2021 Index IEEE Transactions on Information Forensics and Security Vol. 16

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IEEE Transactions on Software Engineering, Vol. 28

data types; cf. Data encapsulation; Inheritance Administrative data processing; cf. Spreadsheet programs Algebraic specification dyn. model for OO modeling, formalization and integrat. Cheng, B.H.C., + , T-SE Aug 02 747-762 Application program interfaces config. mgt. policy prog. testbed. van der Hoek, A., + , T-SE Jan 02 79-99 dyn. real-time distributed systs. engng. Ravindran, B., T-SE Jan 02...

متن کامل

Ieee Transactions on Information Forensics and Security,; Schonberg and Kirovski; Formatted Using L a T E X 1 Eyecerts

In this paper we propose EYECERTS, a biometric system for identification of people which achieves off-line verification of certified, cryptographically secure documents. An EYECERT is a printed document which certifies the association of content on the document with a biometric feature a compressed version of a human iris in this work. The system is highly cost-effective since it does not requi...

متن کامل

IEEE TRANSACTIONS ON INFORMATION THEORY VOL NO JANUARY Maximum Independence and Mutual Information

If I I Ik are random boolean variables and the joint probabilities up to the k st order are known the values of the k th order probabilities maximizing the overall entropy have been de ned as the maximum independence estimate In the paper some contributions deriving from the de ni tion of maximum independence probabilities are proposed First it is shown that the maximum independence values are ...

متن کامل

Ieee Transactions on Information Theory

A class of codes, having check matrices which are the tensor products of the check matrices of nonbinary and binary codes has been described. In particular, it has been shown in detail how the error-correction, error-detection and error-location capabilities of such codes depend on the component codes. Many other variations of such codes exist in addition to those discussed in this paper. In so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2022.3143280