Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

Improved 3D Lighting Environment Estimation for Image Forgery Detection

Paper Details

Authors:
Bo Peng
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Peng.pdf

(364 downloads)

Keywords

Subscribe

[1] Bo Peng, "Improved 3D Lighting Environment Estimation for Image Forgery Detection", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/590. Accessed: Dec. 17, 2017.
@article{590-16,
url = {http://sigport.org/590},
author = {Bo Peng },
publisher = {IEEE SigPort},
title = {Improved 3D Lighting Environment Estimation for Image Forgery Detection},
year = {2016} }
TY - EJOUR
T1 - Improved 3D Lighting Environment Estimation for Image Forgery Detection
AU - Bo Peng
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/590
ER -
Bo Peng. (2016). Improved 3D Lighting Environment Estimation for Image Forgery Detection. IEEE SigPort. http://sigport.org/590
Bo Peng, 2016. Improved 3D Lighting Environment Estimation for Image Forgery Detection. Available at: http://sigport.org/590.
Bo Peng. (2016). "Improved 3D Lighting Environment Estimation for Image Forgery Detection." Web.
1. Bo Peng. Improved 3D Lighting Environment Estimation for Image Forgery Detection [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/590

Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach

Paper Details

Authors:
Ta-Yuan Liu
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Liu.pdf

(328 downloads)

Keywords

Subscribe

[1] Ta-Yuan Liu, "Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/589. Accessed: Dec. 17, 2017.
@article{589-16,
url = {http://sigport.org/589},
author = {Ta-Yuan Liu },
publisher = {IEEE SigPort},
title = {Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach},
year = {2016} }
TY - EJOUR
T1 - Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach
AU - Ta-Yuan Liu
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/589
ER -
Ta-Yuan Liu. (2016). Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach. IEEE SigPort. http://sigport.org/589
Ta-Yuan Liu, 2016. Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach. Available at: http://sigport.org/589.
Ta-Yuan Liu. (2016). "Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach." Web.
1. Ta-Yuan Liu. Multicasting with Untrusted Relays: A Noncoherent Secure Network Coding Approach [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/589

Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics

Paper Details

Authors:
Julian Fierrez
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Krish.pdf

(293 downloads)

Keywords

Subscribe

[1] Julian Fierrez, "Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/588. Accessed: Dec. 17, 2017.
@article{588-16,
url = {http://sigport.org/588},
author = {Julian Fierrez },
publisher = {IEEE SigPort},
title = {Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics},
year = {2016} }
TY - EJOUR
T1 - Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics
AU - Julian Fierrez
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/588
ER -
Julian Fierrez. (2016). Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics. IEEE SigPort. http://sigport.org/588
Julian Fierrez, 2016. Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics. Available at: http://sigport.org/588.
Julian Fierrez. (2016). "Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics." Web.
1. Julian Fierrez. Integrating Rare Minutiae in Generic Fingerprint Matchers for Forensics [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/588

Automatic Contrast Enhancement Using Reversible Data Hiding

Paper Details

Authors:
Suah Kim
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Kim.pdf

(274 downloads)

Keywords

Subscribe

[1] Suah Kim, "Automatic Contrast Enhancement Using Reversible Data Hiding", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/587. Accessed: Dec. 17, 2017.
@article{587-16,
url = {http://sigport.org/587},
author = {Suah Kim },
publisher = {IEEE SigPort},
title = {Automatic Contrast Enhancement Using Reversible Data Hiding},
year = {2016} }
TY - EJOUR
T1 - Automatic Contrast Enhancement Using Reversible Data Hiding
AU - Suah Kim
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/587
ER -
Suah Kim. (2016). Automatic Contrast Enhancement Using Reversible Data Hiding. IEEE SigPort. http://sigport.org/587
Suah Kim, 2016. Automatic Contrast Enhancement Using Reversible Data Hiding. Available at: http://sigport.org/587.
Suah Kim. (2016). "Automatic Contrast Enhancement Using Reversible Data Hiding." Web.
1. Suah Kim. Automatic Contrast Enhancement Using Reversible Data Hiding [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/587

The Influence of Segmentation on Individual Gait Recognition

Paper Details

Authors:
Ning Jia
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Jia.pdf

(252 downloads)

Keywords

Subscribe

[1] Ning Jia, "The Influence of Segmentation on Individual Gait Recognition", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/586. Accessed: Dec. 17, 2017.
@article{586-16,
url = {http://sigport.org/586},
author = {Ning Jia },
publisher = {IEEE SigPort},
title = {The Influence of Segmentation on Individual Gait Recognition},
year = {2016} }
TY - EJOUR
T1 - The Influence of Segmentation on Individual Gait Recognition
AU - Ning Jia
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/586
ER -
Ning Jia. (2016). The Influence of Segmentation on Individual Gait Recognition. IEEE SigPort. http://sigport.org/586
Ning Jia, 2016. The Influence of Segmentation on Individual Gait Recognition. Available at: http://sigport.org/586.
Ning Jia. (2016). "The Influence of Segmentation on Individual Gait Recognition." Web.
1. Ning Jia. The Influence of Segmentation on Individual Gait Recognition [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/586

