IEEE Transactions on Information Forensics and Security

Title Publication Date Language Citations
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks2015/12/019
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption2015/07/019
A Reversible Data Hiding Scheme Based on Code Division Multiplexing2016/09/019
An Evaluation of Popular Copy-Move Forgery Detection Approaches2012/12/019
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery2011/09/019
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption2015/10/018
Multi-Stage Feature Constraints Learning for Age Estimation2020/01/018
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams2017/08/018
Robust Image Hashing With Ring Partition and Invariant Vector Distance2016/01/018
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis2018/08/018
Secure Face Unlock: Spoof Detection on Smartphones2016/10/018
Deep Residual Network for Steganalysis of Digital Images2019/05/018
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform2007/09/018
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes2011/09/018
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures2013/01/018
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework2020/01/018
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems2017/03/018
Face Spoof Detection With Image Distortion Analysis2015/04/018
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection2014/11/018
Biometrics: A Tool for Information Security2006/06/01English8
Reversible Image Watermarking Using Interpolation Technique2010/03/018
Information-Theoretically Secret Key Generation for Fading Wireless Channels2010/06/017
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations2015/01/017
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud2016/06/017
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics2011/06/017
Digital Camera Identification From Sensor Pattern Noise2006/06/01English7
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates2016/06/017
Ensemble Classifiers for Steganalysis of Digital Media2012/04/017
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection2014/12/017
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest2019/10/017