Sciweavers

TIFS
2016
75views more  TIFS 2016»
8 years 8 months ago
Detectability of the Order of Operations: An Information Theoretic Approach
Abstract—As it is more and more convenient to manipulate multimedia content, the authenticity of multimedia content becomes questionable. While there are many forensic techniques...
Xiaoyu Chu, Yan Chen, K. J. Ray Liu
TIFS
2016
66views more  TIFS 2016»
8 years 8 months ago
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
—Spectrum security and enforcement is one of the major challenges that need to be addressed before spectrum sharing technologies can be adopted widely. The problem of rogue trans...
Vireshwar Kumar, Jung-Min "Jerry" Park, Kaigui Bia...
TIFS
2016
76views more  TIFS 2016»
8 years 8 months ago
Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
—This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In ...
Yansha Deng, Lifeng Wang, Maged Elkashlan, Arumuga...
TIFS
2016
72views more  TIFS 2016»
8 years 8 months ago
Information Theory and the IrisCode
—Iris recognition has legendary resistance to False Matches, and the tools of information theory can help to explain why. The concept of entropy is fundamental to understanding b...
John Daugman
TIFS
2016
76views more  TIFS 2016»
8 years 8 months ago
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
—Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired...
Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian ...
TIFS
2016
58views more  TIFS 2016»
8 years 8 months ago
Content-Adaptive Steganography by Minimizing Statistical Detectability
Abstract—Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using ...
Vahid Sedighi, Rémi Cogranne, Jessica J. Fr...
TIFS
2016
70views more  TIFS 2016»
8 years 8 months ago
Game Theory and Adaptive Steganography
—According to conventional wisdom, content-adaptive embedding offers more steganographic security than random uniform embedding. We scrutinize this view and note that it is barel...
Pascal Schöttle, Rainer Böhme
TIFS
2016
75views more  TIFS 2016»
8 years 8 months ago
What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics
—Recent research has explored the possibility of extracting ancillary information from primary biometric traits, viz., face, fingerprints, hand geometry and iris. This ancillary...
Antitza Dantcheva, Petros Elia, Arun Ross
TIFS
2016
246views more  TIFS 2016»
8 years 8 months ago
Fast Detection of Transformed Data Leaks
—The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications...
Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-...
TIFS
2016
67views more  TIFS 2016»
8 years 8 months ago
Information Theoretical Limit of Media Forensics: The Forensicability
—While more and more forensic techniques have been proposed to detect the processing history of multimedia content, one starts to wonder if there exists a fundamental limit on th...
Xiaoyu Chu, Yan Chen, Matthew C. Stamm, K. J. Ray ...