589689.xyz

Transactions_on_Information_Forensics_and_Security

  • 收录时间:2018-03-14 19:00:49
  • 文件大小:373MB
  • 下载次数:80
  • 最近下载:2021-01-21 20:59:22
  • 磁力链接:

文件列表

  1. 2009-3/Halftone_Visual_Cryptography_Via_Error_Diffusion.pdf 10MB
  2. 2006-4/A_Set_Theoretic_Framework_for_Watermarking_and_Its_Application_to_Semifragile_Ta.pdf 7MB
  3. 2008-1/Determining_Image_Origin_and_Integrity_Using_Sensor_Noise.pdf 6MB
  4. 2007-1/On_Generation_and_Analysis_of_Synthetic_Iris_Images.pdf 6MB
  5. 2006-2/Teeth_Segmentation_in_Digitized_Dental_X-Ray_Films_Using_Mathematical_Morphology.pdf 5MB
  6. 2006-3/Fake_Finger_Detection_by_Skin_Distortion_Analysis.pdf 5MB
  7. 2008-2/An_Analysis_of_Lightweight_Encryption_Schemes_for_Fingerprint_Images.pdf 4MB
  8. 2009-1/Personal_Authentication_Using_Finger_Knuckle_Surface.pdf 4MB
  9. 2009-3/Fingerprint_Verification_Using_Spectral_Minutiae_Representations.pdf 4MB
  10. 2009-4-2/Iris_Segmentation_Using_Geodesic_Active_Contours.pdf 4MB
  11. 2007-1/Learning_Discriminant_Person-Specific_Facial_Models_Using_Expandable_Graphs.pdf 4MB
  12. 2006-2/Joint_Coding_and_Embedding_Techniques_for_Multimedia_Fingerprinting.pdf 4MB
  13. 2009-1/Improving_Face_Recognition_via_Narrowband_Spectral_Range_Selection_Using_Jeffrey.pdf 3MB
  14. 2007-3-1/Robust_and_Secure_Image_Hashing_via_Non-Negative_Matrix_Factorizations.pdf 3MB
  15. 2007-2/Using_Perceptual_Models_to_Improve_Fidelity_and_Provide_Resistance_to_Valumetric.pdf 3MB
  16. 2008-2/Automatic_Construction_of_Dental_Charts_for_Postmortem_Identification.pdf 3MB
  17. 2006-4/Print_and_Scan_Resilient_Data_Hiding_in_Images.pdf 3MB
  18. 2006-2/Efficient_Spatial_Image_Watermarking_via_New_Perceptual_Masking_and_Blind_Detec.pdf 3MB
  19. 2007-3-2/3-D_Face_Recognition_With_the_Geodesic_Polar_Representation.pdf 3MB
  20. 2008-1/Effect_of_Severe_Image_Compression_on_Iris_Recognition_Performance.pdf 3MB
  21. 2008-4/Recognizing_Rotated_Faces_From_Frontal_and_Side_Views_An_Approach_Toward_Effecti.pdf 3MB
  22. 2006-4/Correspondence.pdf 3MB
  23. 2007-4/A_Comparative_Study_of_Fingerprint_Image-Quality_Estimation_Methods.pdf 3MB
  24. 2009-1/Scanner_Identification_Using_Feature-Based_Processing_and_Analysis.pdf 3MB
  25. 2008-3/Blind_Authentication_Using_Periodic_Properties_of_Interpolation.pdf 3MB
  26. 2006-2/Biometrics_A_Tool_for_Information_Security.pdf 3MB
  27. 2008-2/On_the_Operational_Quality_of_Fingerprint_Scanners.pdf 3MB
  28. 2009-3/Fingerprinting_Compressed_Multimedia_Signals.pdf 3MB
  29. 2007-3-1/Toward_Pose-Invariant_2-D_Face_Recognition_Through_Point_Distribution_Models_and.pdf 3MB
  30. 2008-4/Hiding_Traces_of_Resampling_in_Digital_Images.pdf 3MB
  31. 2007-2/Human_Identification_From_Dental_X-Ray_Images_Based_on_the_Shape_and_Appearance.pdf 3MB
  32. 2007-4/A_New_Digital_Image_Watermarking_Algorithm_Resilient_to_Desynchronization_Attack.pdf 3MB
