Content Gazette - May 2017 - 13

MAY 2017

VOLUME 12

NUMBER 5

ITIFA6

(ISSN 1556-6013)

REGULAR PAPERS

iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning http://dx.doi.org/10.1109/TIFS.2016.2636090 . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J. Yu, B. Zhang, Z. Kuang, D. Lin, and J. Fan
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network
http://dx.doi.org/10.1109/TIFS.2016.2636093 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Z. Zhao and A. Kumar
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption http://dx.doi.org/10.1109/TIFS.2016.2639340 . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . K. Rohloff, D. B. Cousins, and D. Sumorok
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities http://dx.doi.org/10.1109/TIFS.2016.2639344 . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Abouelenien, V. Pérez-Rosas, R. Mihalcea, and M. Burzo
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel http://dx.doi.org/10.1109/TIFS.2016.2639446 . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q. Yang, P. Gasti, G. Zhou, A. Farajidavar, and K. S. Balagani
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation http://dx.doi.org/10.1109/TIFS.2016.2640938 . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Al-Ani and F. Khelifi
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure http://dx.doi.org/10.1109/TIFS.2016.2641378 . . . . . . . . . Y.-C. Chen
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on
AES-Like Block Ciphers http://dx.doi.org/10.1109/TIFS.2016.2646638 . . . . S. Patranabis, A. Chakraborty, D. Mukhopadhyay, and P. P. Chakrabarti
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android http://dx.doi.org/10.1109/TIFS.2016.2646641 . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Sun, X. Li, J. C. S. Lui, R. T. B. Ma, and Z. Liang
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers http://dx.doi.org/10.1109/TIFS.2016.2647218 . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V. Heydari, S. Kim, and S.-M. Yoo
Number Theoretic Transforms for Secure Signal Processing http://dx.doi.org/10.1109/TIFS.2016.2647223 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. Pedrouzo-Ulloa, J. R. Troncoso-Pastoriza, and F. Pérez-González
Radio Biometrics: Human Recognition Through a Wall http://dx.doi.org/10.1109/TIFS.2016.2647224 . . . . . . . Q. Xu, Y. Chen, B. Wang, and K. J. R. Liu
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks http://dx.doi.org/10.1109/TIFS.2017.2656458 . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R. Bagai, N. Malik, and M. Jadliwala
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation http://dx.doi.org/10.1109/TIFS.2017.2656459 . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Y.-W. P. Hong, L.-M. Huang, and H.-T. Li
Online/Offline Provable Data Possession http://dx.doi.org/10.1109/TIFS.2017.2656461 . . . . . . . . . . . . . . . . . Y. Wang, Q. Wu, B. Qin, S. Tang, and W. Susilo
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers
http://dx.doi.org/10.1109/TIFS.2017.2656462 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G. Chen, J. P. Coon, and M. Di Renzo
Detecting Morphological Filtering of Binary Images http://dx.doi.org/10.1109/TIFS.2017.2656472 . . . . . . . . . . . . . . . . . . . . F. G. B. De Natale and G. Boato
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution
http://dx.doi.org/10.1109/TIFS.2017.2656473 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. Okada and K. Umeno
An Image-Based Approach to Detection of Fake Coins http://dx.doi.org/10.1109/TIFS.2017.2656478 . . . . . . . . . . . . . . . . . . . . . . L. Liu, Y. Lu, and C. Y. Suen
Image Forgery Localization via Integrating Tampering Possibility Maps http://dx.doi.org/10.1109/TIFS.2017.2656823 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. Li, W. Luo, X. Qiu, and J. Huang

www.signalprocessingsociety.org

[13]

