Sciweavers

TIFS
2016
70views more  TIFS 2016»
9 years 11 months ago
Game Theory and Adaptive Steganography
—According to conventional wisdom, content-adaptive embedding offers more steganographic security than random uniform embedding. We scrutinize this view and note that it is barel...
Pascal Schöttle, Rainer Böhme
TIFS
2016
75views more  TIFS 2016»
9 years 11 months ago
What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics
—Recent research has explored the possibility of extracting ancillary information from primary biometric traits, viz., face, fingerprints, hand geometry and iris. This ancillary...
Antitza Dantcheva, Petros Elia, Arun Ross
136
Voted
TIFS
2016
246views more  TIFS 2016»
9 years 11 months ago
Fast Detection of Transformed Data Leaks
—The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications...
Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-...
TIFS
2016
67views more  TIFS 2016»
9 years 11 months ago
Information Theoretical Limit of Media Forensics: The Forensicability
—While more and more forensic techniques have been proposed to detect the processing history of multimedia content, one starts to wonder if there exists a fundamental limit on th...
Xiaoyu Chu, Yan Chen, Matthew C. Stamm, K. J. Ray ...
TIFS
2016
65views more  TIFS 2016»
9 years 11 months ago
Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization
—Although sensor pattern noise (SPN) has been proven to be an effective means to uniquely identify digital cameras, some non-unique artifacts, shared amongst cameras undergo the ...
Xufeng Lin, Chang-Tsun Li
TIFS
2016
63views more  TIFS 2016»
9 years 11 months ago
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
—We introduce Hand Movement, Orientation, and Grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle...
Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Pen...
45
Voted
TIFS
2016
79views more  TIFS 2016»
9 years 11 months ago
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
We introduce a new encryption notion called Euclidean Distance based Encryption (EDE). In this notion, a ciphertext encrypted with a vector and a threshold value can be decrypted ...
Fuchun Guo, Willy Susilo, Yi Mu
TIFS
2016
57views more  TIFS 2016»
9 years 11 months ago
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata
—Rule-based matching on network packet headers is a central problem in firewalls, and network intrusion, monitoring and access-control systems. To enhance performance, rules are...
Alok Tongaonkar, R. Sekar
TIE
2016
50views more  TIE 2016»
9 years 11 months ago
The Impact of Deadline Misses on the Control Performance of High-End Motion Control Systems
—In high-end motion control systems the real-time computational platform must execute tasks from multiple control loops operating at high sampling rates. In recent years traditio...
W. Geelen, Duarte Antunes, Jeroen Voeten, Ramon R....
TIE
2016
57views more  TIE 2016»
9 years 11 months ago
Gradient-Based Fingerprinting for Indoor Localization and Tracking
—Of the different branches of indoor localization research, WiFi fingerprinting has drawn significant attention over the past decade. These localization systems function by com...
Yuanchao Shu, Yinghua Huang, Jiaqi Zhang, Philippe...