Skip to main content

Advertisement

Articles

Page 3 of 4

  1. Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a co...

    Authors: Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo

    Citation: EURASIP Journal on Information Security 2013 2013:8

    Content type: Research

    Published on:

  2. The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Authors: Donny J Ohana and Narasimha Shashidhar

    Citation: EURASIP Journal on Information Security 2013 2013:6

    Content type: Research

    Published on:

  3. Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a d...

    Authors: Zekeriya Erkin, Thijs Veugen, Tomas Toft and Reginald L Lagendijk

    Citation: EURASIP Journal on Information Security 2013 2013:4

    Content type: Research

    Published on:

  4. Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a high...

    Authors: Vaibhav Garg, Thomas Koster and Linda Jean Camp

    Citation: EURASIP Journal on Information Security 2013 2013:3

    Content type: Research

    Published on:

  5. This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The resear...

    Authors: Jonny Milliken, Valerio Selis and Alan Marshall

    Citation: EURASIP Journal on Information Security 2013 2013:2

    Content type: Research

    Published on:

  6. This article details the conception, design, development and analysis of invisible, blind and robust color image watermarking algorithms based on the wavelet transform. Using error correcting codes, the waterm...

    Authors: Wadood Abdul, Philippe Carré and Philippe Gaborit

    Citation: EURASIP Journal on Information Security 2013 2013:1

    Content type: Research

    Published on:

  7. We analyze and discuss encryption schemes for JPEG2000 based on the wavelet packet transform with a key-dependent subband structure. These schemes have been assumed to reduce the runtime complexity of encrypti...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2012 2012:2

    Content type: Research

    Published on:

  8. Identity theft is one of the most profitable crimes committed by felons. In the cyber space, this is commonly achieved using phishing. We propose here robust server side methodology to detect phishing attacks,...

    Authors: Venkatesh Ramanathan and Harry Wechsler

    Citation: EURASIP Journal on Information Security 2012 2012:1

    Content type: Research

    Published on:

  9. Denial-of-service (DoS) attack exploits inherent limitation of resources in wireless networks in attempt to overwhelm and exhaust their finite capacity. In wireless networks, clear-text form of control packets...

    Authors: Mina Malekzadeh, Abdul Azim Abdul Ghani and Shamala Subramaniam

    Citation: EURASIP Journal on Information Security 2011 2011:4

    Content type: Research

    Published on:

  10. Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technolog...

    Authors: Christian Rathgeb and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2011 2011:3

    Content type: Research

    Published on:

  11. Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2(3):399, 2008; IEEE Netw 23(1):6, 2009) has shown that it is possible to maintain a high level of network security while selectively ins...

    Authors: Ezzat G Bakhoum

    Citation: EURASIP Journal on Information Security 2011 2011:2

    Content type: Research

    Published on:

  12. In this article, we present an automatic face recognition system. We show that fractal features obtained from Iterated Function System allow a successful face recognition and outperform the classical approache...

    Authors: Yousra Ben Jemaa, Ahmed Derbel and Ahmed Ben Jmaa

    Citation: EURASIP Journal on Information Security 2011 2011:1

    Content type: Research

    Published on:

  13. Watermarking payload is a topic in which the watermarking researchers have a great interest at present. Based on the constraint of "perceptual invisibility," this paper makes a study of the maximum watermarkin...

    Authors: Mao Jia-Fa, Zhang Ru, Niu Xin-Xin, Yang Yi-Xian and Zhou Lin-Na

    Citation: EURASIP Journal on Information Security 2011 2011:502748

    Content type: Research Article

    Published on:

  14. An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of vid...

    Authors: Klimis Ntalianis, Nicolas Tsapatsoulis and Athanasios Drigas

    Citation: EURASIP Journal on Information Security 2011 2011:174945

    Content type: Research Article

    Published on:

  15. Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, this paper proposed a Joint Source-Cryptographic-Channel Coding (JSCC) based on...

    Authors: Mahnaz Sinaie and Vahid Tabataba Vakili

    Citation: EURASIP Journal on Information Security 2010 2010:621521

    Content type: Research Article

    Published on:

  16. For evaluation of biometric performance of biometric components and system, the availability of independent databases and desirably independent evaluators is important. Both databases of significant size and i...

    Authors: Davrondzhon Gafurov, Patrick Bours, Bian Yang and Christoph Busch

    Citation: EURASIP Journal on Information Security 2010 2010:391761

    Content type: Research Article

    Published on:

  17. An overview of reversible watermarking techniques appeared in literature during the last five years approximately is presented in this paper. In addition to this a general classification of algorithms on the b...

    Authors: Roberto Caldelli, Francesco Filippini and Rudy Becarelli

    Citation: EURASIP Journal on Information Security 2010 2010:134546

    Content type: Review Article

    Published on:

  18. One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the ident...

    Authors: Paula Carrillo, Hari Kalva and Spyros Magliveras

    Citation: EURASIP Journal on Information Security 2010 2009:429581

    Content type: Research Article

    Published on:

  19. This paper presents a method which attains recoverable privacy protection for video content distribution. The method is based on discrete wavelet transform (DWT), which generates scaling coefficients and wavel...

    Authors: Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta and Noboru Babaguchi

    Citation: EURASIP Journal on Information Security 2010 2009:293031

    Content type: Research Article

    Published on:

  20. Signal processing in the encrypted domain (s.p.e.d.) appears an elegant solution in application scenarios, where valuable signals must be protected from a possibly malicious processing device. In this paper, w...

