IEEE Organizations related to IEEE Transactions on Information Forensics and Security

Back to Top


Conferences related to IEEE Transactions on Information Forensics and Security

Back to Top

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)

The ICITST is an international refereed conference dedicated to the advancement of theory andpractical implementation of secured Internet transactions and to fostering discussions on information technology evolution.



Periodicals related to IEEE Transactions on Information Forensics and Security

Back to Top

Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Intelligent Transportation Systems, IEEE Transactions on

The theoretical, experimental and operational aspects of electrical and electronics engineering and information technologies as applied to Intelligent Transportation Systems (ITS). Intelligent Transportation Systems are defined as those systems utilizing synergistic technologies and systems engineering concepts to develop and improve transportation systems of all kinds. The scope of this interdisciplinary activity includes the promotion, consolidation and coordination of ITS technical ...


Multimedia, IEEE Transactions on

The goal of IEEE Transactions on Multimedia is to integrate all aspects of multimedia systems and technology, signal processing, and applications. It will cover various aspects of research in multimedia technology and applications including, but not limited to: circuits, algorithms and macro/micro-architectures, software, detailed design, synchronization, interaction, joint processing and coordination of multimedia and multimodal signals/data, compression, storage, retrieval, communication, ...


Networking, IEEE/ACM Transactions on

Network architecture and design, communication protocols, network software, network technologies, network software, network technologies, network services and applications, and network operations and management.



Most published Xplore authors for IEEE Transactions on Information Forensics and Security

Back to Top

Xplore Articles related to IEEE Transactions on Information Forensics and Security

Back to Top

How to Use the IEEEtran LATEX Class

IEEE Transactions on Information Forensics and Security, None

This article describes how to use the IEEEtran class with LATEX to produce high quality typeset papers that are suitable for submission to the Institute of Electrical and Electronics Engineers. IEEEtran can produce conference, journal and technical note (correspondence) papers with a suitable choice of class options. This document was produced using IEEEtran in journal mode.


List of Reviewers

IEEE Transactions on Information Forensics and Security, 2013

None


Comments on “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”

IEEE Transactions on Information Forensics and Security, 2016

Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with ...


List of Reviewers

IEEE Transactions on Information Forensics and Security, 2008

Lists the reviewers who contributed to IEEE Transactions on Information Forensics and Security in 2007.


Comments on “Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks”

IEEE Transactions on Information Forensics and Security, None

To solve security and privacy issues in wireless body area networks, several types of digital signature schemes have been adapted to a number of authentication protocols. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2015.2414399), Xiong and Qin proposed a revocable certificateless encryption (RCLE) scheme against decryption key exposure, and a revocable certificateless signature (R-CLS) scheme against ...


More Xplore Articles

Educational Resources on IEEE Transactions on Information Forensics and Security

Back to Top

IEEE-USA E-Books

  • How to Use the IEEEtran LATEX Class

    This article describes how to use the IEEEtran class with LATEX to produce high quality typeset papers that are suitable for submission to the Institute of Electrical and Electronics Engineers. IEEEtran can produce conference, journal and technical note (correspondence) papers with a suitable choice of class options. This document was produced using IEEEtran in journal mode.

  • List of Reviewers

    None

  • Comments on “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”

    Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI 10.1109/TIFS.2015.2423264) was proposed. Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide. Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted.

  • List of Reviewers

    Lists the reviewers who contributed to IEEE Transactions on Information Forensics and Security in 2007.

  • Comments on “Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks”

    To solve security and privacy issues in wireless body area networks, several types of digital signature schemes have been adapted to a number of authentication protocols. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2015.2414399), Xiong and Qin proposed a revocable certificateless encryption (RCLE) scheme against decryption key exposure, and a revocable certificateless signature (R-CLS) scheme against signing key exposure. Then they proposed a revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks based on the combination of R-CLE scheme and R-CLS scheme. However, we show that their RCLS scheme is insecure against type I adversaries: a type I adversary who knows only a user’s secret value can forge signatures on any messages in the same time period. Hence, their authentication protocol fails to meet the claimed security requirements.

  • Erratum to “Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification” [Mar 11 227-236]

    Due to a production error, the above titled paper (ibid., vol. 6, no. 1, pp. 227-236, Mar. 11), was published as a correspondence in the March 2011 issue of IEEE Transactions on Information Forensics and Security. This paper was actually accepted as a Regular Paper and should have been published as such.

  • Comments on “Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”

    Most of the known attribute-based encryption (ABE) schemes focused on the data contents privacy and the access control, but less attention was paid to the privilege control and the identity privacy problem. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI:10.1109/TIFS.2014.2368352), Jung et al. proposed an anonymous attribute- based encryption scheme for access privilege and anonymity, which exhibited a lot of interesting ideas and gave the proof in the standard model. However, after carefully revisiting the scheme, we found that any valid user can compute the system-wide master key and their proof has some mistakes, hence, it fails to meet their security definitions.

  • Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks

    We consider the problem of secure detection in wireless sensor networks operating over insecure links. It is assumed that an eavesdropping fusion center (EFC) attempts to intercept the transmissions of the sensors and to detect the state of nature. The sensor nodes quantize their observations using a multilevel quantizer. Before transmission to the ally fusion center (AFC), the senor nodes encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor's data to another quantizer output level using a stochastic cipher matrix (key). The communication between the sensors and each fusion center is assumed to be over a parallel access channel with identical and independent branches, and with each branch being a discrete memoryless channel. We employ J-divergence as the performance criterion for both the AFC and EFC. The optimal solution for the cipher matrices is obtained in order to maximize J-divergence for AFC, whereas ensuring that it is zero for the EFC. With the proposed method, as long as the EFC is not aware of the specific cipher matrix employed by each sensor, its detection performance will be very poor. The cost of this method is a small degradation in the detection performance of the AFC. The proposed scheme has no communication overhead and minimal processing requirements making it suitable for sensors with limited resources. Numerical results showing the detection performance of the AFC and EFC verify the efficacy of the proposed method.

  • Online Learning Anti-Jamming Cognitive Radio Network for Green Clouds - Withdrawn

    Withdrawn.

  • Decode-Time Forensic Watermarking of AAC Bitstreams

    In digital rights-management systems, forensic watermarking complements encryption and deters the capture and unauthorized redistribution of the rendered content. In this paper, we propose a novel watermarking method which is integrated into the advanced audio coding (AAC) standard's decoding process. For predefined frequency bands, the method intercepts and modifies the scale factors, which are utilized for dequantization of spectral coefficients. It thereby modulates the short-time envelope of the bandlimited audio and embeds a watermark which is robust to various attacks, such as capture with a microphone and recompression at lower bit rates. Inclusion of watermark embedding in the AAC decoder has practically no effect on the decoding complexity. As a result, the proposed method can be integrated even into resource-constrained devices, such as portable players without any additional hardware.



Standards related to IEEE Transactions on Information Forensics and Security

Back to Top

No standards are currently tagged "IEEE Transactions on Information Forensics and Security"


Jobs related to IEEE Transactions on Information Forensics and Security

Back to Top