Transactions_on_Information_Forensics_and_Security/2006-1/A_Clustering_Based_Approach_to_Perceptual_Image_Hashing.pdf |
780 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/A_Markov_Chain_Monte_Carlo_Algorithm_for_Bayesian_Dynamic_Signature_Verificatio.pdf |
825 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/An_Accurate_Analysis_of_Scalar_Quantization-Based_Data_Hiding.pdf |
340 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Analysis_and_Design_of_Secure_Watermark-Based_Authentication_Systems.pdf |
477 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Approximate_Message_Authentication_Codes_for_N_-ary_Alphabets.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2006-1/Automatic_Facial_Expression_Recognition_Using_Facial_Animation_Parameters_and_Mu.pdf |
746 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Editorial_Introducing_T-IFS.pdf |
141 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Personal_Authentication_Using_3-D_Finger_Geometry.pdf |
805 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Steganalysis_Using_Higher-Order_Image_Statistics.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2006-1/The_NTMAC_for_Authentication_of_Noisy_Messages.pdf |
254 KB |
Transactions_on_Information_Forensics_and_Security/2006-1/Watermarking_Relying_on_Cover_Signal_Content_to_Hide_Synchronization_Marks.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2006-1/Wet_Paper_Codes_With_Improved_Embedding_Efficiency.pdf |
728 KB |
Transactions_on_Information_Forensics_and_Security/2006-2/An_Algorithm_for_Distorted_Fingerprint_Matching_Based_on_Local_Triangle_Feature_.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Biometrics_A_Tool_for_Information_Security.pdf |
2.8 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Digital_Camera_Identification_From_Sensor_Pattern_Noise.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Efficient_Spatial_Image_Watermarking_via_New_Perceptual_Masking_and_Blind_Detec.pdf |
3.3 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/EyeCerts.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Joint_Coding_and_Embedding_Techniques_for_Multimedia_Fingerprinting.pdf |
3.5 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Performance_Analysis_of_Iris-Based_Identification_System_at_the_Matching_Score_.pdf |
1.9 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Reducing_Delay_and_Enhancing_DoS_Resistance_in_Multicast_Authentication_Through_.pdf |
831 KB |
Transactions_on_Information_Forensics_and_Security/2006-2/Robust_and_Secure_Image_Hashing.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Steganalysis_for_Markov_Cover_Data_With_Applications_to_Images.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/Teeth_Segmentation_in_Digitized_Dental_X-Ray_Films_Using_Mathematical_Morphology.pdf |
5.1 MB |
Transactions_on_Information_Forensics_and_Security/2006-2/The_Boneh–Shaw_Fingerprinting_Scheme_is_Better_Than_We_Thought.pdf |
235 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Behavior_Forensics_for_Scalable_Multiuser_Collusion_Fairness_Versus_Effectivenes.pdf |
965 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Block_QIM_Watermarking_Games.pdf |
869 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Correspondence.pdf |
177 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Dual_Protection_of_JPEG_Images_Based_on_Informed_Embedding_and_Two-Stage_Waterma.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2006-3/Estimation_of_Message_Source_and_Destination_From_Network_Intercepts.pdf |
614 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Face_Identification_Using_Novel_Frequency-Domain_Representation_of_Facial_Asymm.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2006-3/Fake_Finger_Detection_by_Skin_Distortion_Analysis.pdf |
5 MB |
Transactions_on_Information_Forensics_and_Security/2006-3/Graphical_Passwords_Based_on_Robust_Discretization.pdf |
159 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Gray_Hausdorff_Distance_Measure_for_Comparing_Face_Images.pdf |
805 KB |
Transactions_on_Information_Forensics_and_Security/2006-3/Matrix_Embedding_for_Large_Payloads.pdf |
301 KB |
Transactions_on_Information_Forensics_and_Security/2006-4/A_Set_Theoretic_Framework_for_Watermarking_and_Its_Application_to_Semifragile_Ta.pdf |
6.5 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Correspondence.pdf |
3.2 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Digital_Video_Steganalysis_Exploiting_Statistical_Visibility_in_the_Temporal_Dom.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Fingerprint_Retrieval_for_Identification.pdf |
1.7 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Gaussian_Mixture_Modeling_of_Short-Time_Fourier_Transform_Features_for_Audio_Fin.pdf |
422 KB |
Transactions_on_Information_Forensics_and_Security/2006-4/Multilevel_2-D_Bar_Codes_Toward_High-Capacity_Storage_Modules_for_Multimedia_Sec.pdf |
1.9 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/On_Fundamental_Limitations_of_Proving_Data_Theft.pdf |
305 KB |
Transactions_on_Information_Forensics_and_Security/2006-4/Print_and_Scan_Resilient_Data_Hiding_in_Images.pdf |
3.3 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Reversible_Steganography_for_VQ-Compressed_Images_Using_Side_Matching_and_Reloca.pdf |
2.5 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Known_Message_Attack.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2006-4/The_CRC–NTMAC_for_Noisy_Message_Authentication.pdf |
448 KB |
Transactions_on_Information_Forensics_and_Security/2006-4/Traitor-Within-Traitor_Behavior_Forensics_Strategy_and_Risk_Minimization.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-1/A_Framework_for_Robust_Watermarking_of_H.264-Encoded_Video_With_Controllable_Det.pdf |
654 KB |
Transactions_on_Information_Forensics_and_Security/2007-1/A_New_Steganographic_Method_for_Data_Hiding_in_Microsoft_Word_Documents_by_a_Cha.pdf |
504 KB |
Transactions_on_Information_Forensics_and_Security/2007-1/A_Parameter-Free_Framework_for_General_Supervised_Subspace_Learning.pdf |
843 KB |
Transactions_on_Information_Forensics_and_Security/2007-1/Learning_Discriminant_Person-Specific_Facial_Models_Using_Expandable_Graphs.pdf |
3.5 MB |
Transactions_on_Information_Forensics_and_Security/2007-1/Nonintrusive_Component_Forensics_of_Visual_Sensors_Using_Output_Images.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2007-1/On_Generation_and_Analysis_of_Synthetic_Iris_Images.pdf |
5.7 MB |
Transactions_on_Information_Forensics_and_Security/2007-1/Optimized_Feature_Extraction_for_Learning-Based_Image_Steganalysis.pdf |
552 KB |
Transactions_on_Information_Forensics_and_Security/2007-1/Statistically_Robust_Detection_of_Multiplicative_Spread-Spectrum_Watermarks.pdf |
902 KB |
Transactions_on_Information_Forensics_and_Security/2007-1/Steganalysis_of_Embedding_in_Two_Least-Significant_Bits.pdf |
378 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/A_Cascade_Framework_for_a_Real-Time_Statistical_Plate_Recognition_System.pdf |
2.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-2/A_Constructive_and_Unifying_Framework_for_Zero-Bit_Watermarking.pdf |
839 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Analysis_and_Protection_of_Dynamic_Membership_Information_for_Group_Key_Distribu.pdf |
981 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Correspondence.pdf |
923 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Defense_Against_Injecting_Traffic_Attacks_in_Wireless_Mobile_Ad-Hoc_Networks.pdf |
724 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Derivation_of_Error_Distribution_in_Least_Squares_Steganalysis.pdf |
551 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Hand-Geometry_Recognition_Using_Entropy-Based_Discretization.pdf |
784 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Human_Identification_From_Dental_X-Ray_Images_Based_on_the_Shape_and_Appearance.pdf |
2.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-2/Noniterative_Algorithms_for_Sensitivity_Analysis_Attacks.pdf |
972 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Optical_Watermarking_for_Printed_Document_Authentication.pdf |
573 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Performance_Analysis_of_Robust_Audio_Hashing.pdf |
874 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Securing_Cooperative_Ad-Hoc_Networks_Under_Noise_and_Imperfect_Monitoring_Strate.pdf |
820 KB |
Transactions_on_Information_Forensics_and_Security/2007-2/Tracing_Malicious_Relays_in_Cooperative_Wireless_Communications.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2007-2/Using_Perceptual_Models_to_Improve_Fidelity_and_Provide_Resistance_to_Valumetric.pdf |
3.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-2/Using_Support_Vector_Machines_to_Enhance_the_Performance_of_Bayesian_Face_Recogn.pdf |
348 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/A_Memetic_Fingerprint_Matching_Algorithm.pdf |
625 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Channel_Identification_Secret_Sharing_Using_Reciprocity_in_Ultrawideband_Channe.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Double-Sided_Watermark_Embedding_and_Detection.pdf |
635 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Complex_Lighting_Environments.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Interlaced_and_Deinterlaced_Video.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Lossless_Data_Embedding_With_High_Embedding_Capacity_Based_on_Declustering_for_V.pdf |
1.7 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Multimodal_Wireless_Networks_Communication_and_Surveillance_on_the_Same_Infrastr.pdf |
912 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Data-Hiding_Scheme_for_2-D_Vector_Maps_Based_on_Difference_Expansion.pdf |
567 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Image_Watermarking_Based_on_Integer-to-Integer_Wavelet_Transform.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_Wireless_Transmission_of_Compressed_Latent_Fingerprint_Images.pdf |
2.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_and_Secure_Image_Hashing_via_Non-Negative_Matrix_Factorizations.pdf |
3.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Statistical_Models_for_Assessing_the_Individuality_of_Fingerprints.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Toward_Pose-Invariant_2-D_Face_Recognition_Through_Point_Distribution_Models_and.pdf |
2.7 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Unicity_Distance_of_Robust_Image_Hashing.pdf |
474 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Warping-Based_Offline_Signature_Recognition.pdf |
753 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-1/Watermarking_Protocol_for_Web_Context.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Based_on_Warped_Example_Faces.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Using_Local_Appearance-Based_Models.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_With_the_Geodesic_Polar_Representation.pdf |
3.3 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/A_Novel_Discriminant_Non-Negative_Matrix_Factorization_Algorithm_With_Applicatio.pdf |
658 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/An_Evaluation_of_Image_Sampling_and_Compression_for_Human_Iris_Recognition.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Biometric_Identification_Based_on_Frequency_Analysis_of_Cardiac_Sounds.pdf |
426 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Class-Specific_Kernel-Discriminant_Analysis_for_Face_Verification.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Components_and_Their_Topology_for_Robust_Face_Detection_in_the_Presence_of_Parti.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Correspondence.pdf |
702 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Face_Verification_Using_Template_Matching.pdf |
849 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Guest_Editorial_Special_Issue_on_Human_Detection_and_Recognition.pdf |
33 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Multiscale_Representation_for_3-D_Face_Recognition.pdf |
846 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Palmprint_Classification_Using_Multiple_Advanced_Correlation_Filters_and_Palm-S.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Protecting_Biometric_Templates_With_Sketch_Theory_and_Practice.pdf |
684 KB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Real-Time_Face_Detection_and_Motion_Analysis_With_Application_in_“Liveness”_.pdf |
2.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-3-2/Spoof_Attacks_on_Gait_Authentication_System.pdf |
2.2 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/A_Comparative_Study_of_Fingerprint_Image-Quality_Estimation_Methods.pdf |
3.2 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/A_New_Digital_Image_Watermarking_Algorithm_Resilient_to_Desynchronization_Attack.pdf |
2.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/A_Robust_Fingerprint_Indexing_Scheme_Using_Minutia_Neighborhood_Structure_and_Lo.pdf |
744 KB |
Transactions_on_Information_Forensics_and_Security/2007-4/Application_of_Projective_Invariants_in_Hand_Geometry_Biometrics.pdf |
890 KB |
Transactions_on_Information_Forensics_and_Security/2007-4/Collusion-Resistant_Video_Fingerprinting_for_Large_User_Group.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Combatting_Ambiguity_Attacks_via_Selective_Detection_of_Embedded_Watermarks.pdf |
2.2 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Correction.pdf |
35 KB |
Transactions_on_Information_Forensics_and_Security/2007-4/Decode-Time_Forensic_Watermarking_of_AAC_Bitstreams.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Detecting_Spoofing_and_Anomalous_Traffic_in_Wireless_Networks_via_Forge-Resist.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Fingerprint-Based_Fuzzy_Vault_Implementation_and_Performance.pdf |
1.7 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Horizontal_and_Vertical_2DPCA-Based_Discriminant_Analysis_for_Face_Verification.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Noise_Reduction_in_Side_Channel_Attack_Using_Fourth-Order_Cumulant.pdf |
810 KB |
Transactions_on_Information_Forensics_and_Security/2007-4/Optimum_Detection_for_Spread-Spectrum_Watermarking_That_Employs_Self-Masking.pdf |
2.5 MB |
Transactions_on_Information_Forensics_and_Security/2007-4/Shape-Driven_Gabor_Jets_for_Face_Description_and_Authentication.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/A_Region_Ensemble_for_3-D_Face_Recognition.pdf |
2.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/An_FPGA-Based_Network_Intrusion_Detection_Architecture.pdf |
927 KB |
Transactions_on_Information_Forensics_and_Security/2008-1/Classification_and_Feature_Extraction_by_Simplexization.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/Color_Image_Watermarking_Using_Multidimensional_Fourier_Transforms.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/Determining_Image_Origin_and_Integrity_Using_Sensor_Noise.pdf |
5.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/Digital_Image_Forensics_via_Intrinsic_Fingerprints.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/Effect_of_Severe_Image_Compression_on_Iris_Recognition_Performance.pdf |
3.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-1/Kerckhoffs-Based_Embedding_Security_Classes_for_WOA_Data_Hiding.pdf |
609 KB |
Transactions_on_Information_Forensics_and_Security/2008-1/New_Additive_Watermark_Detectors_Based_On_A_Hierarchical_Spatially_Adaptive_Imag.pdf |
855 KB |
Transactions_on_Information_Forensics_and_Security/2008-1/Physical-Layer_Authentication.pdf |
694 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/A_Fast_Search_Algorithm_for_a_Large_Fuzzy_Database.pdf |
884 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/An_Analysis_of_Lightweight_Encryption_Schemes_for_Fingerprint_Images.pdf |
4.4 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Automatic_Construction_of_Dental_Charts_for_Postmortem_Identification.pdf |
3.4 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Correspondence.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Detection_of_Double-Compression_in_JPEG_Images_for_Applications_in_Steganography.pdf |
617 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/Evaluation_of_Localization_Attacks_on_Power-Modulated_Challenge–Response_Syste.pdf |
1.9 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Fusion_of_Matching_Algorithms_for_Human_Identification_Using_Dental_X-Ray_Radio.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Insertion_Deletion_Codes_With_Feature-Based_Embedding_A_New_Paradigm_for_Waterma.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Learning_the_Uncorrelated_Independent_and_Discriminating_Color_Spaces_for_Face_R.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Mutual_Information_Jammer-Relay_Games.pdf |
840 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Distinguishability_of_Distance-Bounded_Permutations_in_Ordered_Channels.pdf |
619 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Operational_Quality_of_Fingerprint_Scanners.pdf |
2.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Quantization-Based_Data_Hiding_Robust_to_Linear-Time-Invariant_Filtering.pdf |
997 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Cooperation_in_Autonomous_Mobile_Ad-Hoc_Networks_Under_Noise_and_Imperfec.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Interdomain_Routing_Registry.pdf |
838 KB |
Transactions_on_Information_Forensics_and_Security/2008-2/Sensor_Data_Cryptography_in_Wireless_Sensor_Networks.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-2/Template-Free_Biometric-Key_Generation_by_Means_of_Fuzzy_Genetic_Clustering.pdf |
531 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/A_Multimodal_Approach_for_Face_Modeling_and_Recognition.pdf |
954 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/A_Network_Coding_Approach_to_Secret_Key_Distribution.pdf |
509 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/A_Novel_Difference_Expansion_Transform_for_Reversible_Data_Embedding.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/A_Selective_Feature_Information_Approach_for_Iris_Image-Quality_Measure.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/A_Video_Watermarking_Scheme_Based_on_the_Dual-Tree_Complex_Wavelet_Transform.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Adaptive_Data_Hiding_in_Edge_Areas_of_Images_With_Spatial_LSB_Domain_Systems.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Bilinear_Models_for_3-D_Face_and_Facial_Expression_Recognition.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Authentication_Using_Periodic_Properties_of_Interpolation.pdf |
2.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Identification_of_Source_Cell-Phone_Model.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Correspondence.pdf |
541 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Data_Fusion_and_Cost_Minimization_for_Intrusion_Detection.pdf |
428 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Single_Lens_Reflex_Camera_Identification_From_Traces_of_Sensor_Dust.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Video_Watermarking_in_P-Frames_With_Controlled_Video_Bit-Rate_Increase.pdf |
841 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Distributed_Detection_of_Information_Flows.pdf |
955 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Graphical_Inference_for_Multiple_Intrusion_Detection.pdf |
478 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Guest_Editorial_Special_Section_on_Statistical_Methods_for_Network_Security_and_.pdf |
25 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Lookup-Table-Based_Secure_Client-Side_Embedding_for_Spread-Spectrum_Watermarks.pdf |
623 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Network_Security_for_Client-Server_Architecture_Using_Wiretap_Codes.pdf |
554 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/On_Empirical_Recognition_Capacity_of_Biometric_Systems_Under_Global_PCA_and_ICA_.pdf |
2.5 MB |
Transactions_on_Information_Forensics_and_Security/2008-3/On_the_Assumptions_of_Equal_Contributions_in_Fingerprinting.pdf |
174 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Projecting_Cyberattacks_Through_Variable-Length_Markov_Models.pdf |
608 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Robust_Detection_of_MAC_Layer_Denial-of-Service_Attacks_in_CSMACA_Wireless_Netwo.pdf |
704 KB |
Transactions_on_Information_Forensics_and_Security/2008-3/Special_Section_Correspondence.pdf |
211 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/3-D_Ear_Modeling_and_Recognition_From_Video_Sequences_Using_Shape_From_Shading.pdf |
2.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/A_Buyer–Seller_Watermarking_Protocol_Based_on_Secure_Embedding.pdf |
103 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Chaotic-Type_Features_for_Speech_Steganalysis.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Correspondence.pdf |
562 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Cryptographic_Secrecy_of_Steganographic_Matrix_Embedding.pdf |
199 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Fingerprint-Quality_Index_Using_Gradient_Components.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Hiding_Traces_of_Resampling_in_Digital_Images.pdf |
2.6 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Hierarchical_Watermarking_of_Semiregular_Meshes_Based_on_Wavelet_Transform.pdf |
2.5 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Multiclass_Detector_of_Current_Steganographic_Methods_for_JPEG_Format.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Multipurpose_Watermarking_Based_on_Multiscale_Curvelet_Transform.pdf |
733 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Recognizing_Rotated_Faces_From_Frontal_and_Side_Views_An_Approach_Toward_Effecti.pdf |
3.3 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Regression_From_Uncertain_Labels_and_Its_Applications_to_Soft_Biometrics.pdf |
1022 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Watermarked-Only_Attack.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Steganalysis_Frameworks_of_Embedding_in_Multiple_Least-Significant_Bits.pdf |
729 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Subspace_Approximation_of_Face_Recognition_Algorithms_An_Empirical_Study.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Theoretical_and_Practical_Boundaries_of_Binary_Secure_Sketches.pdf |
1007 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Toward_Compression_of_Encrypted_Images_and_Video_Sequences.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2008-4/Use_of_Identification_Trial_Statistics_for_the_Combination_of_Biometric_Matcher.pdf |
968 KB |
Transactions_on_Information_Forensics_and_Security/2008-4/Using_One-Class_SVMs_and_Wavelets_for_Audio_Surveillance.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/Coding_Schemes_for_Relay-Assisted_Information_Embedding.pdf |
887 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Correspondence.pdf |
152 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Detection_of_Motion-Incoherent_Components_in_Video_Streams.pdf |
664 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Editorial.pdf |
154 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Exposing_Digital_Forgeries_from_JPEG_Ghosts.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/Fingerprinting_With_Minimum_Distance_Decoding.pdf |
790 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Hyperbolic_RDM_for_Nonlinear_Valumetric_Distortions.pdf |
702 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Improving_Face_Recognition_via_Narrowband_Spectral_Range_Selection_Using_Jeffrey.pdf |
3.4 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/On_the_Implementation_of_the_Discrete_Fourier_Transform_in_the_Encrypted_Domain.pdf |
613 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Personal_Authentication_Using_Finger_Knuckle_Surface.pdf |