MAY 2017

1005
1017
1031
1042
1056
1067
1082
1092
1103
1113
1125
1141
1156
1170
1182
1195
1207
1218
1227
1240


http://dx.doi.org/10.1109/TIFS.2016.2636090 http://dx.doi.org/10.1109/TIFS.2016.2636093 http://dx.doi.org/10.1109/TIFS.2016.2639340 http://dx.doi.org/10.1109/TIFS.2016.2639344 http://dx.doi.org/10.1109/TIFS.2016.2639446 http://dx.doi.org/10.1109/TIFS.2016.2640938 http://dx.doi.org/10.1109/TIFS.2016.2641378 http://dx.doi.org/10.1109/TIFS.2016.2646638 http://dx.doi.org/10.1109/TIFS.2016.2646641 http://dx.doi.org/10.1109/TIFS.2016.2647218 http://dx.doi.org/10.1109/TIFS.2016.2647223 http://dx.doi.org/10.1109/TIFS.2016.2647224 http://dx.doi.org/10.1109/TIFS.2017.2656458 http://dx.doi.org/10.1109/TIFS.2017.2656459 http://dx.doi.org/10.1109/TIFS.2017.2656461 http://dx.doi.org/10.1109/TIFS.2017.2656462 http://dx.doi.org/10.1109/TIFS.2017.2656472 http://dx.doi.org/10.1109/TIFS.2017.2656473 http://dx.doi.org/10.1109/TIFS.2017.2656478 http://dx.doi.org/10.1109/TIFS.2017.2656823 http://www.signalprocessingsociety.org

Table of Contents for the Digital Edition of Content Gazette - May 2017

Content Gazette - May 2017 - Cover1
Content Gazette - May 2017 - Cover2
Content Gazette - May 2017 - 1
Content Gazette - May 2017 - 2
Content Gazette - May 2017 - 3
Content Gazette - May 2017 - 4
Content Gazette - May 2017 - 5
Content Gazette - May 2017 - 6
Content Gazette - May 2017 - 7
Content Gazette - May 2017 - 8
Content Gazette - May 2017 - 9
Content Gazette - May 2017 - 10
Content Gazette - May 2017 - 11
Content Gazette - May 2017 - 12
Content Gazette - May 2017 - 13
Content Gazette - May 2017 - 14
Content Gazette - May 2017 - 15
Content Gazette - May 2017 - 16
Content Gazette - May 2017 - 17
Content Gazette - May 2017 - 18
Content Gazette - May 2017 - 19
Content Gazette - May 2017 - 20
Content Gazette - May 2017 - 21
Content Gazette - May 2017 - 22
Content Gazette - May 2017 - 23
Content Gazette - May 2017 - 24
Content Gazette - May 2017 - 25
Content Gazette - May 2017 - 26
Content Gazette - May 2017 - 27
Content Gazette - May 2017 - 28
Content Gazette - May 2017 - 29
Content Gazette - May 2017 - 30
Content Gazette - May 2017 - 31
Content Gazette - May 2017 - 32
Content Gazette - May 2017 - 33
Content Gazette - May 2017 - Cover3
Content Gazette - May 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202006
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202005
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202004
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202003
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202002
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_202001
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201912
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201911
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201910
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201909
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201908
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201907
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201906
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201905
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201904
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201903
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201902
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201901
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201812
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201811
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201810
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201809
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201808
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201807
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201806
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201805
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201804
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201803
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201802
https://www.nxtbook.com/nxtbooks/ieee/contentgazette_201801
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1217
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1117
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1017
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0917
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0817
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0717
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0617
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0517
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0417
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0317
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0217
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0117
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1216
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1116
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1016
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0916
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0816
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0716
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0616
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0516
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0416
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0316
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0216
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0116
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1215
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1115
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1015
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0915
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0815
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0715
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0615
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0515
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0415
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0315
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0215
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0115
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1214
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1114
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1014
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0914
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0814
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0714
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0614
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0514
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0414
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0314
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0214
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0114
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1213
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1113
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1013
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0913
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0813
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0713
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0613
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0513
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0413
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0313
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0213
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0113
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1212
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1112
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1012
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0912
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0812
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0712
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0612
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0512
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0412
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0312
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0212
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0112
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1211
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1111
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_1011
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0911
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0811
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0711
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0611
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0511
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0411
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0311
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0211
https://www.nxtbook.com/nxtbooks/ieee/content_gazette_0111
https://www.nxtbookmedia.com