-
1
-
-
84890463324
-
Coping with the enemy: Advances in adversary-aware signal processing
-
Vancouver, BC, Canada, May
-
M. Barni and F. Pérez-González, "Coping with the enemy: Advances in adversary-aware signal processing," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Vancouver, BC, Canada, May 2013, pp. 8682-8686.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)
, pp. 8682-8686
-
-
Barni, M.1
Pérez-González, F.2
-
2
-
-
85032751542
-
Digital forensics
-
Mar. [From the Guest Editors]
-
E. Delp, N. Memon, and M. Wu, "Digital forensics [From the Guest Editors]," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 14-15, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 14-15
-
-
Delp, E.1
Memon, N.2
Wu, M.3
-
3
-
-
84863702244
-
Biometric template security: Challenges and solutions
-
Sep.
-
A. K. Jain, A. Ross, and U. Uludag, "Biometric template security: Challenges and solutions," in Proc. Eur. Signal Process. Conf. (EUSIPCO), Sep. 2005, pp. 1-4.
-
(2005)
Proc. Eur. Signal Process. Conf. (EUSIPCO)
, pp. 1-4
-
-
Jain, A.K.1
Ross, A.2
Uludag, U.3
-
4
-
-
84884967629
-
Anti-spoofing in action: Joint operation with a verification system
-
Jun.
-
I. Chingovska, A. Anjos, and S. Marcel, "Anti-spoofing in action: Joint operation with a verification system," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW), Jun. 2013, pp. 98-104.
-
(2013)
Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW)
, pp. 98-104
-
-
Chingovska, I.1
Anjos, A.2
Marcel, S.3
-
5
-
-
0004026002
-
-
SanMateo, CA, USA: Morgan Kaufmann
-
I. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. SanMateo, CA, USA: Morgan Kaufmann, 2002.
-
(2002)
Digital Watermarking
-
-
Cox, I.1
Miller, M.L.2
Bloom, J.A.3
-
7
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zürich, Switzerland, Oct.
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," in Proc. Recent Adv. Intrusion Detect. (RAID), Zürich, Switzerland, Oct. 2002, pp. 54-73.
-
(2002)
Proc. Recent Adv. Intrusion Detect. (RAID)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
8
-
-
84873669138
-
The source identification game: An informationtheoretic perspective
-
Mar.
-
M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
9
-
-
84874075921
-
Optimum forensic and counter-forensic strategies for source identification with training data
-
Tenerife, Spain, Dec.
-
M. Barni and B. Tondi, "Optimum forensic and counter-forensic strategies for source identification with training data," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Tenerife, Spain, Dec. 2012, pp. 199-204.
-
(2012)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
, pp. 199-204
-
-
Barni, M.1
Tondi, B.2
-
10
-
-
84904654792
-
Binary hypothesis testing game with training data
-
Aug.
-
M. Barni and B. Tondi, "Binary hypothesis testing game with training data," IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4848-4866, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.8
, pp. 4848-4866
-
-
Barni, M.1
Tondi, B.2
-
13
-
-
0034313871
-
The earth mover's distance as a metric for image retrieval
-
Nov.
-
Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth mover's distance as a metric for image retrieval," Int. J. Comput. Vis., vol. 40, no. 2, pp. 99-121, Nov. 2000.
-
(2000)
Int. J. Comput. Vis.
, vol.40
, Issue.2
, pp. 99-121
-
-
Rubner, Y.1
Tomasi, C.2
Guibas, L.J.3
-
14
-
-
84890475706
-
Optimal counterforensics for histogram-based forensics
-
May
-
P. Comesaña-Alfaro and F. Pérez-González, "Optimal counterforensics for histogram-based forensics," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2013, pp. 3048-3052.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 3048-3052
-
-
Comesaña-Alfaro, P.1
Pérez-González, F.2
-
15
-
-
84905269810
-
The role of permutation coding in minimum-distortion perfect counterforensics
-
Florence, Italy, May
-
F. Balado, "The role of permutation coding in minimum-distortion perfect counterforensics," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Florence, Italy, May 2014, pp. 6240-6244.
-
(2014)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)
, pp. 6240-6244
-
-
Balado, F.1
-
17
-
-
84890506284
-
Permutation codes and steganography
-
Vancouver, BC, Canada, May
-
F. Balado and D. Haughton, "Permutation codes and steganography," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Vancouver, BC, Canada, May 2013, pp. 2954-2958.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)
, pp. 2954-2958
-
-
Balado, F.1
Haughton, D.2
-
18
-
-
84897714672
-
The security margin: A measure of source distinguishability under adversarial conditions
-
Austin, TX, USA, Dec.
-
M. Barni and B. Tondi, "The security margin: A measure of source distinguishability under adversarial conditions," in Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP), Austin, TX, USA, Dec. 2013, pp. 225-228.
-
(2013)
Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP)
, pp. 225-228
-
-
Barni, M.1
Tondi, B.2
-
21
-
-
35148827015
-
Iterated strict dominance in general games
-
Nov.