  33. 2007-2/A_Cascade_Framework_for_a_Real-Time_Statistical_Plate_Recognition_System.pdf 3MB
  34. 2008-1/A_Region_Ensemble_for_3-D_Face_Recognition.pdf 3MB
  35. 2009-4-1/Straight-Party_Voting_What_Do_Voters_Think?.pdf 3MB
  36. 2007-4/Optimum_Detection_for_Spread-Spectrum_Watermarking_That_Employs_Self-Masking.pdf 3MB
  37. 2008-3/On_Empirical_Recognition_Capacity_of_Biometric_Systems_Under_Global_PCA_and_ICA_.pdf 2MB
  38. 2006-4/Reversible_Steganography_for_VQ-Compressed_Images_Using_Side_Matching_and_Reloca.pdf 2MB
  39. 2008-4/Hierarchical_Watermarking_of_Semiregular_Meshes_Based_on_Wavelet_Transform.pdf 2MB
  40. 2007-3-2/Real-Time_Face_Detection_and_Motion_Analysis_With_Application_in_“Liveness”_.pdf 2MB
  41. 2007-3-1/Robust_Wireless_Transmission_of_Compressed_Latent_Fingerprint_Images.pdf 2MB
  42. 2008-4/3-D_Ear_Modeling_and_Recognition_From_Video_Sequences_Using_Shape_From_Shading.pdf 2MB
  43. 2009-4-2/Iris_Recognition_Using_Signal-Level_Fusion_of_Frames_From_Video.pdf 2MB
  44. 2007-4/Combatting_Ambiguity_Attacks_via_Selective_Detection_of_Embedded_Watermarks.pdf 2MB
  45. 2009-3/Digital_Image_Source_Coder_Forensics_Via_Intrinsic_Fingerprints.pdf 2MB
  46. 2009-2/Face_Recognition_Under_Occlusions_and_Variant_Expressions_With_Partial_Similarit.pdf 2MB
  47. 2007-3-2/Spoof_Attacks_on_Gait_Authentication_System.pdf 2MB
  48. 2009-4-2/On_the_Security_of_the_Secure_Arithmetic_Code.pdf 2MB
  49. 2009-3/Exploiting_the_Human–Machine_Gap_in_Image_Recognition_for_Designing_CAPTCHAs.pdf 2MB
  50. 2007-3-2/3-D_Face_Recognition_Based_on_Warped_Example_Faces.pdf 2MB
  51. 2008-4/Subspace_Approximation_of_Face_Recognition_Algorithms_An_Empirical_Study.pdf 2MB
  52. 2007-3-1/Statistical_Models_for_Assessing_the_Individuality_of_Fingerprints.pdf 2MB
  53. 2006-2/An_Algorithm_for_Distorted_Fingerprint_Matching_Based_on_Local_Triangle_Feature_.pdf 2MB
  54. 2008-4/Toward_Compression_of_Encrypted_Images_and_Video_Sequences.pdf 2MB
  55. 2009-4-2/Self-Verifying_Visual_Secret_Sharing_Using_Error_Diffusion_and_Interpolation_Tec.pdf 2MB
  56. 2009-4-2/Securing_Rating_Aggregation_Systems_Using_Statistical_Detectors_and_Trust.pdf 2MB
  57. 2009-4-2/Robust_Orientation_Field_Estimation_and_Extrapolation_Using_Semilocal_Line_Senso.pdf 2MB
  58. 2009-1/Robust_Blind_Watermarking_of_Point-Sampled_Geometry.pdf 2MB
  59. 2007-3-1/Reversible_Image_Watermarking_Based_on_Integer-to-Integer_Wavelet_Transform.pdf 2MB
  60. 2006-2/EyeCerts.pdf 2MB
  61. 2007-4/Shape-Driven_Gabor_Jets_for_Face_Description_and_Authentication.pdf 2MB
  62. 2008-2/Evaluation_of_Localization_Attacks_on_Power-Modulated_Challenge–Response_Syste.pdf 2MB
  63. 2006-4/Multilevel_2-D_Bar_Codes_Toward_High-Capacity_Storage_Modules_for_Multimedia_Sec.pdf 2MB
  64. 2009-4-2/Benchmarking_Quality-Dependent_and_Cost-Sensitive_Score-Level_Multimodal_Biometr.pdf 2MB
  65. 2009-2/Unseen_Visible_Watermarking_A_Novel_Methodology_for_Auxiliary_Information_Delive.pdf 2MB
  66. 2006-2/Performance_Analysis_of_Iris-Based_Identification_System_at_the_Matching_Score_.pdf 2MB
  67. 2007-3-2/Class-Specific_Kernel-Discriminant_Analysis_for_Face_Verification.pdf 2MB
  68. 2009-4-2/Joint_Watermarking_Scheme_for_Multiparty_Multilevel_DRM_Architecture.pdf 2MB
  69. 2008-1/Digital_Image_Forensics_via_Intrinsic_Fingerprints.pdf 2MB
  70. 2007-3-1/Exposing_Digital_Forgeries_in_Interlaced_and_Deinterlaced_Video.pdf 2MB
  71. 2008-3/A_Video_Watermarking_Scheme_Based_on_the_Dual-Tree_Complex_Wavelet_Transform.pdf 2MB
  72. 2008-4/Fingerprint-Quality_Index_Using_Gradient_Components.pdf 2MB
  73. 2007-4/Fingerprint-Based_Fuzzy_Vault_Implementation_and_Performance.pdf 2MB
  74. 2009-3/MPSteg-Color_Data_Hiding_Through_Redundant_Basis_Decomposition.pdf 2MB
  75. 2007-3-1/Lossless_Data_Embedding_With_High_Embedding_Capacity_Based_on_Declustering_for_V.pdf 2MB
  76. 2006-4/Fingerprint_Retrieval_for_Identification.pdf 2MB
  77. 2008-3/Bilinear_Models_for_3-D_Face_and_Facial_Expression_Recognition.pdf 2MB
  78. 2006-2/Robust_and_Secure_Image_Hashing.pdf 2MB
  79. 2009-3/Fast_Haar_Transform_Based_Feature_Extraction_for_Face_Representation_and_Recogni.pdf 2MB
  80. 2008-4/Chaotic-Type_Features_for_Speech_Steganalysis.pdf 2MB
  81. 2007-4/Horizontal_and_Vertical_2DPCA-Based_Discriminant_Analysis_for_Face_Verification.pdf 2MB
  82. 2008-2/Correspondence.pdf 2MB
  83. 2008-1/Classification_and_Feature_Extraction_by_Simplexization.pdf 2MB
  84. 2007-4/Collusion-Resistant_Video_Fingerprinting_for_Large_User_Group.pdf 2MB
  85. 2006-1/Watermarking_Relying_on_Cover_Signal_Content_to_Hide_Synchronization_Marks.pdf 2MB
  86. 2007-3-2/Palmprint_Classification_Using_Multiple_Advanced_Correlation_Filters_and_Palm-S.pdf 2MB
  87. 2008-2/Learning_the_Uncorrelated_Independent_and_Discriminating_Color_Spaces_for_Face_R.pdf 2MB
  88. 2007-3-1/Exposing_Digital_Forgeries_in_Complex_Lighting_Environments.pdf 2MB
  89. 2006-3/Dual_Protection_of_JPEG_Images_Based_on_Informed_Embedding_and_Two-Stage_Waterma.pdf 2MB
  90. 2008-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Watermarked-Only_Attack.pdf 2MB
  91. 2009-4-1/Security_in_Large-Scale_Internet_Elections_A_Retrospective_Analysis_of_Elections.pdf 2MB
  92. 2009-4-2/Behavior_Forensics_With_Side_Information_for_Multimedia_Fingerprinting_Social_Ne.pdf 2MB
  93. 2007-3-2/An_Evaluation_of_Image_Sampling_and_Compression_for_Human_Iris_Recognition.pdf 1MB
  94. 2008-3/Digital_Single_Lens_Reflex_Camera_Identification_From_Traces_of_Sensor_Dust.pdf 1MB
  95. 2009-4-2/Pairwise_Boosted_Audio_Fingerprint.pdf 1MB
  96. 2008-1/Color_Image_Watermarking_Using_Multidimensional_Fourier_Transforms.pdf 1MB
  97. 2006-4/Traitor-Within-Traitor_Behavior_Forensics_Strategy_and_Risk_Minimization.pdf 1MB
  98. 2008-2/Fusion_of_Matching_Algorithms_for_Human_Identification_Using_Dental_X-Ray_Radio.pdf 1MB
