IEEE 2013 - INFORMATION FORENSICS AND SECURITY TITLES

IEEE 2013 - INFORMATION FORENSICS AND SECURITY TITLES

Project CodeTitle
IFS1301Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IFS1302User Authentication Through Mouse Dynamics.
IFS1303Latent Fingerprint Matching Using Descriptor-Based Hough Transform.
IFS1304Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.
IFS1305Robust Hashing for Image Authentication Using Zernike Moments and Local Features.
IFS1306An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition
IFS1307White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
IFS1308Recognizing Surgically Altered Face Images Using Multi-objective Evolutionary Algorithm.
IFS1309Heap Graph Based Software Theft Detection.
IFS1310Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. 
IFS1311Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation.
IFS1312Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IFS1313On the Security of End-to-End Measurements Based on Packet-Pair Dispersions.
IFS1314COKE Crypto-Less Over-the-Air Key Establishment. 
IFS1315An Evaluation of Otoacoustic Emissions as a Biometric. 
IFS1316A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System.
IFS1317Matching Composite Sketches to Face Photos: A Component-Based Approach.
IFS1318Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes.
IFS1319Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IFS1320Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems. 
IFS1321Component-Based Representation in Automated Face Recognition.
IFS1322Physical Layer Security of TAS/MRC With Antenna Correlation.
IFS1323On Mixing Fingerprints. .
IFS1324Covert Channels in Computer Networks Based on Chaos Theory. 
IFS1325Online/Offline Signatures for Low-Power Devices.
IFS1326Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition.
IFS1327Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics.
IFS1328On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels.
IFS1329Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages.
IFS1330Revealing the Traces of JPEG Compression Anti-Forensics.
IFS1331Fingerprint Combination for Privacy Protection.
IFS1332Effect of Cover Quantization on Steganographic Fisher Information.
IFS1333Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts.
IFS1334Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IFS1335Privacy Preserving Data Sharing With Anonymous ID Assignment. 
IFS1336On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT.
IFS1337Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IFS1338Increasing Security Degree of Freedom in Multiuser and Multieve Systems.
IFS1339The Source Identification Game: An Information-Theoretic Perspective.
IFS1340An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection.
IFS1341A Timing Channel Spyware for the CSMA/CA Protocol.
IFS1342Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of
IFS1343SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection.
IFS1344Cost-Sensitive Subspace Analysis and Extensions for Face Recognition.
IFS1345A New Method for EEG-Based Concealed Information Test.
IFS1346Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes
IFS1347. A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder. 
IFS1348Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IFS1349Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing.
IFS1350JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques.
IFS1351A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence. 
IFS1352Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection. 
IFS1353Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks.
IFS1354Joint Global and Local Structure Discriminant Analysis.
IFS1355Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts.
IFS1356Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map.
IFS1357A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
IFS1358Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code. 
IFS1359Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security.
IFS1360Payload Attribution via Character Dependent Multi-Bloom Filters. 
IFS1361Physical-Layer Security in Distributed Wireless Networks Using Matching Theory. 
IFS1362General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes.
IFS1363Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model.
IFS1364Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks.
IFS1365Hashing Based Fast Palmprint Identification for Large-Scale Databases.
IFS1366Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. 
IFS13673-D Face Recognition Under Occlusion Using Masked Projection.
IFS1368Related Key Chosen IV Attack on Grain-128a Stream Cipher.
IFS1369Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware. 
IFS1370Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IFS1371Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems.
IFS1372Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach.
IFS1373Automatic General-Purpose Sanitization of Textual Documents.
IFS1374A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search.
IFS1375TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IFS1376Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IFS1377Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health.
IFS1378Comparative Study of Trust Modeling for Automatic Landmark Tagging.
IFS1379LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
IFS1380Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis.
IFS1381A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IFS1382Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. 
IFS1383Towards Trustworthy Resource Scheduling in Clouds
IFS1384CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
IFS1385The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns. 
IFS1386Fine-Grained Refinement on TPM-Based Protocol Applications. 
IFS1387FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IFS1388Impacts of Watermarking Security on Tardos-Based Fingerprinting.
IFS1389Adaptive Quality-Based Performance Prediction and Boosting for Iris Authentication: Methodology and Its Illustration.
IFS1390A Formal Usability Constraints Model for Watermarking of Outsourced Datasets.

No comments:

Post a Comment