-
Y. C. Chen, N. Van Long, and X. Luo, "Iterated strict dominance in general games," Games Econ. Behavior, vol. 61, no. 2, pp. 299-315, Nov. 2007.
-
(2007)
Games Econ. Behavior
, vol.61
, Issue.2
, pp. 299-315
-
-
Chen, Y.C.1
Van Long, N.2
Luo, X.3
-
24
-
-
0001662944
-
The Monge-Kantorovich mass transference problem and its stochastic applications
-
S. T. Rachev, "The Monge-Kantorovich mass transference problem and its stochastic applications," Theory Probab. Appl., vol. 29, no. 4, pp. 647-676, 1985.
-
(1985)
Theory Probab. Appl.
, vol.29
, Issue.4
, pp. 647-676
-
-
Rachev, S.T.1
-
25
-
-
0034843832
-
The earth mover's distance is the mallows distance: Some insights from statistics
-
Jul.
-
E. Levina and P. Bickel, "The earth mover's distance is the mallows distance: Some insights from statistics," in Proc. 8th IEEE Int. Conf. Comput. Vis. (ICCV), vol. 2. Jul. 2001, pp. 251-256.
-
(2001)
Proc. 8th IEEE Int. Conf. Comput. Vis. (ICCV)
, vol.2
, pp. 251-256
-
-
Levina, E.1
Bickel, P.2
-
26
-
-
0024627211
-
Asymptotically optimal classification for multiple tests with empirically observed statistics
-
Mar.
-
M. Gutman, "Asymptotically optimal classification for multiple tests with empirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.2
, pp. 401-408
-
-
Gutman, M.1
-
27
-
-
0003686431
-
-
4th ed. New York, NY, USA: MacMillan
-
M. Kendall and S. Stuart, The Advanced Theory of Statistics, vol. 2, 4th ed. New York, NY, USA: MacMillan, 1979.
-
(1979)
The Advanced Theory of Statistics
, vol.2
-
-
Kendall, M.1
Stuart, S.2
-
29
-
-
85163204848
-
The distribution of a product from several sources to numerous localities
-
Apr.
-
F. L. Hitchcock, "The distribution of a product from several sources to numerous localities," J. Math. Phys., vol. 20, nos. 1-4, pp. 224-230, Apr. 1941.
-
(1941)
J. Math. Phys.
, vol.20
, Issue.1-4
, pp. 224-230
-
-
Hitchcock, F.L.1
-
30
-
-
0345725588
-
-
De l'Imprimerie Royale, Paris: Histoire de l'Academie Royale des Sciences
-
G. Monge, Mémoire sur la théorie des Déblais et des Remblais. De l'Imprimerie Royale, Paris: Histoire de l'Academie Royale des Sciences, 1781, pp. 666-704.
-
(1781)
Mémoire sur la Théorie des Déblais et des Remblais
, pp. 666-704
-
-
Monge, G.1
-
31
-
-
0003515463
-
-
Upper Saddle River, NJ, USA: Prentice-Hall
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications. Upper Saddle River, NJ, USA: Prentice-Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
32
-
-
0004139889
-
-
New York, NY, USA: Freeman 1983
-
V. Chvatal, Linear Programming (Series of Books in the Mathematical Sciences), vol. 1. New York, NY, USA: Freeman, 1983, 1983.
-
(1983)
Linear Programming (Series of Books in the Mathematical Sciences)
, vol.1
-
-
Chvatal, V.1
-
33
-
-
0001724641
-
On simple linear programming problems
-
A. Hoffman, "On simple linear programming problems," in Proc. Symp. Pure Math., vol. 7. 1963, pp. 317-327.
-
(1963)
Proc. Symp. Pure Math.
, vol.7
, pp. 317-327
-
-
Hoffman, A.1
-
34
-
-
0001898620
-
Perspectives of Monge properties in optimization
-
Sep.
-
R. E. Burkard, B. Klinz, and R. Rudolf, "Perspectives of Monge properties in optimization," Discrete Appl. Math., vol. 70, no. 2, pp. 95-161, Sep. 1996.
-
(1996)
Discrete Appl. Math.
, vol.70
, Issue.2
, pp. 95-161
-
-
Burkard, R.E.1
Klinz, B.2
Rudolf, R.3
-
35
-
-
0027554501
-
A faster strongly polynomial minimum cost flow algorithm
-
J. B. Orlin, "A faster strongly polynomial minimum cost flow algorithm," Oper. Res., vol. 41, no. 2, pp. 338-350, 1993.
-
(1993)
Oper. Res.
, vol.41
, Issue.2
, pp. 338-350
-
-
Orlin, J.B.1
-
36
-
-
80051802764
-
Optimal histogram representation of large data sets: Fisher vs piecewise linear approximation
-
A. Irpino and E. Romano, "Optimal histogram representation of large data sets: Fisher vs piecewise linear approximation," in Proc. EGC, vol. RNTI-E-9, 2007, pp. 99-110.
