Sciweavers

TIFS
2010
135views more  TIFS 2010»
12 years 11 months ago
Distance Metric Learning for Content Identification
This paper considers a distance metric learning (DML) algorithm for a fingerprinting system, which identifies a query content by finding the fingerprint in the database (DB) that m...
Dalwon Jang, Chang Dong Yoo, Ton Kalker
TIFS
2010
109views more  TIFS 2010»
12 years 11 months ago
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
Buyer
Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessand...
TIFS
2010
92views more  TIFS 2010»
12 years 11 months ago
Asymptotic Biometric Analysis for Large Gallery Sizes
Manas Baveja, Hongsong Yuan, Lawrence M. Wein
TIFS
2010
140views more  TIFS 2010»
12 years 11 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
TIFS
2010
149views more  TIFS 2010»
12 years 11 months ago
Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions
Recently developed video editing techniques have enabled us to create realistic synthesized videos. Therefore, using video data as evidence in places such as courts of law requires...
Michihiro Kobayashi, Takahiro Okabe, Yoichi Sato
TIFS
2010
120views more  TIFS 2010»
12 years 11 months ago
Quantitative Structural Steganalysis of Jsteg
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new cla...
Jan Kodovský, Jessica J. Fridrich
TIFS
2010
130views more  TIFS 2010»
12 years 11 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TIFS
2010
227views more  TIFS 2010»
12 years 11 months ago
Region Duplication Detection Using Image Feature Matching
Abstract--Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in an image, after possible geometrical and...
Xunyu Pan, Siwei Lyu
TIFS
2010
120views more  TIFS 2010»
12 years 11 months ago
Gibbs Construction in Steganography
Abstract--We make a connection between steganography design by minimizing embedding distortion and statistical physics. The unique aspect of this work and one that distinguishes it...
Tomás Filler, Jessica J. Fridrich
TIFS
2010
137views more  TIFS 2010»
12 years 11 months ago
On the dynamic selection of biometric fusion algorithms
Biometric fusion consolidates the output of multiple biometric classifiers to render a decision about the identity of an individual. We consider the problem of designing a fusion s...
Mayank Vatsa, Richa Singh, Afzel Noore, Arun Ross