7.5(top 2%)
impact factor
3.3K(top 5%)
papers
151.9K(top 5%)
citations
161(top 2%)
h-index
7.7(top 2%)
impact factor
4.9K
all documents
157.2K
doc citations
246(top 2%)
g-index

Top Articles

#TitleJournalYearCitations
1Rich Models for Steganalysis of Digital ImagesIEEE Transactions on Information Forensics and Security20121,396
2Digital Camera Identification From Sensor Pattern NoiseIEEE Transactions on Information Forensics and Security20061,006
3Ensemble Classifiers for Steganalysis of Digital MediaIEEE Transactions on Information Forensics and Security2012863
4Steganalysis by Subtractive Pixel Adjacency MatrixIEEE Transactions on Information Forensics and Security2010806
5A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation RecoveryIEEE Transactions on Information Forensics and Security2011774
6Federated Learning With Differential Privacy: Algorithms and Performance AnalysisIEEE Transactions on Information Forensics and Security2020773
7Biometrics: A Tool for Information SecurityIEEE Transactions on Information Forensics and Security2006761
8A Light CNN for Deep Face Representation With Noisy LabelsIEEE Transactions on Information Forensics and Security2018721
9Determining Image Origin and Integrity Using Sensor NoiseIEEE Transactions on Information Forensics and Security2008705
10Segmentation-Based Image Copy-Move Forgery Detection SchemeIEEE Transactions on Information Forensics and Security2015678
11Minimizing Additive Distortion in Steganography Using Syndrome-Trellis CodesIEEE Transactions on Information Forensics and Security2011653
12An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc NetworksIEEE Transactions on Information Forensics and Security2015643
13Privacy-Preserving Deep Learning via Additively Homomorphic EncryptionIEEE Transactions on Information Forensics and Security2018628
14Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous AuthenticationIEEE Transactions on Information Forensics and Security2013611
15A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud ComputingIEEE Transactions on Information Forensics and Security2016595
16An Evaluation of Popular Copy-Move Forgery Detection ApproachesIEEE Transactions on Information Forensics and Security2012584
17Age and Gender Estimation of Unfiltered FacesIEEE Transactions on Information Forensics and Security2014576
18Reversible Data Hiding in Encrypted Images by Reserving Room Before EncryptionIEEE Transactions on Information Forensics and Security2013550
19Face Spoof Detection With Image Distortion AnalysisIEEE Transactions on Information Forensics and Security2015544
20Reversible Image Watermarking Using Interpolation TechniqueIEEE Transactions on Information Forensics and Security2010535
21Separable Reversible Data Hiding in Encrypted ImageIEEE Transactions on Information Forensics and Security2012531
22Deep Residual Network for Steganalysis of Digital ImagesIEEE Transactions on Information Forensics and Security2019496
23Edge Adaptive Image Steganography Based on LSB Matching RevisitedIEEE Transactions on Information Forensics and Security2010466
24PUF Modeling Attacks on Simulated and Silicon DataIEEE Transactions on Information Forensics and Security2013450
25Robust and Secure Image HashingIEEE Transactions on Information Forensics and Security2006447
26Deep Learning Hierarchical Representations for Image SteganalysisIEEE Transactions on Information Forensics and Security2017445
27Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy ImprovementIEEE Transactions on Information Forensics and Security2016444
28Fingerprint-Based Fuzzy Vault: Implementation and PerformanceIEEE Transactions on Information Forensics and Security2007434
29HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud ComputingIEEE Transactions on Information Forensics and Security2012418
30Deep Representations for Iris, Face, and Fingerprint Spoofing DetectionIEEE Transactions on Information Forensics and Security2015405
31Content-Adaptive Steganography by Minimizing Statistical DetectabilityIEEE Transactions on Information Forensics and Security2016384
32Face Spoofing Detection Using Colour Texture AnalysisIEEE Transactions on Information Forensics and Security2016380
33VerifyNet: Secure and Verifiable Federated LearningIEEE Transactions on Information Forensics and Security2020373
34A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart CardsIEEE Transactions on Information Forensics and Security2015347
35Attribute-Based Encryption With Verifiable Outsourced DecryptionIEEE Transactions on Information Forensics and Security2013346
36Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation DetectionIEEE Transactions on Information Forensics and Security2018343
37Image Forgery Localization via Block-Grained Analysis of JPEG ArtifactsIEEE Transactions on Information Forensics and Security2012342
38Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud StorageIEEE Transactions on Information Forensics and Security2017342
39Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain SystemsIEEE Transactions on Information Forensics and Security2008340
40Region Duplication Detection Using Image Feature MatchingIEEE Transactions on Information Forensics and Security2010337
41Image Forgery Localization via Fine-Grained Analysis of CFA ArtifactsIEEE Transactions on Information Forensics and Security2012336
42Exposing Digital Forgeries From JPEG GhostsIEEE Transactions on Information Forensics and Security2009333
43Information-Theoretically Secret Key Generation for Fading Wireless ChannelsIEEE Transactions on Information Forensics and Security2010325
44Low-Complexity Features for JPEG Steganalysis Using Undecimated DCTIEEE Transactions on Information Forensics and Security2015322
45Zipf’s Law in PasswordsIEEE Transactions on Information Forensics and Security2017314
46Steganalysis Using Higher-Order Image StatisticsIEEE Transactions on Information Forensics and Security2006313
47Face Recognition Performance: Role of Demographic InformationIEEE Transactions on Information Forensics and Security2012312
48A Multimodal Deep Learning Method for Android Malware Detection Using Various FeaturesIEEE Transactions on Information Forensics and Security2019312
49Effective and Efficient Global Context Verification for Image Copy DetectionIEEE Transactions on Information Forensics and Security2017303
50An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud DataIEEE Transactions on Information Forensics and Security2017302