4.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/Robust_Blind_Watermarking_of_Point-Sampled_Geometry.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/SMOCK_A_Scalable_Method_of_Cryptographic_Key_Management_for_Mission-Critical_Wir.pdf |
812 KB |
Transactions_on_Information_Forensics_and_Security/2009-1/Scanner_Identification_Using_Feature-Based_Processing_and_Analysis.pdf |
2.9 MB |
Transactions_on_Information_Forensics_and_Security/2009-1/Spread-Spectrum_Watermarking_Security.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-2/A_Game_Theoretical_Framework_on_Intrusion_Detection_in_Heterogeneous_Networks.pdf |
399 KB |
Transactions_on_Information_Forensics_and_Security/2009-2/A_Graph_Approach_to_Quantitative_Analysis_of_Control-Flow_Obfuscating_Transforma.pdf |
373 KB |
Transactions_on_Information_Forensics_and_Security/2009-2/A_Hypothesis_Testing_Approach_to_Semifragile_Watermark-Based_Authentication.pdf |
876 KB |
Transactions_on_Information_Forensics_and_Security/2009-2/A_Parametric_Correlation_Framework_for_the_Statistical_Evaluation_and_Estimation.pdf |
345 KB |
Transactions_on_Information_Forensics_and_Security/2009-2/Face_Recognition_Under_Occlusions_and_Variant_Expressions_With_Partial_Similarit.pdf |
2.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-2/Unseen_Visible_Watermarking_A_Novel_Methodology_for_Auxiliary_Information_Delive.pdf |
1.9 MB |
Transactions_on_Information_Forensics_and_Security/2009-2/Watermarking_Robustness_Evaluation_Based_on_Perceptual_Quality_via_Genetic_Algor.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2009-2/Wireless_Secrecy_in_Cellular_Systems_With_Infrastructure-Aided_Cooperation.pdf |
1009 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/A_Channel_Coding_Approach_for_Human_Authentication_From_Gait_Sequences.pdf |
1004 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/A_Sensing_Seat_for_Human_Authentication.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Adversary_Aware_Surveillance_Systems.pdf |
859 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/An_Information-Theoretic_View_of_Network-Aware_Malware_Attacks.pdf |
824 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Channel-Based_Detection_of_Sybil_Attacks_in_Wireless_Networks.pdf |
1 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Correspondence.pdf |
189 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Digital_Image_Source_Coder_Forensics_Via_Intrinsic_Fingerprints.pdf |
2.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Exploiting_the_Human–Machine_Gap_in_Image_Recognition_for_Designing_CAPTCHAs.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Algorithm_for_Updating_the_Discriminant_Vectors_of_Dual-Space_LDA.pdf |
576 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Haar_Transform_Based_Feature_Extraction_for_Face_Representation_and_Recogni.pdf |
1.6 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprint_Verification_Using_Spectral_Minutiae_Representations.pdf |
4 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprinting_Compressed_Multimedia_Signals.pdf |
2.8 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Halftone_Visual_Cryptography_Via_Error_Diffusion.pdf |
9.7 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Improvement_in_Intrusion_Detection_With_Advances_in_Sensor_Fusion.pdf |
391 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Intrinsic_Sensor_Noise_Features_for_Forensic_Analysis_on_Scanners_and_Scanned_Im.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Low-Complexity_Iris_Coding_and_Recognition_Based_on_Directionlets.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/MPSteg-Color_Data_Hiding_Through_Redundant_Basis_Decomposition.pdf |
1.7 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Mathematical_Model_for_Low-Rate_DoS_Attacks_Against_Application_Servers.pdf |
818 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/On_Estimation_Accuracy_of_Desynchronization_Attack_Channel_Parameters.pdf |
776 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/On_Reliability_and_Security_of_Randomized_Detectors_Against_Sensitivity_Analysis.pdf |
584 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Performance_Analysis_of_Fridrich–Goljan_Self-Embedding_Authentication_Method.pdf |
295 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Performance_of_Orthogonal_Fingerprinting_Codes_Under_Worst-Case_Noise.pdf |
434 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Regular_Simplex_Fingerprints_and_Their_Optimality_Properties.pdf |
557 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Robust_MC-CDMA-Based_Fingerprinting_Against_Time-Varying_Collusion_Attacks.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-3/Steganalysis_of_YASS.pdf |
806 KB |
Transactions_on_Information_Forensics_and_Security/2009-3/Temporal_Derivative-Based_Spectrum_and_Mel-Cepstrum_Audio_Steganalysis.pdf |
1.4 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/CAST_Canvass_Audits_by_Sampling_and_Testing.pdf |
333 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Detecting_Code_Alteration_by_Creating_a_Temporary_Memory_Bottleneck.pdf |
712 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Development_Formal_Verification_and_Evaluation_of_an_E-Voting_System_With_VVPAT.pdf |
565 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Enhancing_Electronic_Voting_Machines_on_the_Example_of_Bingo_Voting.pdf |
124 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Guest_Editorial_Special_Issue_on_Electronic_Voting.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Prêt_à_Voter_a_Voter-Verifiable_Voting_System.pdf |
605 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Scantegrity_II_End-to-End_Verifiability_by_Voters_of_Optical_Scan_Elections_Thr.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Security_in_Large-Scale_Internet_Elections_A_Retrospective_Analysis_of_Elections.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Shuffle-Sum_Coercion-Resistant_Verifiable_Tallying_for_STV_Voting.pdf |
464 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/State-Wide_Elections_Optical_Scan_Voting_Systems_and_the_Pursuit_of_Integrity.pdf |
1.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Straight-Party_Voting_What_Do_Voters_Think?.pdf |
2.5 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/TPM_Meets_DRE_Reducing_the_Trust_Base_for_Electronic_Voting_Using_Trusted_Platfo.pdf |
535 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/The_Effectiveness_of_Receipt-Based_Attacks_on_ThreeBallot.pdf |
532 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-1/Voting_With_Unconditional_Privacy_by_Merging_Prêt_à_Voter_and_PunchScan.pdf |
412 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/A_Study_on_the_Randomness_Measure_of_Image_Hashing.pdf |
394 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Accurate_Detection_of_Demosaicing_Regularity_for_Digital_Image_Forensics.pdf |
1.2 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Behavior_Forensics_With_Side_Information_for_Multimedia_Fingerprinting_Social_Ne.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Benchmarking_Quality-Dependent_and_Cost-Sensitive_Score-Level_Multimodal_Biometr.pdf |
1.9 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Biometric_Systems_Privacy_and_Secrecy_Aspects.pdf |
888 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Election_Audits_Using_a_Trinomial_Bound.pdf |
235 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Free_Electronic_Access_to_SP_Publications.pdf |
21 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/High-Rate_Random-Like_Spherical_Fingerprinting_Codes_With_Linear_Decoding_Comple.pdf |
526 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Recognition_Using_Signal-Level_Fusion_of_Frames_From_Video.pdf |
2.3 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Segmentation_Using_Geodesic_Active_Contours.pdf |
3.7 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Joint_Watermarking_Scheme_for_Multiparty_Multilevel_DRM_Architecture.pdf |
1.8 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Multibiometric_Cryptosystem_Model_Structure_and_Performance_Analysis.pdf |
1017 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Noninteractive_Self-Certification_for_Long-Lived_Mobile_Ad_Hoc_Networks.pdf |
590 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/On_the_Security_of_the_Secure_Arithmetic_Code.pdf |
2.1 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Pairwise_Boosted_Audio_Fingerprint.pdf |
1.5 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Parallelizing_Iris_Recognition.pdf |
1.3 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Provably_Secure_Remote_Truly_Three-Factor_Authentication_Scheme_With_Privacy_Pro.pdf |
574 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Quantum_Hashing_for_Multimedia.pdf |
831 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Risk-Limiting_Postelection_Audits_Conservative_P_-Values_From_Common_Probability.pdf |
349 KB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Robust_Orientation_Field_Estimation_and_Extrapolation_Using_Semilocal_Line_Senso.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Securing_Rating_Aggregation_Systems_Using_Statistical_Detectors_and_Trust.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/2009-4-2/Self-Verifying_Visual_Secret_Sharing_Using_Error_Diffusion_and_Interpolation_Tec.pdf |
2 MB |
Transactions_on_Information_Forensics_and_Security/filelist |
20 KB |
Transactions_on_Information_Forensics_and_Security/myriad.NFO |
2 KB |