WIFS'13 organizing committee (Englisch)
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:WIFS'13 organizing committee
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.11.2013
-
Format / Umfang:176452 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Separate MAP adaptation of GMM parameters for forensic voice comparison on limited dataHuang, Chee Cheun / Epps, Julien / Enzinger, Ewald et al. | 2013
- 1
-
WIFS'13 organizing committee| 2013
- 1
-
WIFS'13 keynotes| 2013
- 1
-
Preface| 2013
- 1
-
Table of contents| 2013
- 1
-
Author index| 2013
- 1
-
WIFS'13 sponsors & supporters| 2013
- 7
-
Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrievalZhao, Xuran / Evans, Nicholas / Dugelay, Jean-Luc et al. | 2013
- 13
-
Testing the validity and reliability of forensic voice comparison based on reassigned time-frequency representations of Chinese /iau/Enzinger, Ewald et al. | 2013
- 19
-
Restoring blood vessel patterns from JPEG compressed skin images for forensic analysisLi, Xiaojie / Kong, Adams Wai-Kin et al. | 2013
- 25
-
Robust visual tracking using local salient coding and PCA subspace modelingLin, Dajun / Zheng, Huicheng / Ma, Donghong et al. | 2013
- 31
-
ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authenticationLabati, Ruggero Donida / Sassi, Roberto / Scotti, Fabio et al. | 2013
- 37
-
A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verificationRattani, Ajita / Poh, Norman / Ross, Arun et al. | 2013
- 43
-
De-duplication errors in a biometric system: An investigative studyDeCann, Brian / Ross, Arun et al. | 2013
- 49
-
Hashing fingerprints for identity de-duplicationWang, Yi / Yuen, Pong C. / Cheung, Yiu-ming et al. | 2013
- 55
-
Secure Evaluation of Private Functions through Piecewise Linear ApproximationLazzeretti, Riccardo / Pignata, Tommaso / Barni, Mauro et al. | 2013
- 61
-
Privacy-preserving recommender systems in dynamic environmentsErkin, Z. / Veugen, T. / Lagendijk, R. L. et al. | 2013
- 67
-
Integrated secure watermark detection and privacy preserving storage in the compressive sensing domainWang, Qia / Zeng, Wenjun / Tian, Jun et al. | 2013
- 73
-
Fast and secure similarity search in high dimensional spaceFuron, Teddy / Jegou, Herve / Amsaleg, Laurent / Mathon, Benjamin et al. | 2013
- 79
-
Building a privacy-preserving semantic overlay for Peer-to-Peer networksZeilemaker, Niels / Erkin, Zekeriya / Palmieri, Paolo / Pouwelse, Johan et al. | 2013
- 85
-
The perils of cross-silo deduplication: Trading user security for provider storage efficiencyRozier, Eric et al. | 2013
- 91
-
Multiple-observation hypothesis testing under adversarial conditionsBarni, Mauro / Tondi, Benedetta et al. | 2013
- 97
-
The flow fingerprinting gameElices, Juan A. / Perez-Gonzalez, Fernando et al. | 2013
- 103
-
Attacking image classification based on bag-of-visual-wordsMelloni, A. / Bestagini, P. / Costanzo, A. / Barni, M. / Tagliasacchi, M. / Tubaro, S. et al. | 2013
- 109
-
Shot-based temporally respective frame generation algorithm for video hashingLiu, Xiaocui / Sun, Jiande / Liu, Ju et al. | 2013
- 115
-
Towards a realistic channel model for security analysis of authentication using graphical codesBaras, Cleo / Cayre, Francois et al. | 2013
- 120
-
The watchful forensic analyst: Multi-clue information fusion with background knowledgeFontani, Marco / Argones-Rua, Enrique / Troncoso, Carmela / Barni, Mauro et al. | 2013
- 126
-
Feature-based classification for audio bootlegs detectionBestagini, P. / Zanoni, M. / Albonico, L. / Paganini, A. / Sarti, A. / Tubaro, S. et al. | 2013
- 132
-
Exploring color information to characterize camcorder piracyMoreira-Perez, Juan Jose / Chupeau, Bertrand / Doerr, Gwenael / Baudry, Severine et al. | 2013
- 138
-
ENF based location classification of sensor recordingsHajj-Ahmad, Adi / Garg, Ravi / Wu, Min et al. | 2013
- 144
-
Splicing detection in out-of-focus blurred imagesBahrami, Khosro / Kot, Alex C. / Fan, Jiayuan et al. | 2013
- 150
-
Set-membership identification of resampled signalsVazquez-Padin, David / Comesana, Pedro / Perez-Gonzalez, Fernando et al. | 2013
- 156
-
Joint detection of full-frame linear filtering and JPEG compression in digital imagesConotter, V. / Comesana, P. / Perez-Gonzalez, F. et al. | 2013
- 162
-
Forensically determining the order of signal processing operationsStamm, Matthew C. / Chu, Xiaoyu / Liu, K. J. Ray et al. | 2013
- 168
-
Near optimal detection of quantized signals and application to JPEG forensicsBianchi, Tiziano / Piva, Alessandro / Perez-Gonzalez, Fernando et al. | 2013
- 174
-
Optimum perfect steganography of memoryless sources as a rate-distortion problemBalado, Felix / Haughton, David et al. | 2013
- 180
-
The holey grail A special score function for non-binary traitor tracingSkoric, B. / Oosterwijk, J.-J. / Doumen, J. et al. | 2013
- 186
-
Correlation-and-bit-aware multiplicative spread spectrum embedding for data hidingZhang, Xiaoqiang / Wang, Z. Jane et al. | 2013
- 191
-
Dynamic traitor tracing schemes, revisitedLaarhoven, Thijs et al. | 2013
- 197
-
Towards transferable watermarks in buyer-seller watermarking protocolsTerelius, Bjorn et al. | 2013
- 203
-
A GA optimization approach to HS based multiple reversible data hidingWang, Junxiang / Ni, Jiangqun et al. | 2013
- c1
-
Front cover| 2013