Sciweavers

TIFS
2008
142views more  TIFS 2008»
13 years 11 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
TIFS
2008
123views more  TIFS 2008»
13 years 11 months ago
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
Abstract--Digital single lens reflex cameras suffer from a wellknown sensor dust problem due to interchangeable lenses that they deploy. The dust particles that settle in front of ...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
TIFS
2008
86views more  TIFS 2008»
13 years 11 months ago
Projecting Cyberattacks Through Variable-Length Markov Models
Daniel S. Fava, Stephen R. Byers, S. J. Yang
TIFS
2008
194views more  TIFS 2008»
13 years 11 months ago
Detection of Double-Compression in JPEG Images for Applications in Steganography
This paper presents a method for detection of double JPEG compression and a maximum likelihood estimator of the primary quality factor. These methods are essential for construction...
Tomás Pevný, Jessica J. Fridrich
TIFS
2008
208views more  TIFS 2008»
13 years 11 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
TIFS
2008
154views more  TIFS 2008»
13 years 11 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
TIFS
2008
70views more  TIFS 2008»
13 years 11 months ago
Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering
Fernando Pérez-González, Carlos Mosq...
TIFS
2008
148views more  TIFS 2008»
13 years 11 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
TIFS
2008
123views more  TIFS 2008»
13 years 11 months ago
A Region Ensemble for 3-D Face Recognition
In this paper, we introduce a new system for 3-D face recognition based on the fusion of results from a committee of regions that have been independently matched. Experimental resu...
Timothy C. Faltemier, Kevin W. Bowyer, Patrick J. ...
TIFS
2008
129views more  TIFS 2008»
13 years 11 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo