FileMood

Download Transactions_on_Information_Forensics_and_Security

Transactions on Information Forensics and Security

Name

Transactions_on_Information_Forensics_and_Security

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

390.6 MB

Total Files

271

Hash

D1B2DA8D34987F4D194234BD3FFFAA6B4C0E05F5

/2006-1/

A_Clustering_Based_Approach_to_Perceptual_Image_Hashing.pdf

798.3 KB

A_Markov_Chain_Monte_Carlo_Algorithm_for_Bayesian_Dynamic_Signature_Verificatio.pdf

844.5 KB

An_Accurate_Analysis_of_Scalar_Quantization-Based_Data_Hiding.pdf

348.0 KB

Analysis_and_Design_of_Secure_Watermark-Based_Authentication_Systems.pdf

488.6 KB

Approximate_Message_Authentication_Codes_for_N_-ary_Alphabets.pdf

1.3 MB

Automatic_Facial_Expression_Recognition_Using_Facial_Animation_Parameters_and_Mu.pdf

764.4 KB

Editorial_Introducing_T-IFS.pdf

144.2 KB

Personal_Authentication_Using_3-D_Finger_Geometry.pdf

824.0 KB

Steganalysis_Using_Higher-Order_Image_Statistics.pdf

1.4 MB

The_NTMAC_for_Authentication_of_Noisy_Messages.pdf

260.3 KB

Watermarking_Relying_on_Cover_Signal_Content_to_Hide_Synchronization_Marks.pdf

1.7 MB

Wet_Paper_Codes_With_Improved_Embedding_Efficiency.pdf

745.1 KB

/2006-2/

An_Algorithm_for_Distorted_Fingerprint_Matching_Based_on_Local_Triangle_Feature_.pdf

2.2 MB

Biometrics_A_Tool_for_Information_Security.pdf

3.0 MB

Digital_Camera_Identification_From_Sensor_Pattern_Noise.pdf

1.1 MB

Efficient_Spatial_Image_Watermarking_via_New_Perceptual_Masking_and_Blind_Detec.pdf

3.5 MB

EyeCerts.pdf

2.0 MB

Joint_Coding_and_Embedding_Techniques_for_Multimedia_Fingerprinting.pdf

3.7 MB

Performance_Analysis_of_Iris-Based_Identification_System_at_the_Matching_Score_.pdf

2.0 MB

Reducing_Delay_and_Enhancing_DoS_Resistance_in_Multicast_Authentication_Through_.pdf

851.1 KB

Robust_and_Secure_Image_Hashing.pdf

1.7 MB

Steganalysis_for_Markov_Cover_Data_With_Applications_to_Images.pdf

1.3 MB

Teeth_Segmentation_in_Digitized_Dental_X-Ray_Films_Using_Mathematical_Morphology.pdf

5.4 MB

The_Boneh–Shaw_Fingerprinting_Scheme_is_Better_Than_We_Thought.pdf

241.2 KB

/2006-3/

Behavior_Forensics_for_Scalable_Multiuser_Collusion_Fairness_Versus_Effectivenes.pdf

987.8 KB

Block_QIM_Watermarking_Games.pdf

890.1 KB

Correspondence.pdf

180.9 KB

Dual_Protection_of_JPEG_Images_Based_on_Informed_Embedding_and_Two-Stage_Waterma.pdf

1.6 MB

Estimation_of_Message_Source_and_Destination_From_Network_Intercepts.pdf

628.2 KB

Face_Identification_Using_Novel_Frequency-Domain_Representation_of_Facial_Asymm.pdf

1.2 MB

Fake_Finger_Detection_by_Skin_Distortion_Analysis.pdf

5.2 MB

Graphical_Passwords_Based_on_Robust_Discretization.pdf

162.9 KB

Gray_Hausdorff_Distance_Measure_for_Comparing_Face_Images.pdf

824.8 KB

Matrix_Embedding_for_Large_Payloads.pdf

307.9 KB

/2006-4/

A_Set_Theoretic_Framework_for_Watermarking_and_Its_Application_to_Semifragile_Ta.pdf

6.9 MB

Correspondence.pdf

3.4 MB

Digital_Video_Steganalysis_Exploiting_Statistical_Visibility_in_the_Temporal_Dom.pdf

1.3 MB

Fingerprint_Retrieval_for_Identification.pdf

1.7 MB

Gaussian_Mixture_Modeling_of_Short-Time_Fourier_Transform_Features_for_Audio_Fin.pdf

432.0 KB

Multilevel_2-D_Bar_Codes_Toward_High-Capacity_Storage_Modules_for_Multimedia_Sec.pdf

2.0 MB

On_Fundamental_Limitations_of_Proving_Data_Theft.pdf

312.0 KB

Print_and_Scan_Resilient_Data_Hiding_in_Images.pdf

3.5 MB

Reversible_Steganography_for_VQ-Compressed_Images_Using_Side_Matching_and_Reloca.pdf

2.6 MB

Security_of_Lattice-Based_Data_Hiding_Against_the_Known_Message_Attack.pdf

1.1 MB

The_CRC–NTMAC_for_Noisy_Message_Authentication.pdf

458.4 KB

Traitor-Within-Traitor_Behavior_Forensics_Strategy_and_Risk_Minimization.pdf

1.5 MB

/2007-1/

A_Framework_for_Robust_Watermarking_of_H.264-Encoded_Video_With_Controllable_Det.pdf

669.5 KB

A_New_Steganographic_Method_for_Data_Hiding_in_Microsoft_Word_Documents_by_a_Cha.pdf

515.9 KB

A_Parameter-Free_Framework_for_General_Supervised_Subspace_Learning.pdf

863.1 KB

Learning_Discriminant_Person-Specific_Facial_Models_Using_Expandable_Graphs.pdf

3.7 MB

Nonintrusive_Component_Forensics_of_Visual_Sensors_Using_Output_Images.pdf

1.2 MB

On_Generation_and_Analysis_of_Synthetic_Iris_Images.pdf

6.0 MB

Optimized_Feature_Extraction_for_Learning-Based_Image_Steganalysis.pdf

564.9 KB

Statistically_Robust_Detection_of_Multiplicative_Spread-Spectrum_Watermarks.pdf

923.9 KB

Steganalysis_of_Embedding_in_Two_Least-Significant_Bits.pdf

386.7 KB

/2007-2/

A_Cascade_Framework_for_a_Real-Time_Statistical_Plate_Recognition_System.pdf

2.7 MB

A_Constructive_and_Unifying_Framework_for_Zero-Bit_Watermarking.pdf

859.1 KB

Analysis_and_Protection_of_Dynamic_Membership_Information_for_Group_Key_Distribu.pdf

1.0 MB

Correspondence.pdf

945.6 KB

Defense_Against_Injecting_Traffic_Attacks_in_Wireless_Mobile_Ad-Hoc_Networks.pdf

741.3 KB

Derivation_of_Error_Distribution_in_Least_Squares_Steganalysis.pdf

563.7 KB

Hand-Geometry_Recognition_Using_Entropy-Based_Discretization.pdf

802.9 KB

Human_Identification_From_Dental_X-Ray_Images_Based_on_the_Shape_and_Appearance.pdf

2.7 MB

Noniterative_Algorithms_for_Sensitivity_Analysis_Attacks.pdf

995.7 KB

Optical_Watermarking_for_Printed_Document_Authentication.pdf

587.2 KB

Performance_Analysis_of_Robust_Audio_Hashing.pdf

894.7 KB

Securing_Cooperative_Ad-Hoc_Networks_Under_Noise_and_Imperfect_Monitoring_Strate.pdf

839.3 KB

Tracing_Malicious_Relays_in_Cooperative_Wireless_Communications.pdf

1.3 MB

Using_Perceptual_Models_to_Improve_Fidelity_and_Provide_Resistance_to_Valumetric.pdf

3.5 MB

Using_Support_Vector_Machines_to_Enhance_the_Performance_of_Bayesian_Face_Recogn.pdf

356.6 KB

/2007-3-1/

A_Memetic_Fingerprint_Matching_Algorithm.pdf

639.6 KB

Channel_Identification_Secret_Sharing_Using_Reciprocity_in_Ultrawideband_Channe.pdf

1.3 MB

Double-Sided_Watermark_Embedding_and_Detection.pdf

650.4 KB

Exposing_Digital_Forgeries_in_Complex_Lighting_Environments.pdf

1.6 MB

Exposing_Digital_Forgeries_in_Interlaced_and_Deinterlaced_Video.pdf

1.8 MB

Lossless_Data_Embedding_With_High_Embedding_Capacity_Based_on_Declustering_for_V.pdf

1.7 MB

Multimodal_Wireless_Networks_Communication_and_Surveillance_on_the_Same_Infrastr.pdf

933.9 KB

Reversible_Data-Hiding_Scheme_for_2-D_Vector_Maps_Based_on_Difference_Expansion.pdf

580.1 KB

Reversible_Image_Watermarking_Based_on_Integer-to-Integer_Wavelet_Transform.pdf

2.1 MB

Robust_Wireless_Transmission_of_Compressed_Latent_Fingerprint_Images.pdf

2.5 MB

Robust_and_Secure_Image_Hashing_via_Non-Negative_Matrix_Factorizations.pdf

3.5 MB

Statistical_Models_for_Assessing_the_Individuality_of_Fingerprints.pdf

2.2 MB

Toward_Pose-Invariant_2-D_Face_Recognition_Through_Point_Distribution_Models_and.pdf

2.8 MB

Unicity_Distance_of_Robust_Image_Hashing.pdf

485.2 KB

Warping-Based_Offline_Signature_Recognition.pdf

771.2 KB

Watermarking_Protocol_for_Web_Context.pdf

1.1 MB

/2007-3-2/

3-D_Face_Recognition_Based_on_Warped_Example_Faces.pdf

2.2 MB

3-D_Face_Recognition_Using_Local_Appearance-Based_Models.pdf

1.1 MB

3-D_Face_Recognition_With_the_Geodesic_Polar_Representation.pdf

3.5 MB

A_Novel_Discriminant_Non-Negative_Matrix_Factorization_Algorithm_With_Applicatio.pdf

674.1 KB

An_Evaluation_of_Image_Sampling_and_Compression_for_Human_Iris_Recognition.pdf

1.6 MB

Biometric_Identification_Based_on_Frequency_Analysis_of_Cardiac_Sounds.pdf

436.2 KB

Class-Specific_Kernel-Discriminant_Analysis_for_Face_Verification.pdf

1.9 MB

Components_and_Their_Topology_for_Robust_Face_Detection_in_the_Presence_of_Parti.pdf

1.4 MB

Correspondence.pdf

718.6 KB

Face_Verification_Using_Template_Matching.pdf

869.9 KB

Guest_Editorial_Special_Issue_on_Human_Detection_and_Recognition.pdf

33.5 KB

Multiscale_Representation_for_3-D_Face_Recognition.pdf

866.0 KB

Palmprint_Classification_Using_Multiple_Advanced_Correlation_Filters_and_Palm-S.pdf

1.6 MB

Protecting_Biometric_Templates_With_Sketch_Theory_and_Practice.pdf

700.2 KB

Real-Time_Face_Detection_and_Motion_Analysis_With_Application_in_“Liveness”_.pdf

2.6 MB

Spoof_Attacks_on_Gait_Authentication_System.pdf

2.3 MB

/2007-4/

A_Comparative_Study_of_Fingerprint_Image-Quality_Estimation_Methods.pdf

3.4 MB

A_New_Digital_Image_Watermarking_Algorithm_Resilient_to_Desynchronization_Attack.pdf

2.7 MB

A_Robust_Fingerprint_Indexing_Scheme_Using_Minutia_Neighborhood_Structure_and_Lo.pdf

762.3 KB

Application_of_Projective_Invariants_in_Hand_Geometry_Biometrics.pdf

911.5 KB

Collusion-Resistant_Video_Fingerprinting_for_Large_User_Group.pdf

1.7 MB

Combatting_Ambiguity_Attacks_via_Selective_Detection_of_Embedded_Watermarks.pdf

2.3 MB

Correction.pdf

36.0 KB

Decode-Time_Forensic_Watermarking_of_AAC_Bitstreams.pdf

1.4 MB

Detecting_Spoofing_and_Anomalous_Traffic_in_Wireless_Networks_via_Forge-Resist.pdf

1.4 MB

Fingerprint-Based_Fuzzy_Vault_Implementation_and_Performance.pdf

1.8 MB

Horizontal_and_Vertical_2DPCA-Based_Discriminant_Analysis_for_Face_Verification.pdf

