IEEE Transactions on Information Forensics and Security

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

The thermal camera can capture keyboard surface temperature change after a human's touch. This phenomenon may be used to steal users' passwords physically. In this paper, based on the study of thermal dynamics of keyboards, we design a password break system using an infrared thermal camera. First, we build a signal model to describe the dynamic process of temperature change on the keyboard using Newton's law of cooling. Next, we develop a maximum likelihood parameter estimation algorithm to estimate the keystroke time instants.

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

Thanks to Mr. James Bond, we are aware that diamonds are forever but, are fingerprints? It is well known that biometrics brings to the security field a new paradigm; unlike traditional systems, individuals are not identified by something that they have or they know, but by what they are. While such an approach entails some clear advantages, an important question remains: is what we are today the same as what we will be tomorrow? This paper addresses such a key problem in the fingerprint modality based on a database of over 400K impressions coming from more than 250K different fingers.

Nowadays, mobile devices, such as smartphones, have been widely used all over the world. In addition, the performance of image recognition has drastically increased with deep learning technologies. From these backgrounds, some photo-based information services provided in a client-server architecture are getting popular: client users take a photo of a certain spot and send it to a server, while the server identifies the spot with an image recognizer and returns its related information to the users.

Technical Co-Sponsors:

  • IEEE Communications Society
  • IEEE Computational Intelligence Society
  • IEEE Computer Society
  • IEEE Engineering in Medicine and Biology Society
  • IEEE Information Theory Society

Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Luisa Verdoliva Editor-in-Chief:
Luisa Verdoliva
University Federico II of Naples, Italy
Email EiC
Email SPS Publications Office
Term Ends: 31 December 2027

 

 

 

Name Description
ADP ANONYMIZATION AND DATA PRIVACY
ADP-ANDE Anonymization and de-anonymization
ADP-PMOD Privacy modeling and analysis
ADP-PATT Privacy attacks

IEEE Transactions on Information Forensics and Security

Technical Co-Sponsors:

  • IEEE Communications Society
  • IEEE Computational Intelligence Society
  • IEEE Computer Society
  • IEEE Engineering in Medicine and Biology Society
  • IEEE Information Theory Society

Scope

The IEEE Transactions on Information Forensics and Security (TIFS) covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Pages

SPS Social Media

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel