Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

is.\*:("1556-6013")

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 278

  • Page / 12
Export

Sélection :

  • et

3D Assisted Face Recognition: Dealing With Expression VariationsERDOGMUS, Nesli; DUGELAY, Jean-Luc.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 826-838, issn 1556-6013, 13 p.Article

A Bayesian-MRF Approach for PRNU-Based Image Forgery DetectionCHIERCHIA, Giovanni; POGGI, Giovanni; SANSONE, Carlo et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 554-567, issn 1556-6013, 14 p.Article

A Non-Interactive Dual Channel Continuous Traffic Authentication ProtocolIRAKIZA, David; KARIM, Md E; PHOHA, Vir V et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1133-1140, issn 1556-6013, 8 p.Article

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random PermutationJIANTAO ZHOU; XIANMING LIU; AU, Oscar C et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 39-50, issn 1556-6013, 12 p.Article

Gabor Ordinal Measures for Face RecognitionZHENHUA CHAI; ZHENAN SUN; MENDEZ-VAZQUEZ, Heydi et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 14-26, issn 1556-6013, 13 p.Article

Growing Grapes in Your Computer to Defend Against MalwareZHIYONG SHAN; XIN WANG.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 196-207, issn 1556-6013, 12 p.Article

JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image QualityWEI FAN; KAI WANG; CAYRE, François et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1211-1226, issn 1556-6013, 16 p.Article

Online Signature Verification on Mobile DevicesSAE-BAE, Napa; MEMON, Nasir.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 933-947, issn 1556-6013, 15 p.Article

Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading ChannelsLIFENG WANG; NAN YANG; ELKASHLAN, Maged et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 247-258, issn 1556-6013, 12 p.Article

Privacy-Preserving Optimal Meeting Location Determination on Mobile DevicesBILOGREVIC, Igor; JADLIWALA, Murtuza; JONEJA, Vishal et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1141-1156, issn 1556-6013, 16 p.Article

Top-k Query Result Completeness Verification in Tiered Sensor NetworksYU, Chia-Mu; NI, Guo-Kai; CHEN, Ing-Yi et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 109-124, issn 1556-6013, 16 p.Article

Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in BiometricsMURAKAMI, Takao; TAKAHASHI, Kenta; MATSUURA, Kanta et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 259-271, issn 1556-6013, 13 p.Article

Uniform Embedding for Efficient JPEG SteganographyLINJIE GUO; JIANGQUN NI; YUN QING SHI et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 814-825, issn 1556-6013, 12 p.Article

When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?CHUNXIAO CAI; YUEMING CAI; XIANGYUN ZHOU et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 624-632, issn 1556-6013, 9 p.Article

Identification of Electronic Disguised VoicesHAOJUN WU; YONG WANG; JIWU HUANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 489-500, issn 1556-6013, 12 p.Article

3-D Face Recognition Under Occlusion Using Masked ProjectionALYUZ, Nese; GOKBERK, Berk; AKARUN, Lale et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 789-802, issn 1556-6013, 14 p.Article

A New Measure of Watermarking Security: The Effective Key LengthBAS, Patrick; FURON, Teddy.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1306-1317, issn 1556-6013, 12 p.Article

A New View-Invariant Feature for Cross-View Gait Recognition : Intelligent Video Surveillance for Public Security and Personal PrivacyKUSAKUNNIRAN, Worapan; QIANG WU; JIAN ZHANG et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 9-10, pp 1642-1653, issn 1556-6013, 12 p.Article

Adaptive Directional Total-Variation Model for Latent Fingerprint SegmentationJIANGYANG ZHANG; RONGJIE LAI; JAY KUO, C.-C et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1261-1273, issn 1556-6013, 13 p.Article

An Optimized Wavelength Band Selection for Heavily Pigmented Iris RecognitionYAZHUO GONG; ZHANG, David; PENGFEI SHI et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 64-75, issn 1556-6013, 12 p.Article

An ROI Privacy Protection Scheme for H.264 Video Based on FMO and ChaosFEI PENG; ZHU, Xiao-Wen; MIN LONG et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 9-10, pp 1688-1699, issn 1556-6013, 12 p.Article

Detecting Covert Channels in Computer Networks Based on Chaos TheoryHONG ZHAO; SHI, Yun-Qing.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 273-282, issn 1556-6013, 10 p.Article

Exposing Digital Image Forgeries by Illumination Color ClassificationDE CARVALHO, Tiago José; RIESS, Christian; ANGELOPOULOU, Elli et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1182-1194, issn 1556-6013, 13 p.Article

Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive EvaluationZAFEIRIOU, Stefanos; ATKINSON, Gary A; HANSEN, Mark F et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 121-135, issn 1556-6013, 15 p.Article

Face Tracking and Recognition at a Distance: A Coaxial and Concentric PTZ Camera System : Intelligent Video Surveillance for Public Security and Personal PrivacyUNSANG PARK; CHOI, Hyun-Cheol; JAIN, Anil K et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 9-10, pp 1665-1677, issn 1556-6013, 13 p.Article

  • Page / 12