  99. 2007-4/Decode-Time_Forensic_Watermarking_of_AAC_Bitstreams.pdf 1MB
  100. 2009-3/Temporal_Derivative-Based_Spectrum_and_Mel-Cepstrum_Audio_Steganalysis.pdf 1MB
  101. 2009-2/Watermarking_Robustness_Evaluation_Based_on_Perceptual_Quality_via_Genetic_Algor.pdf 1MB
  102. 2009-3/Intrinsic_Sensor_Noise_Features_for_Forensic_Analysis_on_Scanners_and_Scanned_Im.pdf 1MB
  103. 2006-1/Steganalysis_Using_Higher-Order_Image_Statistics.pdf 1MB
  104. 2007-4/Detecting_Spoofing_and_Anomalous_Traffic_in_Wireless_Networks_via_Forge-Resist.pdf 1MB
  105. 2007-3-2/Components_and_Their_Topology_for_Robust_Face_Detection_in_the_Presence_of_Parti.pdf 1MB
  106. 2009-4-2/Parallelizing_Iris_Recognition.pdf 1MB
  107. 2009-3/Low-Complexity_Iris_Coding_and_Recognition_Based_on_Directionlets.pdf 1MB
  108. 2008-3/A_Selective_Feature_Information_Approach_for_Iris_Image-Quality_Measure.pdf 1MB
  109. 2008-3/Adaptive_Data_Hiding_in_Edge_Areas_of_Images_With_Spatial_LSB_Domain_Systems.pdf 1MB
  110. 2008-2/Sensor_Data_Cryptography_in_Wireless_Sensor_Networks.pdf 1MB
  111. 2006-2/Steganalysis_for_Markov_Cover_Data_With_Applications_to_Images.pdf 1MB
  112. 2007-3-1/Channel_Identification_Secret_Sharing_Using_Reciprocity_in_Ultrawideband_Channe.pdf 1MB
  113. 2009-4-2/Accurate_Detection_of_Demosaicing_Regularity_for_Digital_Image_Forensics.pdf 1MB
  114. 2009-3/Robust_MC-CDMA-Based_Fingerprinting_Against_Time-Varying_Collusion_Attacks.pdf 1MB
  115. 2006-1/Approximate_Message_Authentication_Codes_for_N_-ary_Alphabets.pdf 1MB
  116. 2008-3/A_Novel_Difference_Expansion_Transform_for_Reversible_Data_Embedding.pdf 1MB
  117. 2008-4/Multiclass_Detector_of_Current_Steganographic_Methods_for_JPEG_Format.pdf 1MB
  118. 2007-2/Tracing_Malicious_Relays_in_Cooperative_Wireless_Communications.pdf 1MB
  119. 2009-3/A_Sensing_Seat_for_Human_Authentication.pdf 1MB
  120. 2006-4/Digital_Video_Steganalysis_Exploiting_Statistical_Visibility_in_the_Temporal_Dom.pdf 1MB
  121. 2009-1/Exposing_Digital_Forgeries_from_JPEG_Ghosts.pdf 1MB
  122. 2009-4-1/Guest_Editorial_Special_Issue_on_Electronic_Voting.pdf 1MB
  123. 2006-3/Face_Identification_Using_Novel_Frequency-Domain_Representation_of_Facial_Asymm.pdf 1MB
  124. 2009-4-1/Scantegrity_II_End-to-End_Verifiability_by_Voters_of_Optical_Scan_Elections_Thr.pdf 1MB
  125. 2009-4-1/State-Wide_Elections_Optical_Scan_Voting_Systems_and_the_Pursuit_of_Integrity.pdf 1MB
  126. 2008-3/Blind_Identification_of_Source_Cell-Phone_Model.pdf 1MB
  127. 2008-2/Secure_Cooperation_in_Autonomous_Mobile_Ad-Hoc_Networks_Under_Noise_and_Imperfec.pdf 1MB
  128. 2007-1/Nonintrusive_Component_Forensics_of_Visual_Sensors_Using_Output_Images.pdf 1MB
  129. 2009-1/Spread-Spectrum_Watermarking_Security.pdf 1MB
  130. 2008-2/Insertion_Deletion_Codes_With_Feature-Based_Embedding_A_New_Paradigm_for_Waterma.pdf 1MB
  131. 2007-3-1/Watermarking_Protocol_for_Web_Context.pdf 1MB
