A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Review of Face Recognition Techniques
2016
International Journal of Computer Applications
This paper represents review of face recognition methods and discusses their advantages and disadvantages. ...
So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face. ...
Jain,
Fellow,
IEEE,
IEEE
TRANSACTIONS
ON
INFORMATION FORENSICS AND SECURITY, VOL.
7, NO. 1, FEBRUARY 2012. ...
doi:10.5120/ijca2016907994
fatcat:rqmop3wwafd7nbejv44tlcroje
Categorization and Organization of Database Forensic Investigation Processes
2020
IEEE Access
This harmonized DBFI process has been developed based on three key categories (i.e. planning, preparation and pre-response, acquisition and preservation, and analysis and reconstruction). ...
Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance is growing as digital data becomes more extensive and commonplace. ...
Blockchain 2019 Outstanding Paper Award, the International Conference on Information Security and Cryptology (Inscrypt 2019) Best Student Paper Award, the IEEE TrustCom 2018 Best Paper Award, the ESORICS ...
doi:10.1109/access.2020.3000747
fatcat:ccx63ynokbenfmyuxs3rhd4ip4
Hybrid Matching Algorithm for Personal Names
2012
Journal of Data and Information Quality
The work involved focusing on error and change propagation to define and validate a set of architectural metrics for assessing quality of software architectures. ...
Software Architecture Metrics -Led software developer on a NASA sponsored software architectural metrics project. ...
of Intelligent Information Processing • Manuscript Reviewer, Journal of Data and Information Quality • Manuscript Reviewer, IEEE Transactions on Automation Science and Engineering • Manuscript Reviewer ...
doi:10.1145/2348828.2348830
dblp:journals/jdiq/VarolB12
fatcat:afk72rr26nb4hobaqk3572dsfm
Present and Future of Network Security Monitoring
2021
IEEE Access
Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS
Diagnosis is usually related to forensics tasks, where the III. ...
Citation information: DOI
10.1109/ACCESS.2021.3067106, IEEE Access
Author et al.: Preparation of Papers for IEEE TRANSACTIONS ...
doi:10.1109/access.2021.3067106
fatcat:hv2kviv5vbd67ikmlva6ip6gzu
Reversible Data Hiding Based on Adaptive Block Selection Strategy
2020
International Journal of Digital Crime and Forensics
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. ...
In this article, as an extension of the algorithm, the authors propose an RDH scheme based on adaptive block selection strategy. ...
IEEE
Transactions on Information Forensics and Security, 11(12), 2777–2789. doi:10.1109/TIFS.2016.2598528
Li, J., Li, X., & Yang, B. (2013). ...
doi:10.4018/ijdcf.2020010108
fatcat:ztqvstfln5coflu2n6rtwmtgce
Intrusion Detection on the In-Vehicle Network Using Machine Learning
2021
2021 3rd International Cyber Resilience Conference (CRC)
The usage of only timing information for intrusion detection makes it a vehicle -agnostic method that does not rely on the message content, which is often proprietary and confidential information. ...
This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. ...
Joo, K. , 17 (2019) IEEE Transactions on Information Forensics and Security, 14 (4), art. no. doi: 10.1109/MDAT.2019.2899062 8466914, pp. 1083-1097. . ...
doi:10.1109/crc50527.2021.9392627
fatcat:6jipwcszszcv3jgc527qftj3bm
Deep Learning in Information Security
[article]
2018
arXiv
pre-print
DL methods generally are capable of achieving high-performance and generalize well. However, information security is a domain with unique requirements and challenges. ...
In this survey, we study the use of DL techniques within the domain of information security. We systematically reviewed 77 papers and presented them from a data-centric perspective. ...
IEEE Transactions on Information Forensics and Security, 12(11):2640–2653, 2017. ...
arXiv:1809.04332v1
fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi
Accountable clouds
2013
2013 IEEE International Conference on Technologies for Homeland Security (HST)
Assurance becomes a measurable property, quantified by the volume of evidence to audit and retain in a privacy-preserving and nonrepudiable fashion. ...
