Application_in_“Liveness”_.pdf 2.4 MB
Transactions_on_Information_Forensics_and_Security/2007-3-2/Spoof_Attacks_on_Gait_Authentication_System.pdf 2.2 MB
Transactions_on_Information_Forensics_and_Security/2007-4/A_Comparative_Study_of_Fingerprint_Image-Quality_Estimation_Methods.pdf 3.2 MB
Transactions_on_Information_Forensics_and_Security/2007-4/A_New_Digital_Image_Watermarking_Algorithm_Resilient_to_Desynchronization_Attack.pdf 2.6 MB
Transactions_on_Information_Forensics_and_Security/2007-4/A_Robust_Fingerprint_Indexing_Scheme_Using_Minutia_Neighborhood_Structure_and_Lo.pdf 744 KB
Transactions_on_Information_Forensics_and_Security/2007-4/Application_of_Projective_Invariants_in_Hand_Geometry_Biometrics.pdf 890 KB
Transactions_on_Information_Forensics_and_Security/2007-4/Collusion-Resistant_Video_Fingerprinting_for_Large_User_Group.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Combatting_Ambiguity_Attacks_via_Selective_Detection_of_Embedded_Watermarks.pdf 2.2 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Correction.pdf 35 KB
Transactions_on_Information_Forensics_and_Security/2007-4/Decode-Time_Forensic_Watermarking_of_AAC_Bitstreams.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Detecting_Spoofing_and_Anomalous_Traffic_in_Wireless_Networks_via_Forge-Resist.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Fingerprint-Based_Fuzzy_Vault_Implementation_and_Performance.pdf 1.7 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Horizontal_and_Vertical_2DPCA-Based_Discriminant_Analysis_for_Face_Verification.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Noise_Reduction_in_Side_Channel_Attack_Using_Fourth-Order_Cumulant.pdf 810 KB
Transactions_on_Information_Forensics_and_Security/2007-4/Optimum_Detection_for_Spread-Spectrum_Watermarking_That_Employs_Self-Masking.pdf 2.5 MB
Transactions_on_Information_Forensics_and_Security/2007-4/Shape-Driven_Gabor_Jets_for_Face_Description_and_Authentication.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2008-1/A_Region_Ensemble_for_3-D_Face_Recognition.pdf 2.6 MB
Transactions_on_Information_Forensics_and_Security/2008-1/An_FPGA-Based_Network_Intrusion_Detection_Architecture.pdf 927 KB
Transactions_on_Information_Forensics_and_Security/2008-1/Classification_and_Feature_Extraction_by_Simplexization.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2008-1/Color_Image_Watermarking_Using_Multidimensional_Fourier_Transforms.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2008-1/Determining_Image_Origin_and_Integrity_Using_Sensor_Noise.pdf 5.8 MB
Transactions_on_Information_Forensics_and_Security/2008-1/Digital_Image_Forensics_via_Intrinsic_Fingerprints.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2008-1/Effect_of_Severe_Image_Compression_on_Iris_Recognition_Performance.pdf 3.3 MB
Transactions_on_Information_Forensics_and_Security/2008-1/Kerckhoffs-Based_Embedding_Security_Classes_for_WOA_Data_Hiding.pdf 609 KB
Transactions_on_Information_Forensics_and_Security/2008-1/New_Additive_Watermark_Detectors_Based_On_A_Hierarchical_Spatially_Adaptive_Imag.pdf 855 KB
Transactions_on_Information_Forensics_and_Security/2008-1/Physical-Layer_Authentication.pdf 694 KB
Transactions_on_Information_Forensics_and_Security/2008-2/A_Fast_Search_Algorithm_for_a_Large_Fuzzy_Database.pdf 884 KB
Transactions_on_Information_Forensics_and_Security/2008-2/An_Analysis_of_Lightweight_Encryption_Schemes_for_Fingerprint_Images.pdf 4.4 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Automatic_Construction_of_Dental_Charts_for_Postmortem_Identification.pdf 3.4 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Correspondence.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Detection_of_Double-Compression_in_JPEG_Images_for_Applications_in_Steganography.pdf 617 KB
Transactions_on_Information_Forensics_and_Security/2008-2/Evaluation_of_Localization_Attacks_on_Power-Modulated_Challenge–Response_Syste.pdf 1.9 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Fusion_of_Matching_Algorithms_for_Human_Identification_Using_Dental_X-Ray_Radio.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Insertion_Deletion_Codes_With_Feature-Based_Embedding_A_New_Paradigm_for_Waterma.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Learning_the_Uncorrelated_Independent_and_Discriminating_Color_Spaces_for_Face_R.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Mutual_Information_Jammer-Relay_Games.pdf 840 KB
Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Distinguishability_of_Distance-Bounded_Permutations_in_Ordered_Channels.pdf 619 KB
Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Operational_Quality_of_Fingerprint_Scanners.pdf 2.8 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Quantization-Based_Data_Hiding_Robust_to_Linear-Time-Invariant_Filtering.pdf 997 KB
Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Cooperation_in_Autonomous_Mobile_Ad-Hoc_Networks_Under_Noise_and_Imperfec.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Interdomain_Routing_Registry.pdf 838 KB
Transactions_on_Information_Forensics_and_Security/2008-2/Sensor_Data_Cryptography_in_Wireless_Sensor_Networks.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2008-2/Template-Free_Biometric-Key_Generation_by_Means_of_Fuzzy_Genetic_Clustering.pdf 531 KB
Transactions_on_Information_Forensics_and_Security/2008-3/A_Multimodal_Approach_for_Face_Modeling_and_Recognition.pdf 954 KB
Transactions_on_Information_Forensics_and_Security/2008-3/A_Network_Coding_Approach_to_Secret_Key_Distribution.pdf 509 KB
Transactions_on_Information_Forensics_and_Security/2008-3/A_Novel_Difference_Expansion_Transform_for_Reversible_Data_Embedding.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2008-3/A_Selective_Feature_Information_Approach_for_Iris_Image-Quality_Measure.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2008-3/A_Video_Watermarking_Scheme_Based_on_the_Dual-Tree_Complex_Wavelet_Transform.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Adaptive_Data_Hiding_in_Edge_Areas_of_Images_With_Spatial_LSB_Domain_Systems.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Bilinear_Models_for_3-D_Face_and_Facial_Expression_Recognition.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Authentication_Using_Periodic_Properties_of_Interpolation.pdf 2.8 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Identification_of_Source_Cell-Phone_Model.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Correspondence.pdf 541 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Data_Fusion_and_Cost_Minimization_for_Intrusion_Detection.pdf 428 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Single_Lens_Reflex_Camera_Identification_From_Traces_of_Sensor_Dust.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Video_Watermarking_in_P-Frames_With_Controlled_Video_Bit-Rate_Increase.pdf 841 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Distributed_Detection_of_Information_Flows.pdf 955 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Graphical_Inference_for_Multiple_Intrusion_Detection.pdf 478 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Guest_Editorial_Special_Section_on_Statistical_Methods_for_Network_Security_and_.pdf 25 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Lookup-Table-Based_Secure_Client-Side_Embedding_for_Spread-Spectrum_Watermarks.pdf 623 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Network_Security_for_Client-Server_Architecture_Using_Wiretap_Codes.pdf 554 KB
Transactions_on_Information_Forensics_and_Security/2008-3/On_Empirical_Recognition_Capacity_of_Biometric_Systems_Under_Global_PCA_and_ICA_.pdf 2.5 MB
Transactions_on_Information_Forensics_and_Security/2008-3/On_the_Assumptions_of_Equal_Contributions_in_Fingerprinting.pdf 174 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Projecting_Cyberattacks_Through_Variable-Length_Markov_Models.pdf 608 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Robust_Detection_of_MAC_Layer_Denial-of-Service_Attacks_in_CSMACA_Wireless_Netwo.pdf 704 KB
Transactions_on_Information_Forensics_and_Security/2008-3/Special_Section_Correspondence.pdf 211 KB
Transactions_on_Information_Forensics_and_Security/2008-4/3-D_Ear_Modeling_and_Recognition_From_Video_Sequences_Using_Shape_From_Shading.pdf 2.3 MB