1.7 MB

Noise_Reduction_in_Side_Channel_Attack_Using_Fourth-Order_Cumulant.pdf

829.0 KB

Optimum_Detection_for_Spread-Spectrum_Watermarking_That_Employs_Self-Masking.pdf

2.7 MB

Shape-Driven_Gabor_Jets_for_Face_Description_and_Authentication.pdf

2.0 MB

/2008-1/

A_Region_Ensemble_for_3-D_Face_Recognition.pdf

2.7 MB

An_FPGA-Based_Network_Intrusion_Detection_Architecture.pdf

948.8 KB

Classification_and_Feature_Extraction_by_Simplexization.pdf

1.7 MB

Color_Image_Watermarking_Using_Multidimensional_Fourier_Transforms.pdf

1.5 MB

Determining_Image_Origin_and_Integrity_Using_Sensor_Noise.pdf

6.1 MB

Digital_Image_Forensics_via_Intrinsic_Fingerprints.pdf

1.9 MB

Effect_of_Severe_Image_Compression_on_Iris_Recognition_Performance.pdf

3.5 MB

Kerckhoffs-Based_Embedding_Security_Classes_for_WOA_Data_Hiding.pdf

624.0 KB

New_Additive_Watermark_Detectors_Based_On_A_Hierarchical_Spatially_Adaptive_Imag.pdf

875.9 KB

Physical-Layer_Authentication.pdf

710.4 KB

/2008-2/

A_Fast_Search_Algorithm_for_a_Large_Fuzzy_Database.pdf

905.0 KB

An_Analysis_of_Lightweight_Encryption_Schemes_for_Fingerprint_Images.pdf

4.6 MB

Automatic_Construction_of_Dental_Charts_for_Postmortem_Identification.pdf

3.5 MB

Correspondence.pdf

1.7 MB

Detection_of_Double-Compression_in_JPEG_Images_for_Applications_in_Steganography.pdf

632.1 KB

Evaluation_of_Localization_Attacks_on_Power-Modulated_Challenge–Response_Syste.pdf

2.0 MB

Fusion_of_Matching_Algorithms_for_Human_Identification_Using_Dental_X-Ray_Radio.pdf

1.5 MB

Insertion_Deletion_Codes_With_Feature-Based_Embedding_A_New_Paradigm_for_Waterma.pdf

1.2 MB

Learning_the_Uncorrelated_Independent_and_Discriminating_Color_Spaces_for_Face_R.pdf

1.6 MB

Mutual_Information_Jammer-Relay_Games.pdf

859.8 KB

On_the_Distinguishability_of_Distance-Bounded_Permutations_in_Ordered_Channels.pdf

634.1 KB

On_the_Operational_Quality_of_Fingerprint_Scanners.pdf

2.9 MB

Quantization-Based_Data_Hiding_Robust_to_Linear-Time-Invariant_Filtering.pdf

1.0 MB

Secure_Cooperation_in_Autonomous_Mobile_Ad-Hoc_Networks_Under_Noise_and_Imperfec.pdf

1.2 MB

Secure_Interdomain_Routing_Registry.pdf

857.9 KB

Sensor_Data_Cryptography_in_Wireless_Sensor_Networks.pdf

1.3 MB

Template-Free_Biometric-Key_Generation_by_Means_of_Fuzzy_Genetic_Clustering.pdf

543.5 KB

/2008-3/

A_Multimodal_Approach_for_Face_Modeling_and_Recognition.pdf

977.1 KB

A_Network_Coding_Approach_to_Secret_Key_Distribution.pdf

521.2 KB

A_Novel_Difference_Expansion_Transform_for_Reversible_Data_Embedding.pdf

1.3 MB

A_Selective_Feature_Information_Approach_for_Iris_Image-Quality_Measure.pdf

1.4 MB

A_Video_Watermarking_Scheme_Based_on_the_Dual-Tree_Complex_Wavelet_Transform.pdf

1.8 MB

Adaptive_Data_Hiding_in_Edge_Areas_of_Images_With_Spatial_LSB_Domain_Systems.pdf

1.4 MB

Bilinear_Models_for_3-D_Face_and_Facial_Expression_Recognition.pdf

1.7 MB

Blind_Authentication_Using_Periodic_Properties_of_Interpolation.pdf

3.0 MB

Blind_Identification_of_Source_Cell-Phone_Model.pdf

1.2 MB

Correspondence.pdf

554.2 KB

Data_Fusion_and_Cost_Minimization_for_Intrusion_Detection.pdf

437.8 KB

Digital_Single_Lens_Reflex_Camera_Identification_From_Traces_of_Sensor_Dust.pdf

1.6 MB

Digital_Video_Watermarking_in_P-Frames_With_Controlled_Video_Bit-Rate_Increase.pdf

