Skip to main content

Articles

Page 4 of 4

  1. For evaluation of biometric performance of biometric components and system, the availability of independent databases and desirably independent evaluators is important. Both databases of significant size and i...

    Authors: Davrondzhon Gafurov, Patrick Bours, Bian Yang and Christoph Busch
    Citation: EURASIP Journal on Information Security 2010 2010:391761
  2. An overview of reversible watermarking techniques appeared in literature during the last five years approximately is presented in this paper. In addition to this a general classification of algorithms on the b...

    Authors: Roberto Caldelli, Francesco Filippini and Rudy Becarelli
    Citation: EURASIP Journal on Information Security 2010 2010:134546
  3. One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the ident...

    Authors: Paula Carrillo, Hari Kalva and Spyros Magliveras
    Citation: EURASIP Journal on Information Security 2010 2009:429581
  4. This paper presents a method which attains recoverable privacy protection for video content distribution. The method is based on discrete wavelet transform (DWT), which generates scaling coefficients and wavel...

    Authors: Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta and Noboru Babaguchi
    Citation: EURASIP Journal on Information Security 2010 2009:293031
  5. Signal processing in the encrypted domain (s.p.e.d.) appears an elegant solution in application scenarios, where valuable signals must be protected from a possibly malicious processing device. In this paper, w...

    Authors: Tiziano Bianchi, Alessandro Piva and Mauro Barni
    Citation: EURASIP Journal on Information Security 2009 2009:716357
  6. One-time key based phase scrambling is proposed for privacy-protected image matching. The image matching is performed using invisible templates that are protected by phase scrambling. A key for phase scramblin...

    Authors: Izumi Ito (EURASIP Member) and Hitoshi Kiya (EURASIP Member)
    Citation: EURASIP Journal on Information Security 2009 2009:841045
  7. The discrete Fourier transform-rational dither modulation (DFT-RDM) has been proposed as a way to provide robustness to linear-time-invariant (LTI) filtering for quantization-based watermarking systems. This s...

    Authors: Michele Scagliola, Fernando Pérez-González and Pietro Guccione
    Citation: EURASIP Journal on Information Security 2009 2009:914937
  8. Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine indiv...

    Authors: Shuiming Ye, Ying Luo, Jian Zhao and Sen-ChingS Cheung
    Citation: EURASIP Journal on Information Security 2009 2009:865259
  9. From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy informati...

    Authors: JithendraK Paruchuri, Sen-chingS Cheung and MichaelW Hail
    Citation: EURASIP Journal on Information Security 2009 2009:236139
  10. A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD) embedding schem...

    Authors: Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee and Yen-Ping Chu
    Citation: EURASIP Journal on Information Security 2009 2009:658047
  11. This paper proposes to determine a sufficient number of images for reliable classification and to use feature selection to select most relevant features for achieving reliable steganalysis. First dimensionalit...

    Authors: Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten and Olli Simula
    Citation: EURASIP Journal on Information Security 2009 2009:901381
  12. CardSpace (formerly known as InfoCard) is a digital identity management system that has recently been adopted by Microsoft. In this paper we identify two security shortcomings in CardSpace that could lead to a...

    Authors: WaleedA Alrodhan and ChrisJ Mitchell
    Citation: EURASIP Journal on Information Security 2009 2009:167216
  13. A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital i...

    Authors: Hao-Tian Wu and Jean-Luc Dugelay
    Citation: EURASIP Journal on Information Security 2009 2009:317165
  14. A novel model-based steganographic technique for JPEG images is proposed where the model, derived from heuristic assumptions about the shape of the DCT frequency histograms, is dependent on a stegokey. The sec...

    Authors: Lorenzo Rossi, Fabio Garzia and Roberto Cusani
    Citation: EURASIP Journal on Information Security 2009 2009:382310
  15. The use of syndrome coding in steganographic schemes tends to reduce distortion during embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) and allow to lock positions which ...

    Authors: Caroline Fontaine and Fabien Galand
    Citation: EURASIP Journal on Information Security 2009 2009:274845
  16. In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, I...

    Authors: A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq and J.-J. Quisquater
    Citation: EURASIP Journal on Information Security 2008 2008:179290
  17. We introduce the concept of reliability in watermarking as the ability of assessing that a probability of false alarm is very low and below a given significance level. We propose an iterative and self-adapting...