Transactions_on_Information_Forensics_and_Security/2008-4/A_Buyer–Seller_Watermarking_Protocol_Based_on_Secure_Embedding.pdf 103 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Chaotic-Type_Features_for_Speech_Steganalysis.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Correspondence.pdf 562 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Cryptographic_Secrecy_of_Steganographic_Matrix_Embedding.pdf 199 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Fingerprint-Quality_Index_Using_Gradient_Components.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Hiding_Traces_of_Resampling_in_Digital_Images.pdf 2.6 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Hierarchical_Watermarking_of_Semiregular_Meshes_Based_on_Wavelet_Transform.pdf 2.5 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Multiclass_Detector_of_Current_Steganographic_Methods_for_JPEG_Format.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Multipurpose_Watermarking_Based_on_Multiscale_Curvelet_Transform.pdf 733 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Recognizing_Rotated_Faces_From_Frontal_and_Side_Views_An_Approach_Toward_Effecti.pdf 3.3 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Regression_From_Uncertain_Labels_and_Its_Applications_to_Soft_Biometrics.pdf 1022 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Watermarked-Only_Attack.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Steganalysis_Frameworks_of_Embedding_in_Multiple_Least-Significant_Bits.pdf 729 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Subspace_Approximation_of_Face_Recognition_Algorithms_An_Empirical_Study.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Theoretical_and_Practical_Boundaries_of_Binary_Secure_Sketches.pdf 1007 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Toward_Compression_of_Encrypted_Images_and_Video_Sequences.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2008-4/Use_of_Identification_Trial_Statistics_for_the_Combination_of_Biometric_Matcher.pdf 968 KB
Transactions_on_Information_Forensics_and_Security/2008-4/Using_One-Class_SVMs_and_Wavelets_for_Audio_Surveillance.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2009-1/Coding_Schemes_for_Relay-Assisted_Information_Embedding.pdf 887 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Correspondence.pdf 152 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Detection_of_Motion-Incoherent_Components_in_Video_Streams.pdf 664 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Editorial.pdf 154 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Exposing_Digital_Forgeries_from_JPEG_Ghosts.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2009-1/Fingerprinting_With_Minimum_Distance_Decoding.pdf 790 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Hyperbolic_RDM_for_Nonlinear_Valumetric_Distortions.pdf 702 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Improving_Face_Recognition_via_Narrowband_Spectral_Range_Selection_Using_Jeffrey.pdf 3.4 MB
Transactions_on_Information_Forensics_and_Security/2009-1/On_the_Implementation_of_the_Discrete_Fourier_Transform_in_the_Encrypted_Domain.pdf 613 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Personal_Authentication_Using_Finger_Knuckle_Surface.pdf 4.1 MB
Transactions_on_Information_Forensics_and_Security/2009-1/Robust_Blind_Watermarking_of_Point-Sampled_Geometry.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2009-1/SMOCK_A_Scalable_Method_of_Cryptographic_Key_Management_for_Mission-Critical_Wir.pdf 812 KB
Transactions_on_Information_Forensics_and_Security/2009-1/Scanner_Identification_Using_Feature-Based_Processing_and_Analysis.pdf 2.9 MB
Transactions_on_Information_Forensics_and_Security/2009-1/Spread-Spectrum_Watermarking_Security.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2009-2/A_Game_Theoretical_Framework_on_Intrusion_Detection_in_Heterogeneous_Networks.pdf 399 KB
Transactions_on_Information_Forensics_and_Security/2009-2/A_Graph_Approach_to_Quantitative_Analysis_of_Control-Flow_Obfuscating_Transforma.pdf 373 KB
Transactions_on_Information_Forensics_and_Security/2009-2/A_Hypothesis_Testing_Approach_to_Semifragile_Watermark-Based_Authentication.pdf 876 KB
Transactions_on_Information_Forensics_and_Security/2009-2/A_Parametric_Correlation_Framework_for_the_Statistical_Evaluation_and_Estimation.pdf 345 KB