By proactively collecting potential forensic evidence, the cloud becomes more accountable, while providing its regular services. ...
There are numerous scenarios where this lack of appropriate forensic support as a reactive security measure could play a significant role; we review some of the most relevant ones below. ...
doi:10.1109/ths.2013.6699038
fatcat:pyex452jincu5diillnmasdheu
An Enhanced Blockchain-based IoT Digital Forensics Architecture using Fuzzy Hash
2021
IEEE Access
Recently, blockchain technology was presented as one of the options for achieving IoT security via the use of an immutable ledger, a decentralized architecture, and strong cryptographic primitives. ...
The majority of IoT systems are composed of disparate software and hardware components, which may pose security and privacy concerns. ...
Massive volumes of diverse and dispersed evidence created by IoT devices found at crime scenes significantly increase the difficulty of forensic investigations [8] [9] [10] [11] [12] . ...
doi:10.1109/access.2021.3126715
fatcat:ye4dkcbjyvaurisjvbkwhdpg7i
High Capacity Reversible Data Hiding Technique Framed for Experimentation with PSO
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
We want to contribute towards a proposed method before actual experimentation and results are worked for. ...
We have seen previous techniques and also carefully analyzed the high capacity reversible data hiding method in MSB. ...
., Gui, X. and Yang, B., 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security, 10(9), pp.2016-2027. 27. ...
doi:10.35940/ijitee.i1130.0789s19
fatcat:ssecwl6hvnbjjn6j3cx6csr2ni
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
2021
IEEE Access
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 9, 2021 WAQAS AHMED is currently pursuing the Ph.D. degree with the Department of Cyber Security, Air University, Islamabad ...
Every subsequent person is heavily relying on them due to multifaceted usage and affordability. ...
FORENSICS AND SECURITY, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, IEEE TRANSACTIONS ON POWER SYSTEMS, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, IEEE TRANSACTIONS ON SMART GRID, IEEE JOURNAL ...
doi:10.1109/access.2021.3105450
fatcat:lecd5ds6obad5dfl4g6uhekf7y
Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs
2013
2013 IEEE Ninth World Congress on Services
In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but with the heterogeneous complexity involved with an enterprise's private cloud not to ...
This framework will be necessary in order to develop investigative and forensic auditing tools and techniques for use in cloud based log-centric SOAs. ...
in a cloud SOA transaction to negotiate what information would be recorded. ...
doi:10.1109/services.2013.76
dblp:conf/services/ThorpeGCWBR13
fatcat:ccf4f7l7ofcyhaibetb4zjpmty
Elimination of Angular Problem in Face Recognition
2017
International Journal of Engineering Research and
Previously various algorithms and techniques were used for the purpose of security and authentication, but they were having several pitfalls like time consumption, pose and illumination problem along with ...
This technique is commonly used for the security purposes of authentication in computerized fields. ...
Jawahar, Blind Authentication: A Secure Crypto-Biometric Verification Protocol,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010, ieeexplore.ieee.org. [6] Wilman W. W. ...
doi:10.17577/ijertv6is120051
fatcat:kd4jbmnhpjborbrscgjqqxr3xu
A Classical Review On Advanced Digital Image Watermarking Techniques
2018
Zenodo
Presently, creation, copy and transmission of image data via internet and mobile phone are very common practices. ...
The world has become a global village in digital era due to advances in internet and communication technology. ...
. 7) Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, and Riccardo Leonardi," High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators", IEEE Transactions On Information Forensics and ...
doi:10.5281/zenodo.1159107
fatcat:s7nloq2yojaefiusgyxjydgwjy
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
2022
IEEE Access
Responsibility for the information and views expressed therein lies entirely with the authors. ...
This work was supported by the European Commission under the Horizon 2020 Programme (H2020), as part of the projects LOCARD (https://locard.eu) (Grant Agreement no. 832735) and CyberSec4Europe (https:/ ...
more information about the transactions that have taken place. ...
doi:10.1109/access.2022.3154059
fatcat:3wmlrku5inhsrahya6cqlpzssa
« Previous
Showing results 1 — 15 out of 1,416 results