About
Technology
Issues
FAQ
Title
Abstract
Text
Figure Captions
Table Cells
Section Titles
Keywords
Subjects
Authors
From
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
To
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
All Types
Articles
Communications
Reviews
Discussions
Case Reports
Chapters
Books
News
Editorials
Order By
Order By Year ASC
Order By Year DESC
Order By Citations ASC
Order By Citations DESC
Go
Scientometrics
Impact Factor
Discipline Ranks
H-Index
G-Index
Articles
Citations
Article Citations
Citation Distribution
Search This Journal
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
exaly
›
Journals
›
IEEE Transactions on Information Forensics and Security
›
Top Articles
IEEE Transactions on Information Forensics and Security
Electrical Engineering
8
(top 1%)
Impact Factor
9.6
(top 1%)
extended IF
135
(top 2%)
H-Index
3K
authors
3K
papers
103.8K
citations
2.1K
citing journals
21.5K
citing authors
Most Cited Articles of IEEE Transactions on Information Forensics and Security
Title
Year
Citations
Rich Models for Steganalysis of Digital Images
2012
884
Digital camera identification from sensor pattern noise
2006
714
Ensemble Classifiers for Steganalysis of Digital Media
2012
650
Steganalysis by Subtractive Pixel Adjacency Matrix
2010
597
Segmentation-Based Image Copy-Move Forgery Detection Scheme
2015
594
Determining Image Origin and Integrity Using Sensor Noise
2008
532
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
2016
507
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
2015
465
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
2011
455
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
2013
454
An Evaluation of Popular Copy-Move Forgery Detection Approaches
2012
447
A Light CNN for Deep Face Representation With Noisy Labels
2018
425
Reversible Image Watermarking Using Interpolation Technique
2010
424
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
2016
397
Age and Gender Estimation of Unfiltered Faces
2014
394
Separable Reversible Data Hiding in Encrypted Image
2012
391
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
2013
366
Face Spoof Detection With Image Distortion Analysis
2015
350
Robust and secure image hashing
2006
329
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection
2015
314
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
2018
313
0
1
2
next
How are inpact factors calculated?
The impact factor (IF) is calculated by counting citations from peer-reviewed journals only.
extended IF
also counts citations from books and conference papers. However, no patent, abstract, working papers, online documents, etc., are covered.
site/software ©
exaly
; All materials licenced under
CC by-SA
.