IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States

Scopus rating (2021): CiteScore 13.2

Journal

Journal Metrics

Research Output

  1. 2017
  2. Published

    Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

    Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C., 1 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 123
    Check@CityULib
  3. Published

    Privacy-Preserving Image Denoising from External Cloud Databases

    Zheng, Y., Cui, H., Wang, C. & Zhou, J., 1 Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 24
    Check@CityULib
  4. 2016
  5. Published

    Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

    Yu, J., Ren, K. & Wang, C., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 106
    Check@CityULib
  6. Published

    Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Hu, P., Sung, C. W., Ho, S. & Chan, T. H., Feb 2016, In: IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib
  7. 2015
  8. Published

    Enabling Cloud Storage Auditing With Key-Exposure Resistance

    Yu, J., Ren, K., Wang, C. & Varadharajan, V., Jun 2015, In: IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 136
    Check@CityULib
  9. Blurred image splicing localization by exposing blur type inconsistency

    Bahrami, K., Kot, A. C., Li, L. & Li, H., 1 May 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 999-1009 7015579.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 78
    Check@CityULib
  10. Published

    New algorithms for secure outsourcing of large-scale systems of linear equations

    Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 178
    Check@CityULib
  11. Published

    Traceable CP-ABE: How to trace decryption devices found in the wild

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 51
    Check@CityULib
  12. 2014
  13. Published

    An effective method for detecting double JPEG compression with the same quantization matrix

    Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 75
    Check@CityULib
  14. Published

    Proof-Carrying Cloud Computation: The Case of Convex Optimization

    Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803 6884828.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 13
    Check@CityULib
  15. Published

    A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

    Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & 1 others, Xie, Q., Oct 2014, In: IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667-1680 6873259.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 79
    Check@CityULib
  16. Published

    CP-ABE with constant-size keys for lightweight devices

    Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., May 2014, In: IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771 6757025.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 104
    Check@CityULib
  17. 2013
  18. Published

    DAC-MACS: Effective data access control for multiauthority cloud storage systems

    Yang, K., Jia, X., Ren, K., Zhang, B. & Xie, R., Nov 2013, In: IEEE Transactions on Information Forensics and Security. 8, 11, p. 1790-1801 6585778.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 200
    Check@CityULib
  19. Reversible data hiding in encrypted images by reserving room before encryption

    Ma, K., Zhang, W., Zhao, X., Yu, N. & Li, F., Mar 2013, In: IEEE Transactions on Information Forensics and Security. 8, 3, p. 553-562 6470679.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 406
    Check@CityULib
  20. Published

    White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2013, In: IEEE Transactions on Information Forensics and Security. 8, 1, p. 76-88 6327660.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 145
    Check@CityULib
  21. 2011
  22. Published

    Efficient designated confirmer signature and DCS-based ambiguous optimistic fair exchange

    Huang, Q., Wong, D. S. & Susilo, W., Dec 2011, In: IEEE Transactions on Information Forensics and Security. 6, 4, p. 1233-1247 5940227.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  23. 2010
  24. Published

    Fragility analysis of adaptive quantization-based image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Mar 2010, In: IEEE Transactions on Information Forensics and Security. 5, 1, p. 133-147 5353741.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 22
    Check@CityULib
  25. 2009
  26. Published

    A study on the randomness measure of image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Dec 2009, In: IEEE Transactions on Information Forensics and Security. 4, 4, p. 928-932 5282541.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 12
    Check@CityULib
  27. 2008
  28. Published

    Multipurpose watermarking based on multiscale curvelet transform

    Zhang, C., Cheng, L. L., Qiu, Z. & Cheng, L. M., Dec 2008, In: IEEE Transactions on Information Forensics and Security. 3, 4, p. 611-619 4668376.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 55
    Check@CityULib
Previous 1 2 Next