Image Splicing Detection Based on General Perspective Constraints

Paper Details

Authors:
Alessandro Piva
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Iuliani.pdf

(268 downloads)

Keywords

Subscribe

[1] Alessandro Piva, "Image Splicing Detection Based on General Perspective Constraints", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/585. Accessed: Dec. 17, 2017.
@article{585-16,
url = {http://sigport.org/585},
author = {Alessandro Piva },
publisher = {IEEE SigPort},
title = {Image Splicing Detection Based on General Perspective Constraints},
year = {2016} }
TY - EJOUR
T1 - Image Splicing Detection Based on General Perspective Constraints
AU - Alessandro Piva
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/585
ER -
Alessandro Piva. (2016). Image Splicing Detection Based on General Perspective Constraints. IEEE SigPort. http://sigport.org/585
Alessandro Piva, 2016. Image Splicing Detection Based on General Perspective Constraints. Available at: http://sigport.org/585.
Alessandro Piva. (2016). "Image Splicing Detection Based on General Perspective Constraints." Web.
1. Alessandro Piva. Image Splicing Detection Based on General Perspective Constraints [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/585

Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS

Paper Details

Authors:
Shuichiro Haruta
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Haruta.pdf

(264 downloads)

Keywords

Subscribe

[1] Shuichiro Haruta, "Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/584. Accessed: Dec. 17, 2017.
@article{584-16,
url = {http://sigport.org/584},
author = {Shuichiro Haruta },
publisher = {IEEE SigPort},
title = {Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS},
year = {2016} }
TY - EJOUR
T1 - Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS
AU - Shuichiro Haruta
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/584
ER -
Shuichiro Haruta. (2016). Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS. IEEE SigPort. http://sigport.org/584
Shuichiro Haruta, 2016. Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS. Available at: http://sigport.org/584.
Shuichiro Haruta. (2016). "Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS." Web.
1. Shuichiro Haruta. Trust-based Sybil Node Detection with Robust Seed Selection and Graph Pruning on SNS [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/584

Robust PUF based Authentication

Paper Details

Authors:
Andrea Grigorescu
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Grigorescu.pdf

(278 downloads)

Keywords

Subscribe

[1] Andrea Grigorescu, "Robust PUF based Authentication", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/583. Accessed: Dec. 17, 2017.
@article{583-16,
url = {http://sigport.org/583},
author = {Andrea Grigorescu },
publisher = {IEEE SigPort},
title = {Robust PUF based Authentication},
year = {2016} }
TY - EJOUR
T1 - Robust PUF based Authentication
AU - Andrea Grigorescu
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/583
ER -
Andrea Grigorescu. (2016). Robust PUF based Authentication. IEEE SigPort. http://sigport.org/583
Andrea Grigorescu, 2016. Robust PUF based Authentication. Available at: http://sigport.org/583.
Andrea Grigorescu. (2016). "Robust PUF based Authentication." Web.
1. Andrea Grigorescu. Robust PUF based Authentication [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/583

Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!

Paper Details

Authors:
Marcel Fernandez
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Fernandez.pdf

(289 downloads)

Keywords

Subscribe

[1] Marcel Fernandez, "Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/582. Accessed: Dec. 17, 2017.
@article{582-16,
url = {http://sigport.org/582},
author = {Marcel Fernandez },
publisher = {IEEE SigPort},
title = {Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!},
year = {2016} }
TY - EJOUR
T1 - Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!
AU - Marcel Fernandez
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/582
ER -
Marcel Fernandez. (2016). Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!. IEEE SigPort. http://sigport.org/582
Marcel Fernandez, 2016. Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!. Available at: http://sigport.org/582.
Marcel Fernandez. (2016). "Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?!." Web.
1. Marcel Fernandez. Binary Fingerprinting Codes - Can We Prove that Someone is Guilty?! [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/582

Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems

Paper Details

Authors:
Sviatoslav Voloshynovskiy
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Farhadzadeh.pdf

(262 downloads)

Keywords

Subscribe

[1] Sviatoslav Voloshynovskiy, "Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/581. Accessed: Dec. 17, 2017.
@article{581-16,
url = {http://sigport.org/581},
author = {Sviatoslav Voloshynovskiy },
publisher = {IEEE SigPort},
title = {Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems},
year = {2016} }
TY - EJOUR
T1 - Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems
AU - Sviatoslav Voloshynovskiy
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/581
ER -
Sviatoslav Voloshynovskiy. (2016). Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems. IEEE SigPort. http://sigport.org/581
Sviatoslav Voloshynovskiy, 2016. Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems. Available at: http://sigport.org/581.
Sviatoslav Voloshynovskiy. (2016). "Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems." Web.
1. Sviatoslav Voloshynovskiy. Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/581

Pages