Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

jo.\*:("IEEE transactions on information forensics and security")

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 278

  • Page / 12
Export

Sélection :

  • et

A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security EnhancementWENCHENG YANG; JIANKUN HU; SONG WANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1179-1192, issn 1556-6013, 14 p.Article

A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF CriterionGUANG HUA; GOH, Jonathan; THING, Vrizlynn L. L et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1045-1055, issn 1556-6013, 11 p.Article

A Phase-Based Audio Watermarking System Robust to Acoustic Path PropagationARNOLD, Michael; CHEN, Xiao-Ming; BAUM, Peter et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 411-425, issn 1556-6013, 15 p.Article

Digital Image Sharing by Diverse Image MediaLEE, Kai-Hui; CHIU, Pei-Ling.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 88-98, issn 1556-6013, 11 p.Article

Discriminative Multimetric Learning for Kinship VerificationHAIBIN YAN; JIWEN LU; WEIHONG DENG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1169-1178, issn 1556-6013, 10 p.Article

Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable FunctionsLE ZHANG; ZHI HUI KONG; CHANG, Chip-Hong et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 921-932, issn 1556-6013, 12 p.Article

Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller ImplementationsSHIZE GUO; XINJIE ZHAO; FAN ZHANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 999-1014, issn 1556-6013, 16 p.Article

First Quantization Matrix Estimation From Double Compressed JPEG ImagesGALVAN, Fausto; PUGLISI, Giovanni; BRUNA, Arcangelo Ranieri et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1299-1310, issn 1556-6013, 12 p.Article

Harnessing Motion Blur to Unveil SplicingMAKKENA PURNACHANDRA RAO; RAJAGOPALAN, A. N; SEETHARAMAN, Guna et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 583-595, issn 1556-6013, 13 p.Article

Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking DirectionsJIWEN LU; GANG WANG; MOULIN, Pierre et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 51-61, issn 1556-6013, 11 p.Article

Multiple Account Identity Deception Detection in Social Media Using Nonverbal BehaviorTSIKERDEKIS, Michail; ZEADALLY, Sherali.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1311-1321, issn 1556-6013, 11 p.Article

Robust Lossless Watermarking of Relational Databases Based on Circular Histogram ModulationFRANCO-CONTRERAS, Javier; COATRIEUX, Gouenou; CUPPENS, Fréderic et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 397-410, issn 1556-6013, 14 p.Article

Spoofing Face Recognition With 3D MasksERDOGMUS, Nesli; MARCEL, Sébastien.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1084-1097, issn 1556-6013, 14 p.Article

Toward Incentivizing Anti-Spoofing DeploymentBINGYANG LIU; JUN BI; VASILAKOS, Athanasios V et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 436-450, issn 1556-6013, 15 p.Article

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model : PRIVACY AND TRUST MANAGEMENT IN CLOUD AND DISTRIBUTED SYSTEMSHASAN, Omar; BRUNIE, Lionel; BERTINO, Elisa et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 949-962, issn 1556-6013, 14 p.Article

A Framework for Decision Fusion in Image Forensics Based on Dempster―Shafer Theory of EvidenceFONTANI, Marco; BIANCHI, Tiziano; DE ROSA, Alessia et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 3-4, pp 593-607, issn 1556-6013, 15 p.Article

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search : PRIVACY AND TRUST MANAGEMENT IN CLOUD AND DISTRIBUTED SYSTEMSLIEN, I.-Ting; LIN, Yu-Hsun; SHIEH, Jyh-Ren et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 863-873, issn 1556-6013, 11 p.Article

A Worst-Case-Aware Design Methodology for Noise-Tolerant Oscillator-Based True Random Number Generator With Stochastic Behavior ModelingAMAKI, Takehiko; HASHIMOTO, Masanori; MITSUYAMA, Yukio et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1331-1342, issn 1556-6013, 12 p.Article

ARQ-Based Symmetric-Key Generation Over Correlated Erasure ChannelsYAHYA SOWTI KHIABANI; SHUANGQING WEI.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1152-1161, issn 1556-6013, 10 p.Article

Attribute Regularization Based Human Action Recognition : Intelligent Video Surveillance for Public Security and Personal PrivacyZHONG ZHANG; CHUNHENG WANG; BAIHUA XIAO et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 9-10, pp 1600-1609, issn 1556-6013, 10 p.Article

Blind Verification of Digital Image Originality: A Statistical ApproachMAHDIAN, Babak; NEDBAL, Radim; SAIC, Stanislav et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 9-10, pp 1531-1540, issn 1556-6013, 10 p.Article

Component-Based Representation in Automated Face RecognitionBONNEN, Kathryn; KLARE, Brendan F; JAIN, Anil K et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 239-253, issn 1556-6013, 15 p.Article

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving NodesSOLTANMOHAMMADI, Erfan; OROOJI, Mahdi; NARAGHI-POUR, Mort et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 205-215, issn 1556-6013, 11 p.Article

Destination Assisted Cooperative Jamming for Wireless Physical-Layer SecurityYUPENG LIU; JIANGYUAN LI; PETROPULU, Athina P et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 3-4, pp 682-694, issn 1556-6013, 13 p.Article

Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health : PRIVACY AND TRUST MANAGEMENT IN CLOUD AND DISTRIBUTED SYSTEMSSOLANAS, Agusti; MARTINEZ-BALLESTE, Antoni; MATEO-SANZ, Josep M et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 901-910, issn 1556-6013, 10 p.Article

  • Page / 12