


default search action
12th WIFS 2020: New York City, NY, USA
- 12th IEEE International Workshop on Information Forensics and Security, WIFS 2020, New York City, NY, USA, December 6-11, 2020. IEEE 2020, ISBN 978-1-7281-9930-6

- Pia Bauspieß, Jascha Kolberg

, Daniel Demmler, Juliane Krämer, Christoph Busch:
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection. 1-6 - Lázaro Janier González-Soler

, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas W. D. Evans:
Texture-based Presentation Attack Detection for Automatic Speaker Verification. 1-6 - Iuliia Tkachenko

, Alain Trémeau, Thierry Fournel:
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures. 1-6 - Quentin Giboulot, Patrick Bas, Rémi Cogranne:

Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography. 1-6 - Tamio-Vesa Nakajima

, Andrew D. Ker:
The Syndrome-Trellis Sampler for Generative Steganography. 1-6 - Juan E. Tapia

, Marta Gomez-Barrero, Christoph Busch:
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris. 1-6 - Liangping Ma

, John Kaewell:
Fast Monte Carlo Dropout and Error Correction for Radio Transmitter Classification. 1-5 - Behrooz Razeghi

, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy:
On Perfect Obfuscation: Local Information Geometry Analysis. 1-6 - Matthias Börsig

, Sven Nitzsche
, Max Eisele, Roland Gröll, Jürgen Becker, Ingmar Baumgart
:
Fuzzing Framework for ESP32 Microcontrollers. 1-6 - Jin Keong

, Xingbo Dong
, Zhe Jin, Khawla Mallat, Jean-Luc Dugelay:
Multi-spectral Facial Landmark Detection. 1-6 - Alberto Pedrouzo-Ulloa

, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González:
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation. 1-6 - Kaizaburo Chubachi:

An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis. 1-6 - Benedikt Lorch, Anatol Maier, Christian Riess:

Reliable JPEG Forensics via Model Uncertainty. 1-6 - T. Scott Brandes, Scott Kuzdeba, Jessee McClelland, Neil Bomberger, Andrew Radlbeck:

RF Waveform Synthesis Guided by Deep Reinforcement Learning. 1-6 - Pierre-Olivier Brissaud, Jérôme François

, Isabelle Chrisment, Thibault Cholez
, Olivier Bettan:
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space. 1-6 - Rémi Cogranne, Quentin Giboulot, Patrick Bas:

ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images. 1-5 - Yassine Yousfi, Jan Butora, Eugene Khvedchenya, Jessica J. Fridrich:

ImageNet Pre-trained CNNs for JPEG Steganalysis. 1-6 - Andrey Garnaev, Wade Trappe

, Narayan B. Mandayam, H. Vincent Poor:
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game. 1-6 - Pranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt

, Richard J. Enbody:
The Suitability of RSA for Bulk Data Encryption. 1-6 - Davide Capoferri, Clara Borrelli

, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro:
Speech Audio Splicing Detection and Localization Exploiting Reverberation Cues. 1-6 - Luca Bondi

, Edoardo Daniele Cannas, Paolo Bestagini, Stefano Tubaro:
Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection. 1-6 - Clément Gaine, Driss Aboulkassimi, Simon Pontié, Jean-Pierre Nikolovski, Jean-Max Dutertre:

Electromagnetic Fault Injection as a New Forensic Approach for SoCs. 1-6 - Sara Mandelli, Nicolò Bonettini, Paolo Bestagini, Stefano Tubaro:

Training CNNs in Presence of JPEG Compression: Multimedia Forensics vs Computer Vision. 1-6 - Shruti Agarwal, Hany Farid, Tarek El-Gaaly, Ser-Nam Lim:

Detecting Deep-Fake Videos from Appearance and Behavior. 1-6 - Mauro Barni, Kassem Kallas

, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. 1-6 - Sneha Sudhakaran, Aisha I. Ali-Gombe

, Augustine Orgah, Andrew Case
, Golden G. Richard III
:
AmpleDroid Recovering Large Object Files from Android Application Memory. 1-6 - Tetsuro Ishizuka, Yodai Watanabe:

Threshold audio secret sharing schemes encrypting audio secrets. 1-5 - Shan Jin, Riccardo Bettati:

Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks. 1-6 - Daniel Mas Montserrat, János Horváth, Sri Kalyan Yarlagadda, Fengqing Zhu, Edward J. Delp

:
Generative Autoregressive Ensembles for Satellite Imagery Manipulation Detection. 1-6 - Pu Sun, Yuezun Li, Honggang Qi, Siwei Lyu:

Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction. 1-6 - Sharad Joshi

, Pawel Korus
, Nitin Khanna, Nasir D. Memon
:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