861.5 KB

Distributed_Detection_of_Information_Flows.pdf

977.6 KB

Graphical_Inference_for_Multiple_Intrusion_Detection.pdf

489.9 KB

Guest_Editorial_Special_Section_on_Statistical_Methods_for_Network_Security_and_.pdf

26.0 KB

Lookup-Table-Based_Secure_Client-Side_Embedding_for_Spread-Spectrum_Watermarks.pdf

637.8 KB

Network_Security_for_Client-Server_Architecture_Using_Wiretap_Codes.pdf

567.2 KB

On_Empirical_Recognition_Capacity_of_Biometric_Systems_Under_Global_PCA_and_ICA_.pdf

2.6 MB

On_the_Assumptions_of_Equal_Contributions_in_Fingerprinting.pdf

177.9 KB

Projecting_Cyberattacks_Through_Variable-Length_Markov_Models.pdf

622.6 KB

Robust_Detection_of_MAC_Layer_Denial-of-Service_Attacks_in_CSMACA_Wireless_Netwo.pdf

721.2 KB

Special_Section_Correspondence.pdf

215.7 KB

/2008-4/

3-D_Ear_Modeling_and_Recognition_From_Video_Sequences_Using_Shape_From_Shading.pdf

2.4 MB

A_Buyer–Seller_Watermarking_Protocol_Based_on_Secure_Embedding.pdf

105.5 KB

Chaotic-Type_Features_for_Speech_Steganalysis.pdf

1.7 MB

Correspondence.pdf

575.4 KB

Cryptographic_Secrecy_of_Steganographic_Matrix_Embedding.pdf

204.0 KB

Fingerprint-Quality_Index_Using_Gradient_Components.pdf

1.8 MB

Hiding_Traces_of_Resampling_in_Digital_Images.pdf

2.7 MB

Hierarchical_Watermarking_of_Semiregular_Meshes_Based_on_Wavelet_Transform.pdf

2.6 MB

Multiclass_Detector_of_Current_Steganographic_Methods_for_JPEG_Format.pdf

1.3 MB

Multipurpose_Watermarking_Based_on_Multiscale_Curvelet_Transform.pdf

750.7 KB

Recognizing_Rotated_Faces_From_Frontal_and_Side_Views_An_Approach_Toward_Effecti.pdf

3.4 MB

Regression_From_Uncertain_Labels_and_Its_Applications_to_Soft_Biometrics.pdf

1.0 MB

Security_of_Lattice-Based_Data_Hiding_Against_the_Watermarked-Only_Attack.pdf

1.6 MB

Steganalysis_Frameworks_of_Embedding_in_Multiple_Least-Significant_Bits.pdf

746.5 KB

Subspace_Approximation_of_Face_Recognition_Algorithms_An_Empirical_Study.pdf

2.2 MB

Theoretical_and_Practical_Boundaries_of_Binary_Secure_Sketches.pdf

1.0 MB

Toward_Compression_of_Encrypted_Images_and_Video_Sequences.pdf

2.2 MB

Use_of_Identification_Trial_Statistics_for_the_Combination_of_Biometric_Matcher.pdf

991.5 KB

Using_One-Class_SVMs_and_Wavelets_for_Audio_Surveillance.pdf

1.1 MB

/2009-1/

Coding_Schemes_for_Relay-Assisted_Information_Embedding.pdf

908.3 KB

Correspondence.pdf

156.0 KB

Detection_of_Motion-Incoherent_Components_in_Video_Streams.pdf

680.3 KB

Editorial.pdf

157.8 KB

Exposing_Digital_Forgeries_from_JPEG_Ghosts.pdf

1.3 MB

Fingerprinting_With_Minimum_Distance_Decoding.pdf

809.1 KB

Hyperbolic_RDM_for_Nonlinear_Valumetric_Distortions.pdf

718.5 KB

Improving_Face_Recognition_via_Narrowband_Spectral_Range_Selection_Using_Jeffrey.pdf

3.6 MB

On_the_Implementation_of_the_Discrete_Fourier_Transform_in_the_Encrypted_Domain.pdf

