Sciweavers

TIFS
2010
143views more  TIFS 2010»
13 years 6 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
TIFS
2010
171views more  TIFS 2010»
13 years 6 months ago
A method for automatic identification of signatures of steganography software
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee
TIFS
2010
307views more  TIFS 2010»
13 years 10 months ago
Face matching and retrieval using soft biometrics
—Soft biometric traits embedded in a face (e.g., gender and facial marks) are ancillary information and are not fully distinctive by themselves in face-recognition tasks. However...
Unsang Park, Anil K. Jain
TIFS
2010
132views more  TIFS 2010»
13 years 10 months ago
JPEG error analysis and its applications to digital image forensics
JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics. In this paper, we int...
Weiqi Luo, Jiwu Huang, Guoping Qiu
TIFS
2010
184views more  TIFS 2010»
13 years 10 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
TIFS
2010
94views more  TIFS 2010»
13 years 10 months ago
Plastic surgery: a new dimension to face recognition
Abstract—Advancement and affordability is leading to popularity of plastic surgery procedures. Facial plastic surgery can be reconstructive to correct facial feature anomalies or...
Richa Singh, Mayank Vatsa, Himanshu S. Bhatt, Sama...
TIFS
2010
186views more  TIFS 2010»
13 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
103views more  TIFS 2010»
13 years 10 months ago
Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution
In multimodal biometric information fusion, it is common to encounter missing modalities in which matching cannot be performed. As a result, at the match score level, this implies...
Norman Poh, David Windridge, Vadim Mottl, Alexande...
TIFS
2010
127views more  TIFS 2010»
13 years 10 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...