  132. 2006-2/Digital_Camera_Identification_From_Sensor_Pattern_Noise.pdf 1MB
  133. 2006-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Known_Message_Attack.pdf 1MB
  134. 2009-3/Channel-Based_Detection_of_Sybil_Attacks_in_Wireless_Networks.pdf 1MB
  135. 2007-3-2/3-D_Face_Recognition_Using_Local_Appearance-Based_Models.pdf 1MB
  136. 2008-4/Using_One-Class_SVMs_and_Wavelets_for_Audio_Surveillance.pdf 1MB
  137. 2008-4/Regression_From_Uncertain_Labels_and_Its_Applications_to_Soft_Biometrics.pdf 1022KB
  138. 2009-4-2/Multibiometric_Cryptosystem_Model_Structure_and_Performance_Analysis.pdf 1017KB
  139. 2009-2/Wireless_Secrecy_in_Cellular_Systems_With_Infrastructure-Aided_Cooperation.pdf 1009KB
  140. 2008-4/Theoretical_and_Practical_Boundaries_of_Binary_Secure_Sketches.pdf 1007KB
  141. 2009-3/A_Channel_Coding_Approach_for_Human_Authentication_From_Gait_Sequences.pdf 1004KB
  142. 2008-2/Quantization-Based_Data_Hiding_Robust_to_Linear-Time-Invariant_Filtering.pdf 997KB
  143. 2007-2/Analysis_and_Protection_of_Dynamic_Membership_Information_for_Group_Key_Distribu.pdf 981KB
  144. 2007-2/Noniterative_Algorithms_for_Sensitivity_Analysis_Attacks.pdf 972KB
  145. 2008-4/Use_of_Identification_Trial_Statistics_for_the_Combination_of_Biometric_Matcher.pdf 968KB
  146. 2006-3/Behavior_Forensics_for_Scalable_Multiuser_Collusion_Fairness_Versus_Effectivenes.pdf 965KB
  147. 2008-3/Distributed_Detection_of_Information_Flows.pdf 955KB
  148. 2008-3/A_Multimodal_Approach_for_Face_Modeling_and_Recognition.pdf 954KB
  149. 2008-1/An_FPGA-Based_Network_Intrusion_Detection_Architecture.pdf 927KB
  150. 2007-2/Correspondence.pdf 923KB
  151. 2007-3-1/Multimodal_Wireless_Networks_Communication_and_Surveillance_on_the_Same_Infrastr.pdf 912KB
  152. 2007-1/Statistically_Robust_Detection_of_Multiplicative_Spread-Spectrum_Watermarks.pdf 902KB
  153. 2007-4/Application_of_Projective_Invariants_in_Hand_Geometry_Biometrics.pdf 890KB
  154. 2009-4-2/Biometric_Systems_Privacy_and_Secrecy_Aspects.pdf 888KB
  155. 2009-1/Coding_Schemes_for_Relay-Assisted_Information_Embedding.pdf 887KB
  156. 2008-2/A_Fast_Search_Algorithm_for_a_Large_Fuzzy_Database.pdf 884KB
  157. 2009-2/A_Hypothesis_Testing_Approach_to_Semifragile_Watermark-Based_Authentication.pdf 876KB
  158. 2007-2/Performance_Analysis_of_Robust_Audio_Hashing.pdf 874KB
  159. 2006-3/Block_QIM_Watermarking_Games.pdf 869KB
  160. 2009-3/Adversary_Aware_Surveillance_Systems.pdf 859KB
  161. 2008-1/New_Additive_Watermark_Detectors_Based_On_A_Hierarchical_Spatially_Adaptive_Imag.pdf 855KB
  162. 2007-3-2/Face_Verification_Using_Template_Matching.pdf 849KB
  163. 2007-3-2/Multiscale_Representation_for_3-D_Face_Recognition.pdf 846KB
  164. 2007-1/A_Parameter-Free_Framework_for_General_Supervised_Subspace_Learning.pdf 843KB
  165. 2008-3/Digital_Video_Watermarking_in_P-Frames_With_Controlled_Video_Bit-Rate_Increase.pdf 841KB
  166. 2008-2/Mutual_Information_Jammer-Relay_Games.pdf 840KB