627.4 KB

Personal_Authentication_Using_Finger_Knuckle_Surface.pdf

4.3 MB

Robust_Blind_Watermarking_of_Point-Sampled_Geometry.pdf

2.1 MB

SMOCK_A_Scalable_Method_of_Cryptographic_Key_Management_for_Mission-Critical_Wir.pdf

831.0 KB

Scanner_Identification_Using_Feature-Based_Processing_and_Analysis.pdf

3.1 MB

Spread-Spectrum_Watermarking_Security.pdf

1.2 MB

/2009-2/

A_Game_Theoretical_Framework_on_Intrusion_Detection_in_Heterogeneous_Networks.pdf

408.7 KB

A_Graph_Approach_to_Quantitative_Analysis_of_Control-Flow_Obfuscating_Transforma.pdf

382.5 KB

A_Hypothesis_Testing_Approach_to_Semifragile_Watermark-Based_Authentication.pdf

897.1 KB

A_Parametric_Correlation_Framework_for_the_Statistical_Evaluation_and_Estimation.pdf

353.1 KB

Face_Recognition_Under_Occlusions_and_Variant_Expressions_With_Partial_Similarit.pdf

2.3 MB

Unseen_Visible_Watermarking_A_Novel_Methodology_for_Auxiliary_Information_Delive.pdf

2.0 MB

Watermarking_Robustness_Evaluation_Based_on_Perceptual_Quality_via_Genetic_Algor.pdf

1.4 MB

Wireless_Secrecy_in_Cellular_Systems_With_Infrastructure-Aided_Cooperation.pdf

1.0 MB

/2009-3/

A_Channel_Coding_Approach_for_Human_Authentication_From_Gait_Sequences.pdf

1.0 MB

A_Sensing_Seat_for_Human_Authentication.pdf

1.3 MB

Adversary_Aware_Surveillance_Systems.pdf

879.5 KB

An_Information-Theoretic_View_of_Network-Aware_Malware_Attacks.pdf

844.0 KB

Channel-Based_Detection_of_Sybil_Attacks_in_Wireless_Networks.pdf

1.1 MB

Correspondence.pdf

193.5 KB

Digital_Image_Source_Coder_Forensics_Via_Intrinsic_Fingerprints.pdf

2.3 MB

Exploiting_the_Human–Machine_Gap_in_Image_Recognition_for_Designing_CAPTCHAs.pdf

2.2 MB

Fast_Algorithm_for_Updating_the_Discriminant_Vectors_of_Dual-Space_LDA.pdf

590.3 KB

Fast_Haar_Transform_Based_Feature_Extraction_for_Face_Representation_and_Recogni.pdf

1.7 MB

Fingerprint_Verification_Using_Spectral_Minutiae_Representations.pdf

4.2 MB

Fingerprinting_Compressed_Multimedia_Signals.pdf

2.9 MB

Halftone_Visual_Cryptography_Via_Error_Diffusion.pdf

10.2 MB

Improvement_in_Intrusion_Detection_With_Advances_in_Sensor_Fusion.pdf

400.2 KB

Intrinsic_Sensor_Noise_Features_for_Forensic_Analysis_on_Scanners_and_Scanned_Im.pdf

1.4 MB

Low-Complexity_Iris_Coding_and_Recognition_Based_on_Directionlets.pdf

1.4 MB

MPSteg-Color_Data_Hiding_Through_Redundant_Basis_Decomposition.pdf

1.8 MB

Mathematical_Model_for_Low-Rate_DoS_Attacks_Against_Application_Servers.pdf

837.5 KB

On_Estimation_Accuracy_of_Desynchronization_Attack_Channel_Parameters.pdf

794.4 KB

On_Reliability_and_Security_of_Randomized_Detectors_Against_Sensitivity_Analysis.pdf

597.6 KB

Performance_Analysis_of_Fridrich–Goljan_Self-Embedding_Authentication_Method.pdf

302.0 KB

Performance_of_Orthogonal_Fingerprinting_Codes_Under_Worst-Case_Noise.pdf

444.0 KB

Regular_Simplex_Fingerprints_and_Their_Optimality_Properties.pdf

570.1 KB

Robust_MC-CDMA-Based_Fingerprinting_Against_Time-Varying_Collusion_Attacks.pdf

1.3 MB

Steganalysis_of_YASS.pdf

825.8 KB

Temporal_Derivative-Based_Spectrum_and_Mel-Cepstrum_Audio_Steganalysis.pdf

1.4 MB

/2009-4-1/

CAST_Canvass_Audits_by_Sampling_and_Testing.pdf

340.7 KB

Detecting_Code_Alteration_by_Creating_a_Temporary_Memory_Bottleneck.pdf

728.7 KB

Development_Formal_Verification_and_Evaluation_of_an_E-Voting_System_With_VVPAT.pdf