    Authors: Frédéric Cérou, Teddy Furon and Arnaud Guyader
    Citation: EURASIP Journal on Information Security 2008 2008:414962
  18. This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows” for some reas...

    Authors: Teddy Furon and Patrick Bas
    Citation: EURASIP Journal on Information Security 2008 2008:597040
  19. Spread-spectrum watermarking is generally considered to be robust against collusion attacks, and thereby suitable for digital fingerprinting. We have previously introduced the minority extreme attack (IWDW' 07...

    Authors: HansGeorg Schaathun
    Citation: EURASIP Journal on Information Security 2008 2008:803217
  20. The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing ...

    Authors: Wasil Elsadig Eltahir, M. J. E. Salami, Ahmad Faris Ismail and Weng Kin Lai
    Citation: EURASIP Journal on Information Security 2008 2008:345047
  21. The use of digital watermarking in real applications is impeded by the weakness of current available algorithms against signal processing manipulations leading to the desynchronization of the watermark embedde...

    Authors: Angela D'Angelo, Mauro Barni and Neri Merhav
    Citation: EURASIP Journal on Information Security 2008 2008:345184
  22. We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce t...

    Authors: M. A. Haleem, K. P. Subbalakshmi and R. Chandramouli
    Citation: EURASIP Journal on Information Security 2008 2007:098374
  23. A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compli...

    Authors: Yang Yang, Bin B. Zhu, Shipeng Li and Nenghai Yu
    Citation: EURASIP Journal on Information Security 2008 2007:056365
  24. JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security an...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl
    Citation: EURASIP Journal on Information Security 2008 2007:094565
  25. The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. Fo...

    Authors: Andreas Westfeld
    Citation: EURASIP Journal on Information Security 2008 2007:064521
  26. Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensit...

    Authors: Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González
    Citation: EURASIP Journal on Information Security 2008 2007:045731
  27. An objective performance measure is proposed to evaluate the intelligibility of a speech signal having its frequency subbands permuted. The proposed tool can be used to generate efficient keys for frequency do...

    Authors: AMCR Borzino, JA Apolinário Jr. and DG da Silva
    Citation: EURASIP Journal on Information Security 2008 2007:032028
  28. From December 15, 2005 to June 15, 2006, the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the peak signal-to-noise ratio (PSNR) measur...

    Authors: Pedro Comesaña and Fernando Pérez-González
    Citation: EURASIP Journal on Information Security 2007 2007:025308
  29. Multimedia fingerprinting, also known as robust or perceptual hashing, aims at representing multimedia signals through compact and perceptually significant descriptors (hash values). In this paper, we examine ...

    Authors: Neil J. Hurley, Félix Balado and Guénolé C. M. Silvestre
    Citation: EURASIP Journal on Information Security 2007 2008:195238
  30. One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...

    Authors: S.-C. S. Cheung and Thinh Nguyen
    Citation: EURASIP Journal on Information Security 2007 2007:051368
  31. The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in t...

    Authors: Scott Craver, Idris Atakli and Jun Yu
    Citation: EURASIP Journal on Information Security 2007 2007:043034
  32. Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...

    Authors: Caroline Fontaine and Fabien Galand
    Citation: EURASIP Journal on Information Security 2007 2007:013801
  33. Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...

    Authors: J. P. Prins, Z. Erkin and R. L. Lagendijk
    Citation: EURASIP Journal on Information Security 2007 2007:031340
  34. This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error r...

    Authors: Michael Gschwandtner, Andreas Uhl and Peter Wild
    Citation: EURASIP Journal on Information Security 2007 2007:048179
  35. The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investiga...

    Authors: A Piva and M Barni
    Citation: EURASIP Journal on Information Security 2007 2007:098684
  36. We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...

    Authors: Enrico Magli, Marco Grangetto and Gabriella Olmo
    Citation: EURASIP Journal on Information Security 2007 2007:079048
  37. A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...

    Authors: Daniel Socek, Spyros Magliveras, Dubravko Ćulibrk, Oge Marques, Hari Kalva and Borko Furht
    Citation: EURASIP Journal on Information Security 2007 2007:052965
  38. The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...

    Authors: C Orlandi, A Piva and M Barni
    Citation: EURASIP Journal on Information Security 2007 2007:037343

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here