  167. 2007-2/A_Constructive_and_Unifying_Framework_for_Zero-Bit_Watermarking.pdf 839KB
  168. 2008-2/Secure_Interdomain_Routing_Registry.pdf 838KB
  169. 2009-4-2/Quantum_Hashing_for_Multimedia.pdf 831KB
  170. 2006-2/Reducing_Delay_and_Enhancing_DoS_Resistance_in_Multicast_Authentication_Through_.pdf 831KB
  171. 2006-1/A_Markov_Chain_Monte_Carlo_Algorithm_for_Bayesian_Dynamic_Signature_Verificatio.pdf 825KB
  172. 2009-3/An_Information-Theoretic_View_of_Network-Aware_Malware_Attacks.pdf 824KB
  173. 2007-2/Securing_Cooperative_Ad-Hoc_Networks_Under_Noise_and_Imperfect_Monitoring_Strate.pdf 820KB
  174. 2009-3/Mathematical_Model_for_Low-Rate_DoS_Attacks_Against_Application_Servers.pdf 818KB
  175. 2009-1/SMOCK_A_Scalable_Method_of_Cryptographic_Key_Management_for_Mission-Critical_Wir.pdf 812KB
  176. 2007-4/Noise_Reduction_in_Side_Channel_Attack_Using_Fourth-Order_Cumulant.pdf 810KB
  177. 2009-3/Steganalysis_of_YASS.pdf 806KB
  178. 2006-3/Gray_Hausdorff_Distance_Measure_for_Comparing_Face_Images.pdf 805KB
  179. 2006-1/Personal_Authentication_Using_3-D_Finger_Geometry.pdf 805KB
  180. 2009-1/Fingerprinting_With_Minimum_Distance_Decoding.pdf 790KB
  181. 2007-2/Hand-Geometry_Recognition_Using_Entropy-Based_Discretization.pdf 784KB
  182. 2006-1/A_Clustering_Based_Approach_to_Perceptual_Image_Hashing.pdf 780KB
  183. 2009-3/On_Estimation_Accuracy_of_Desynchronization_Attack_Channel_Parameters.pdf 776KB
  184. 2007-3-1/Warping-Based_Offline_Signature_Recognition.pdf 753KB
  185. 2006-1/Automatic_Facial_Expression_Recognition_Using_Facial_Animation_Parameters_and_Mu.pdf 746KB
  186. 2007-4/A_Robust_Fingerprint_Indexing_Scheme_Using_Minutia_Neighborhood_Structure_and_Lo.pdf 744KB
  187. 2008-4/Multipurpose_Watermarking_Based_on_Multiscale_Curvelet_Transform.pdf 733KB
  188. 2008-4/Steganalysis_Frameworks_of_Embedding_in_Multiple_Least-Significant_Bits.pdf 729KB
  189. 2006-1/Wet_Paper_Codes_With_Improved_Embedding_Efficiency.pdf 728KB
  190. 2007-2/Defense_Against_Injecting_Traffic_Attacks_in_Wireless_Mobile_Ad-Hoc_Networks.pdf 724KB
  191. 2009-4-1/Detecting_Code_Alteration_by_Creating_a_Temporary_Memory_Bottleneck.pdf 712KB
  192. 2008-3/Robust_Detection_of_MAC_Layer_Denial-of-Service_Attacks_in_CSMACA_Wireless_Netwo.pdf 704KB
  193. 2007-3-2/Correspondence.pdf 702KB
  194. 2009-1/Hyperbolic_RDM_for_Nonlinear_Valumetric_Distortions.pdf 702KB
  195. 2008-1/Physical-Layer_Authentication.pdf 694KB
  196. 2007-3-2/Protecting_Biometric_Templates_With_Sketch_Theory_and_Practice.pdf 684KB
  197. 2009-1/Detection_of_Motion-Incoherent_Components_in_Video_Streams.pdf 664KB
  198. 2007-3-2/A_Novel_Discriminant_Non-Negative_Matrix_Factorization_Algorithm_With_Applicatio.pdf 658KB
  199. 2007-1/A_Framework_for_Robust_Watermarking_of_H.264-Encoded_Video_With_Controllable_Det.pdf 654KB
  200. 2007-3-1/Double-Sided_Watermark_Embedding_and_Detection.pdf 635KB
  201. 2007-3-1/A_Memetic_Fingerprint_Matching_Algorithm.pdf 625KB
  202. 2008-3/Lookup-Table-Based_Secure_Client-Side_Embedding_for_Spread-Spectrum_Watermarks.pdf 623KB
  203. 2008-2/On_the_Distinguishability_of_Distance-Bounded_Permutations_in_Ordered_Channels.pdf 619KB
  204. 2008-2/Detection_of_Double-Compression_in_JPEG_Images_for_Applications_in_Steganography.pdf 617KB
  205. 2006-3/Estimation_of_Message_Source_and_Destination_From_Network_Intercepts.pdf 614KB
  206. 2009-1/On_the_Implementation_of_the_Discrete_Fourier_Transform_in_the_Encrypted_Domain.pdf 613KB
  207. 2008-1/Kerckhoffs-Based_Embedding_Security_Classes_for_WOA_Data_Hiding.pdf 609KB
  208. 2008-3/Projecting_Cyberattacks_Through_Variable-Length_Markov_Models.pdf 608KB
  209. 2009-4-1/Prêt_à_Voter_a_Voter-Verifiable_Voting_System.pdf 605KB
  210. 2009-4-2/Noninteractive_Self-Certification_for_Long-Lived_Mobile_Ad_Hoc_Networks.pdf 590KB
  211. 2009-3/On_Reliability_and_Security_of_Randomized_Detectors_Against_Sensitivity_Analysis.pdf 584KB
  212. 2009-3/Fast_Algorithm_for_Updating_the_Discriminant_Vectors_of_Dual-Space_LDA.pdf 576KB
  213. 2009-4-2/Provably_Secure_Remote_Truly_Three-Factor_Authentication_Scheme_With_Privacy_Pro.pdf 574KB
  214. 2007-2/Optical_Watermarking_for_Printed_Document_Authentication.pdf 573KB
  215. 2007-3-1/Reversible_Data-Hiding_Scheme_for_2-D_Vector_Maps_Based_on_Difference_Expansion.pdf 567KB
  216. 2009-4-1/Development_Formal_Verification_and_Evaluation_of_an_E-Voting_System_With_VVPAT.pdf 565KB
  217. 2008-4/Correspondence.pdf 562KB
  218. 2009-3/Regular_Simplex_Fingerprints_and_Their_Optimality_Properties.pdf 557KB
  219. 2008-3/Network_Security_for_Client-Server_Architecture_Using_Wiretap_Codes.pdf 554KB
  220. 2007-1/Optimized_Feature_Extraction_for_Learning-Based_Image_Steganalysis.pdf 552KB
  221. 2007-2/Derivation_of_Error_Distribution_in_Least_Squares_Steganalysis.pdf 551KB
  222. 2008-3/Correspondence.pdf 541KB
  223. 2009-4-1/TPM_Meets_DRE_Reducing_the_Trust_Base_for_Electronic_Voting_Using_Trusted_Platfo.pdf 535KB
  224. 2009-4-1/The_Effectiveness_of_Receipt-Based_Attacks_on_ThreeBallot.pdf 532KB
  225. 2008-2/Template-Free_Biometric-Key_Generation_by_Means_of_Fuzzy_Genetic_Clustering.pdf 531KB
  226. 2009-4-2/High-Rate_Random-Like_Spherical_Fingerprinting_Codes_With_Linear_Decoding_Comple.pdf 526KB
  227. 2008-3/A_Network_Coding_Approach_to_Secret_Key_Distribution.pdf 509KB
  228. 2007-1/A_New_Steganographic_Method_for_Data_Hiding_in_Microsoft_Word_Documents_by_a_Cha.pdf 504KB
  229. 2008-3/Graphical_Inference_for_Multiple_Intrusion_Detection.pdf 478KB
  230. 2006-1/Analysis_and_Design_of_Secure_Watermark-Based_Authentication_Systems.pdf 477KB
  231. 2007-3-1/Unicity_Distance_of_Robust_Image_Hashing.pdf 474KB
  232. 2009-4-1/Shuffle-Sum_Coercion-Resistant_Verifiable_Tallying_for_STV_Voting.pdf 464KB
  233. 2006-4/The_CRC–NTMAC_for_Noisy_Message_Authentication.pdf 448KB
  234. 2009-3/Performance_of_Orthogonal_Fingerprinting_Codes_Under_Worst-Case_Noise.pdf 434KB
  235. 2008-3/Data_Fusion_and_Cost_Minimization_for_Intrusion_Detection.pdf 428KB
  236. 2007-3-2/Biometric_Identification_Based_on_Frequency_Analysis_of_Cardiac_Sounds.pdf 426KB
  237. 2006-4/Gaussian_Mixture_Modeling_of_Short-Time_Fourier_Transform_Features_for_Audio_Fin.pdf 422KB
  238. 2009-4-1/Voting_With_Unconditional_Privacy_by_Merging_Prêt_à_Voter_and_PunchScan.pdf 412KB
  239. 2009-2/A_Game_Theoretical_Framework_on_Intrusion_Detection_in_Heterogeneous_Networks.pdf 399KB
  240. 2009-4-2/A_Study_on_the_Randomness_Measure_of_Image_Hashing.pdf 394KB
  241. 2009-3/Improvement_in_Intrusion_Detection_With_Advances_in_Sensor_Fusion.pdf 391KB
  242. 2007-1/Steganalysis_of_Embedding_in_Two_Least-Significant_Bits.pdf 378KB
  243. 2009-2/A_Graph_Approach_to_Quantitative_Analysis_of_Control-Flow_Obfuscating_Transforma.pdf 373KB
  244. 2009-4-2/Risk-Limiting_Postelection_Audits_Conservative_P_-Values_From_Common_Probability.pdf 349KB
  245. 2007-2/Using_Support_Vector_Machines_to_Enhance_the_Performance_of_Bayesian_Face_Recogn.pdf 348KB
  246. 2009-2/A_Parametric_Correlation_Framework_for_the_Statistical_Evaluation_and_Estimation.pdf 345KB
  247. 2006-1/An_Accurate_Analysis_of_Scalar_Quantization-Based_Data_Hiding.pdf 340KB
  248. 2009-4-1/CAST_Canvass_Audits_by_Sampling_and_Testing.pdf 333KB
  249. 2006-4/On_Fundamental_Limitations_of_Proving_Data_Theft.pdf 305KB
  250. 2006-3/Matrix_Embedding_for_Large_Payloads.pdf 301KB
  251. 2009-3/Performance_Analysis_of_Fridrich–Goljan_Self-Embedding_Authentication_Method.pdf 295KB
  252. 2006-1/The_NTMAC_for_Authentication_of_Noisy_Messages.pdf 254KB
  253. 2006-2/The_Boneh–Shaw_Fingerprinting_Scheme_is_Better_Than_We_Thought.pdf 235KB
  254. 2009-4-2/Election_Audits_Using_a_Trinomial_Bound.pdf 235KB
  255. 2008-3/Special_Section_Correspondence.pdf 211KB
  256. 2008-4/Cryptographic_Secrecy_of_Steganographic_Matrix_Embedding.pdf 199KB
  257. 2009-3/Correspondence.pdf 189KB
  258. 2006-3/Correspondence.pdf 177KB
  259. 2008-3/On_the_Assumptions_of_Equal_Contributions_in_Fingerprinting.pdf 174KB
  260. 2006-3/Graphical_Passwords_Based_on_Robust_Discretization.pdf 159KB
  261. 2009-1/Editorial.pdf 154KB
  262. 2009-1/Correspondence.pdf 152KB
  263. 2006-1/Editorial_Introducing_T-IFS.pdf 141KB
  264. 2009-4-1/Enhancing_Electronic_Voting_Machines_on_the_Example_of_Bingo_Voting.pdf 124KB
  265. 2008-4/A_Buyer–Seller_Watermarking_Protocol_Based_on_Secure_Embedding.pdf 103KB
  266. 2007-4/Correction.pdf 35KB
  267. 2007-3-2/Guest_Editorial_Special_Issue_on_Human_Detection_and_Recognition.pdf 33KB
  268. 2008-3/Guest_Editorial_Special_Section_on_Statistical_Methods_for_Network_Security_and_.pdf 25KB
  269. 2009-4-2/Free_Electronic_Access_to_SP_Publications.pdf 21KB
  270. filelist 20KB
  271. myriad.NFO 2KB