default search action
WIFS 2013: Guangzhou, China
- 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18-21, 2013. IEEE 2013
Biometrics I
- Chee Cheun Huang, Julien Epps, Ewald Enzinger:
Separate MAP adaptation of GMM parameters for forensic voice comparison on limited data. 1-6 - Xuran Zhao, Nicholas W. D. Evans, Jean-Luc Dugelay:
Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrieval. 7-12 - Ewald Enzinger:
Testing the validity and reliability of forensic voice comparison based on reassigned time-frequency representations of Chinese /iau/. 13-18 - Xiaojie Li, Adams Wai-Kin Kong:
Restoring blood vessel patterns from JPEG compressed skin images for forensic analysis. 19-24 - Dajun Lin, Huicheng Zheng, Donghong Ma:
Robust visual tracking using local salient coding and PCA subspace modeling. 25-30
Biometrics II
- Ruggero Donida Labati, Roberto Sassi, Fabio Scotti:
ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication. 31-36 - Ajita Rattani, Norman Poh, Arun Ross:
A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. 37-42 - Brian DeCann, Arun Ross:
De-duplication errors in a biometric system: An investigative study. 43-48 - Yi Wang, Pong C. Yuen, Yiu-ming Cheung:
Hashing fingerprints for identity de-duplication. 49-54
Privacy
- Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Secure Evaluation of Private Functions through Piecewise Linear Approximation. 55-60 - Zekeriya Erkin, Thijs Veugen, Reginald L. Lagendijk:
Privacy-preserving recommender systems in dynamic environments. 61-66 - Qia Wang, Wenjun Zeng, Jun Tian:
Integrated secure watermark detection and privacy preserving storage in the compressive sensing domain. 67-72 - Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon:
Fast and secure similarity search in high dimensional space. 73-78 - Niels Zeilemaker, Zekeriya Erkin, Paolo Palmieri, Johan A. Pouwelse:
Building a privacy-preserving semantic overlay for Peer-to-Peer networks. 79-84 - Eric Rozier:
The perils of cross-silo deduplication: Trading user security for provider storage efficiency. 85-90
Cybersecurity
- Mauro Barni, Benedetta Tondi:
Multiple-observation hypothesis testing under adversarial conditions. 91-96 - Juan A. Elices, Fernando Pérez-González:
The flow fingerprinting game. 97-102 - Andrea Melloni, Paolo Bestagini, Andrea Costanzo, Mauro Barni, Marco Tagliasacchi, Stefano Tubaro:
Attacking image classification based on bag-of-visual-words. 103-108 - Xiaocui Liu, Jiande Sun, Ju Liu:
Shot-based temporally respective frame generation algorithm for video hashing. 109-114 - Cléo Baras, François Cayre:
Towards a realistic channel model for security analysis of authentication using graphical codes. 115-119
Multimedia forensics I
- Marco Fontani, Enrique Argones-Rúa, Carmela Troncoso, Mauro Barni:
The watchful forensic analyst: Multi-clue information fusion with background knowledge. 120-125 - Paolo Bestagini, Massimiliano Zanoni, Luca Albonico, Andrea Paganini, Augusto Sarti, Stefano Tubaro:
Feature-based classification for audio bootlegs detection. 126-131 - Juan Jose Moreira-Perez, Bertrand Chupeau, Gwenaël J. Doërr, Séverine Baudry:
Exploring color information to characterize camcorder piracy. 132-137 - Adi Hajj-Ahmad, Ravi Garg, Min Wu:
ENF based location classification of sensor recordings. 138-143 - Khosro Bahrami, Alex C. Kot, Jiayuan Fan:
Splicing detection in out-of-focus blurred images. 144-149
Multimedia forensics II
- David Vazquez-Padin, Pedro Comesaña, Fernando Pérez-González:
Set-membership identification of resampled signals. 150-155 - Valentina Conotter, Pedro Comesaña, Fernando Pérez-González:
Joint detection of full-frame linear filtering and JPEG compression in digital images. 156-161 - Matthew C. Stamm, Xiaoyu Chu, K. J. Ray Liu:
Forensically determining the order of signal processing operations. 162-167 - Tiziano Bianchi, Alessandro Piva, Fernando Pérez-González:
Near optimal detection of quantized signals and application to JPEG forensics. 168-173
Data hiding and traitor tracing
- Félix Balado, David Haughton:
Optimum perfect steganography of memoryless sources as a rate-distortion problem. 174-179 - Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The holey grail A special score function for non-binary traitor tracing. 180-185 - Xiaoqiang Zhang, Z. Jane Wang:
Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding. 186-190 - Thijs Laarhoven:
Dynamic traitor tracing schemes, revisited. 191-196 - Björn Terelius:
Towards transferable watermarks in buyer-seller watermarking protocols. 197-202 - Junxiang Wang, Jiangqun Ni:
A GA optimization approach to HS based multiple reversible data hiding. 203-208
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.