578.4 KB

Enhancing_Electronic_Voting_Machines_on_the_Example_of_Bingo_Voting.pdf

127.4 KB

Guest_Editorial_Special_Issue_on_Electronic_Voting.pdf

1.2 MB

Prêt_à_Voter_a_Voter-Verifiable_Voting_System.pdf

619.9 KB

Scantegrity_II_End-to-End_Verifiability_by_Voters_of_Optical_Scan_Elections_Thr.pdf

1.2 MB

Security_in_Large-Scale_Internet_Elections_A_Retrospective_Analysis_of_Elections.pdf

1.6 MB

Shuffle-Sum_Coercion-Resistant_Verifiable_Tallying_for_STV_Voting.pdf

475.1 KB

State-Wide_Elections_Optical_Scan_Voting_Systems_and_the_Pursuit_of_Integrity.pdf

1.2 MB

Straight-Party_Voting_What_Do_Voters_Think?.pdf

2.7 MB

TPM_Meets_DRE_Reducing_the_Trust_Base_for_Electronic_Voting_Using_Trusted_Platfo.pdf

547.5 KB

The_Effectiveness_of_Receipt-Based_Attacks_on_ThreeBallot.pdf

544.3 KB

Voting_With_Unconditional_Privacy_by_Merging_Prêt_à_Voter_and_PunchScan.pdf

421.8 KB

/2009-4-2/

A_Study_on_the_Randomness_Measure_of_Image_Hashing.pdf

403.3 KB

Accurate_Detection_of_Demosaicing_Regularity_for_Digital_Image_Forensics.pdf

1.3 MB

Behavior_Forensics_With_Side_Information_for_Multimedia_Fingerprinting_Social_Ne.pdf

1.6 MB

Benchmarking_Quality-Dependent_and_Cost-Sensitive_Score-Level_Multimodal_Biometr.pdf

2.0 MB

Biometric_Systems_Privacy_and_Secrecy_Aspects.pdf

909.1 KB

Election_Audits_Using_a_Trinomial_Bound.pdf

240.6 KB

Free_Electronic_Access_to_SP_Publications.pdf

21.8 KB

High-Rate_Random-Like_Spherical_Fingerprinting_Codes_With_Linear_Decoding_Comple.pdf

538.8 KB

Iris_Recognition_Using_Signal-Level_Fusion_of_Frames_From_Video.pdf

2.4 MB

Iris_Segmentation_Using_Geodesic_Active_Contours.pdf

3.9 MB

Joint_Watermarking_Scheme_for_Multiparty_Multilevel_DRM_Architecture.pdf

1.9 MB

Multibiometric_Cryptosystem_Model_Structure_and_Performance_Analysis.pdf

1.0 MB

Noninteractive_Self-Certification_for_Long-Lived_Mobile_Ad_Hoc_Networks.pdf

603.7 KB

On_the_Security_of_the_Secure_Arithmetic_Code.pdf

2.2 MB

Pairwise_Boosted_Audio_Fingerprint.pdf

1.5 MB

Parallelizing_Iris_Recognition.pdf

1.4 MB

Provably_Secure_Remote_Truly_Three-Factor_Authentication_Scheme_With_Privacy_Pro.pdf

588.2 KB

Quantum_Hashing_for_Multimedia.pdf

851.4 KB

Risk-Limiting_Postelection_Audits_Conservative_P_-Values_From_Common_Probability.pdf

357.6 KB

Robust_Orientation_Field_Estimation_and_Extrapolation_Using_Semilocal_Line_Senso.pdf

2.1 MB

Securing_Rating_Aggregation_Systems_Using_Statistical_Detectors_and_Trust.pdf

2.1 MB

Self-Verifying_Visual_Secret_Sharing_Using_Error_Diffusion_and_Interpolation_Tec.pdf

2.1 MB

/

filelist

20.4 KB

myriad.NFO

2.4 KB

 

Total files 271


Copyright © 2025 FileMood.com