-
(2007)
Proc. EGC
, vol.RNTI-E-9
, pp. 99-110
-
-
Irpino, A.1
Romano, E.2
-
37
-
-
0032116117
-
Near-lossless image compression techniques
-
[Online]
-
R. Ansari, N. Memon, and E. Ceran, "Near-lossless image compression techniques," J. Electron. Imag., vol. 7, no. 3, pp. 486-494, 1998. [Online]. Available: http://dx.doi.org/10.1117/1.482591
-
(1998)
J. Electron. Imag.
, vol.7
, Issue.3
, pp. 486-494
-
-
Ansari, R.1
Memon, N.2
Ceran, E.3
-
38
-
-
0019229279
-
Finding structure in Co-occurrence matrices for texture analysis
-
Mar.
-
S. W. Zucker and D. Terzopoulos, "Finding structure in Co-occurrence matrices for texture analysis," Comput. Graph. Image Process., vol. 12, no. 3, pp. 286-308, Mar. 1980.
-
(1980)
Comput. Graph. Image Process.
, vol.12
, Issue.3
, pp. 286-308
-
-
Zucker, S.W.1
Terzopoulos, D.2
-
39
-
-
84255178228
-
Anomaly detection and reconstruction from random projections
-
Jan.
-
J. E. Fowler and Q. Du, "Anomaly detection and reconstruction from random projections," IEEE Trans. Image Process., vol. 21, no. 1, pp. 184-195, Jan. 2012.
-
(2012)
IEEE Trans. Image Process.
, vol.21
, Issue.1
, pp. 184-195
-
-
Fowler, J.E.1
Du, Q.2
-
40
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Mar.
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukás, "Determining image origin and integrity using sensor noise," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukás, J.4
-
41
-
-
84891296342
-
Camera model identification based on the heteroscedastic noise model
-
Jan.
-
T. H. Thai, R. Cogranne, and F. Retraint, "Camera model identification based on the heteroscedastic noise model," IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.1
, pp. 250-263
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
42
-
-
85015091451
-
Content-adaptive steganography by minimizing statistical detectability
-
Feb.
-
V. Sedighi, R. Cogranne, and J. Fridrich, "Content-adaptive steganography by minimizing statistical detectability," IEEE Trans. Inf. Forensics Security, vol. 11, no. 2, pp. 221-234, Feb. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.2
, pp. 221-234
-
-
Sedighi, V.1
Cogranne, R.2
Fridrich, J.3
-
43
-
-
84896690794
-
Contrast enhancement-based forensics in digital images
-
Mar.
-
G. Cao, Y. Zhao, R. Ni, and X. Li, "Contrast enhancement-based forensics in digital images," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 515-525, Mar. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.3
, pp. 515-525
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Li, X.4
-
44
-
-
84873967366
-
A new biometric identification model and the multiple hypothesis testing for arbitrarily varying objects
-
A. N. Harutyunyan, N. Grigoryan, S. Voloshynovskiy, and O. J. Koval, "A new biometric identification model and the multiple hypothesis testing for arbitrarily varying objects," in Proc. CAST Workshop-Biometrie (BIOSIG), 2011, pp. 305-312.
-
(2011)
Proc. CAST Workshop-Biometrie (BIOSIG)
, pp. 305-312
-
-
Harutyunyan, A.N.1
Grigoryan, N.2
Voloshynovskiy, S.3
Koval, O.J.4
-
45
-
-
0032022519
-
Hypothesis testing for arbitrarily varying source with exponential-type constraint
-
Mar.
-
F.-W. Fu and S.-Y. Shen, "Hypothesis testing for arbitrarily varying source with exponential-type constraint," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 892-895, Mar. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.2
, pp. 892-895
-
-
Fu, F.-W.1
Shen, S.-Y.2
-
49
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Coventry, U.K., Sep.
-
M. Barni, M. Fontani, and B. Tondi, "A universal technique to hide traces of histogram-based image manipulations," in Proc. ACM Multimedia Secur. Workshop, Coventry, U.K., Sep. 2012, pp. 97-104.
-
(2012)
Proc. ACM Multimedia Secur. Workshop
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
50
-
-
0142008485
-
On the capacity of a biometrical identification system
-
Jun./Jul.
-
F. Willems, T. Kalker, J. Goseling, and J.-P. Linnartz, "On the capacity of a biometrical identification system," in Proc. IEEE Int. Symp. Inf. Theory, Jun./Jul. 2003, p. 82.
-
(2003)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 82
-
-
Willems, F.1
Kalker, T.2
Goseling, J.3
Linnartz, J.-P.4
-
51
-
-
3042651273
-
Markov types and minimax redundancy for Markov sources
-
Jul.
-
P. Jacquet and W. Szpankowski, "Markov types and minimax redundancy for Markov sources," IEEE Trans. Inf. Theory, vol. 50, no. 7, pp. 1393-1402, Jul. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.7
, pp. 1393-1402
-
-
Jacquet, P.1
Szpankowski, W.2
|