Transactions_on_Information_Forensics_and_Security/2009-2/Face_Recognition_Under_Occlusions_and_Variant_Expressions_With_Partial_Similarit.pdf 2.2 MB
Transactions_on_Information_Forensics_and_Security/2009-2/Unseen_Visible_Watermarking_A_Novel_Methodology_for_Auxiliary_Information_Delive.pdf 1.9 MB
Transactions_on_Information_Forensics_and_Security/2009-2/Watermarking_Robustness_Evaluation_Based_on_Perceptual_Quality_via_Genetic_Algor.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2009-2/Wireless_Secrecy_in_Cellular_Systems_With_Infrastructure-Aided_Cooperation.pdf 1009 KB
Transactions_on_Information_Forensics_and_Security/2009-3/A_Channel_Coding_Approach_for_Human_Authentication_From_Gait_Sequences.pdf 1004 KB
Transactions_on_Information_Forensics_and_Security/2009-3/A_Sensing_Seat_for_Human_Authentication.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Adversary_Aware_Surveillance_Systems.pdf 859 KB
Transactions_on_Information_Forensics_and_Security/2009-3/An_Information-Theoretic_View_of_Network-Aware_Malware_Attacks.pdf 824 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Channel-Based_Detection_of_Sybil_Attacks_in_Wireless_Networks.pdf 1 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Correspondence.pdf 189 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Digital_Image_Source_Coder_Forensics_Via_Intrinsic_Fingerprints.pdf 2.2 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Exploiting_the_Human–Machine_Gap_in_Image_Recognition_for_Designing_CAPTCHAs.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Algorithm_for_Updating_the_Discriminant_Vectors_of_Dual-Space_LDA.pdf 576 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Haar_Transform_Based_Feature_Extraction_for_Face_Representation_and_Recogni.pdf 1.6 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprint_Verification_Using_Spectral_Minutiae_Representations.pdf 4 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprinting_Compressed_Multimedia_Signals.pdf 2.8 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Halftone_Visual_Cryptography_Via_Error_Diffusion.pdf 9.7 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Improvement_in_Intrusion_Detection_With_Advances_in_Sensor_Fusion.pdf 391 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Intrinsic_Sensor_Noise_Features_for_Forensic_Analysis_on_Scanners_and_Scanned_Im.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Low-Complexity_Iris_Coding_and_Recognition_Based_on_Directionlets.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2009-3/MPSteg-Color_Data_Hiding_Through_Redundant_Basis_Decomposition.pdf 1.7 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Mathematical_Model_for_Low-Rate_DoS_Attacks_Against_Application_Servers.pdf 818 KB
Transactions_on_Information_Forensics_and_Security/2009-3/On_Estimation_Accuracy_of_Desynchronization_Attack_Channel_Parameters.pdf 776 KB
Transactions_on_Information_Forensics_and_Security/2009-3/On_Reliability_and_Security_of_Randomized_Detectors_Against_Sensitivity_Analysis.pdf 584 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Performance_Analysis_of_Fridrich–Goljan_Self-Embedding_Authentication_Method.pdf 295 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Performance_of_Orthogonal_Fingerprinting_Codes_Under_Worst-Case_Noise.pdf 434 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Regular_Simplex_Fingerprints_and_Their_Optimality_Properties.pdf 557 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Robust_MC-CDMA-Based_Fingerprinting_Against_Time-Varying_Collusion_Attacks.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2009-3/Steganalysis_of_YASS.pdf 806 KB
Transactions_on_Information_Forensics_and_Security/2009-3/Temporal_Derivative-Based_Spectrum_and_Mel-Cepstrum_Audio_Steganalysis.pdf 1.4 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/CAST_Canvass_Audits_by_Sampling_and_Testing.pdf 333 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Detecting_Code_Alteration_by_Creating_a_Temporary_Memory_Bottleneck.pdf 712 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Development_Formal_Verification_and_Evaluation_of_an_E-Voting_System_With_VVPAT.pdf 565 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Enhancing_Electronic_Voting_Machines_on_the_Example_of_Bingo_Voting.pdf 124 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Guest_Editorial_Special_Issue_on_Electronic_Voting.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Prêt_à_Voter_a_Voter-Verifiable_Voting_System.pdf 605 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Scantegrity_II_End-to-End_Verifiability_by_Voters_of_Optical_Scan_Elections_Thr.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Security_in_Large-Scale_Internet_Elections_A_Retrospective_Analysis_of_Elections.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Shuffle-Sum_Coercion-Resistant_Verifiable_Tallying_for_STV_Voting.pdf 464 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/State-Wide_Elections_Optical_Scan_Voting_Systems_and_the_Pursuit_of_Integrity.pdf 1.1 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Straight-Party_Voting_What_Do_Voters_Think?.pdf 2.5 MB
Transactions_on_Information_Forensics_and_Security/2009-4-1/TPM_Meets_DRE_Reducing_the_Trust_Base_for_Electronic_Voting_Using_Trusted_Platfo.pdf 535 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/The_Effectiveness_of_Receipt-Based_Attacks_on_ThreeBallot.pdf 532 KB
Transactions_on_Information_Forensics_and_Security/2009-4-1/Voting_With_Unconditional_Privacy_by_Merging_Prêt_à_Voter_and_PunchScan.pdf 412 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/A_Study_on_the_Randomness_Measure_of_Image_Hashing.pdf 394 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Accurate_Detection_of_Demosaicing_Regularity_for_Digital_Image_Forensics.pdf 1.2 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Behavior_Forensics_With_Side_Information_for_Multimedia_Fingerprinting_Social_Ne.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Benchmarking_Quality-Dependent_and_Cost-Sensitive_Score-Level_Multimodal_Biometr.pdf 1.9 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Biometric_Systems_Privacy_and_Secrecy_Aspects.pdf 888 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Election_Audits_Using_a_Trinomial_Bound.pdf 235 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Free_Electronic_Access_to_SP_Publications.pdf 21 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/High-Rate_Random-Like_Spherical_Fingerprinting_Codes_With_Linear_Decoding_Comple.pdf 526 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Recognition_Using_Signal-Level_Fusion_of_Frames_From_Video.pdf 2.3 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Segmentation_Using_Geodesic_Active_Contours.pdf 3.7 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Joint_Watermarking_Scheme_for_Multiparty_Multilevel_DRM_Architecture.pdf 1.8 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Multibiometric_Cryptosystem_Model_Structure_and_Performance_Analysis.pdf 1017 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Noninteractive_Self-Certification_for_Long-Lived_Mobile_Ad_Hoc_Networks.pdf 590 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/On_the_Security_of_the_Secure_Arithmetic_Code.pdf 2.1 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Pairwise_Boosted_Audio_Fingerprint.pdf 1.5 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Parallelizing_Iris_Recognition.pdf 1.3 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Provably_Secure_Remote_Truly_Three-Factor_Authentication_Scheme_With_Privacy_Pro.pdf 574 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Quantum_Hashing_for_Multimedia.pdf 831 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Risk-Limiting_Postelection_Audits_Conservative_P_-Values_From_Common_Probability.pdf 349 KB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Robust_Orientation_Field_Estimation_and_Extrapolation_Using_Semilocal_Line_Senso.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Securing_Rating_Aggregation_Systems_Using_Statistical_Detectors_and_Trust.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/2009-4-2/Self-Verifying_Visual_Secret_Sharing_Using_Error_Diffusion_and_Interpolation_Tec.pdf 2 MB
Transactions_on_Information_Forensics_and_Security/filelist 20 KB
Transactions_on_Information_Forensics_and_Security/myriad.NFO 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers

Loading...