    Authors: Tiziano Bianchi, Alessandro Piva and Mauro Barni

    Citation: EURASIP Journal on Information Security 2009 2009:716357

    Content type: Research Article

    Published on:

  21. One-time key based phase scrambling is proposed for privacy-protected image matching. The image matching is performed using invisible templates that are protected by phase scrambling. A key for phase scramblin...

    Authors: Izumi Ito (EURASIP Member) and Hitoshi Kiya (EURASIP Member)

    Citation: EURASIP Journal on Information Security 2009 2009:841045

    Content type: Research Article

    Published on:

  22. The discrete Fourier transform-rational dither modulation (DFT-RDM) has been proposed as a way to provide robustness to linear-time-invariant (LTI) filtering for quantization-based watermarking systems. This s...

    Authors: Michele Scagliola, Fernando Pérez-González and Pietro Guccione

    Citation: EURASIP Journal on Information Security 2009 2009:914937

    Content type: Research Article

    Published on:

  23. Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine indiv...

    Authors: Shuiming Ye, Ying Luo, Jian Zhao and Sen-ChingS Cheung

    Citation: EURASIP Journal on Information Security 2009 2009:865259

    Content type: Research Article

    Published on:

  24. From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy informati...

    Authors: JithendraK Paruchuri, Sen-chingS Cheung and MichaelW Hail

    Citation: EURASIP Journal on Information Security 2009 2009:236139

    Content type: Research Article

    Published on:

  25. A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD) embedding schem...

    Authors: Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee and Yen-Ping Chu

    Citation: EURASIP Journal on Information Security 2009 2009:658047

    Content type: Research Article

    Published on:

  26. This paper proposes to determine a sufficient number of images for reliable classification and to use feature selection to select most relevant features for achieving reliable steganalysis. First dimensionalit...

    Authors: Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten and Olli Simula

    Citation: EURASIP Journal on Information Security 2009 2009:901381

    Content type: Research Article

    Published on:

  27. CardSpace (formerly known as InfoCard) is a digital identity management system that has recently been adopted by Microsoft. In this paper we identify two security shortcomings in CardSpace that could lead to a...

    Authors: WaleedA Alrodhan and ChrisJ Mitchell

    Citation: EURASIP Journal on Information Security 2009 2009:167216

    Content type: Research Article

    Published on:

  28. A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital i...

    Authors: Hao-Tian Wu and Jean-Luc Dugelay

    Citation: EURASIP Journal on Information Security 2009 2009:317165

    Content type: Research Article

    Published on:

  29. A novel model-based steganographic technique for JPEG images is proposed where the model, derived from heuristic assumptions about the shape of the DCT frequency histograms, is dependent on a stegokey. The sec...

    Authors: Lorenzo Rossi, Fabio Garzia and Roberto Cusani

    Citation: EURASIP Journal on Information Security 2009 2009:382310

    Content type: Research Article

    Published on:

  30. The use of syndrome coding in steganographic schemes tends to reduce distortion during embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) and allow to lock positions which ...

    Authors: Caroline Fontaine and Fabien Galand

    Citation: EURASIP Journal on Information Security 2009 2009:274845

    Content type: Research Article

    Published on:

  31. In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, I...

    Authors: A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq and J.-J. Quisquater

    Citation: EURASIP Journal on Information Security 2008 2008:179290

    Content type: Review Article

    Published on:

  32. We introduce the concept of reliability in watermarking as the ability of assessing that a probability of false alarm is very low and below a given significance level. We propose an iterative and self-adapting...

    Authors: Frédéric Cérou, Teddy Furon and Arnaud Guyader

    Citation: EURASIP Journal on Information Security 2008 2008:414962

    Content type: Research Article

    Published on:

  33. This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows” for some reas...

    Authors: Teddy Furon and Patrick Bas

    Citation: EURASIP Journal on Information Security 2008 2008:597040

    Content type: Research Article

    Published on:

  34. Spread-spectrum watermarking is generally considered to be robust against collusion attacks, and thereby suitable for digital fingerprinting. We have previously introduced the minority extreme attack (IWDW' 07...

    Authors: HansGeorg Schaathun

    Citation: EURASIP Journal on Information Security 2008 2008:803217

    Content type: Research Article

    Published on:

  35. The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing ...

    Authors: Wasil Elsadig Eltahir, M. J. E. Salami, Ahmad Faris Ismail and Weng Kin Lai

    Citation: EURASIP Journal on Information Security 2008 2008:345047

    Content type: Research Article

    Published on:

  36. The use of digital watermarking in real applications is impeded by the weakness of current available algorithms against signal processing manipulations leading to the desynchronization of the watermark embedde...

    Authors: Angela D'Angelo, Mauro Barni and Neri Merhav

    Citation: EURASIP Journal on Information Security 2008 2008:345184

    Content type: Research Article

    Published on:

  37. We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce t...

    Authors: M. A. Haleem, K. P. Subbalakshmi and R. Chandramouli

    Citation: EURASIP Journal on Information Security 2008 2007:098374

    Content type: Research Article

    Published on:

  38. A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compli...

    Authors: Yang Yang, Bin B. Zhu, Shipeng Li and Nenghai Yu

    Citation: EURASIP Journal on Information Security 2008 2007:056365

    Content type: Research Article

    Published on:

  39. The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. Fo...

    Authors: Andreas Westfeld

    Citation: EURASIP Journal on Information Security 2008 2007:064521

    Content type: Research Article

    Published on:

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


Advertisement