About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
IEEE Transactions on Information Forensics and Security
›
top-articles
IEEE Transactions on Information Forensics and Security
7.5
(top 2%)
impact factor
3.3K
(top 5%)
papers
151.9K
(top 5%)
citations
161
(top 2%)
h
-index
7.7
(top 2%)
impact factor
4.9K
all documents
157.2K
doc citations
246
(top 2%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Rich Models for Steganalysis of Digital Images
IEEE Transactions on Information Forensics and Security
2012
1,396
2
Digital Camera Identification From Sensor Pattern Noise
IEEE Transactions on Information Forensics and Security
2006
1,006
3
Ensemble Classifiers for Steganalysis of Digital Media
IEEE Transactions on Information Forensics and Security
2012
863
4
Steganalysis by Subtractive Pixel Adjacency Matrix
IEEE Transactions on Information Forensics and Security
2010
806
5
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
IEEE Transactions on Information Forensics and Security
2011
774
6
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
IEEE Transactions on Information Forensics and Security
2020
773
7
Biometrics: A Tool for Information Security
IEEE Transactions on Information Forensics and Security
2006
761
8
A Light CNN for Deep Face Representation With Noisy Labels
IEEE Transactions on Information Forensics and Security
2018
721
9
Determining Image Origin and Integrity Using Sensor Noise
IEEE Transactions on Information Forensics and Security
2008
705
10
Segmentation-Based Image Copy-Move Forgery Detection Scheme
IEEE Transactions on Information Forensics and Security
2015
678
11
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security
2011
653
12
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
IEEE Transactions on Information Forensics and Security
2015
643
13
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
IEEE Transactions on Information Forensics and Security
2018
628
14
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
IEEE Transactions on Information Forensics and Security
2013
611
15
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
IEEE Transactions on Information Forensics and Security
2016
595
16
An Evaluation of Popular Copy-Move Forgery Detection Approaches
IEEE Transactions on Information Forensics and Security
2012
584
17
Age and Gender Estimation of Unfiltered Faces
IEEE Transactions on Information Forensics and Security
2014
576
18
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
IEEE Transactions on Information Forensics and Security
2013
550
19
Face Spoof Detection With Image Distortion Analysis
IEEE Transactions on Information Forensics and Security
2015
544
20
Reversible Image Watermarking Using Interpolation Technique
IEEE Transactions on Information Forensics and Security
2010
535
21
Separable Reversible Data Hiding in Encrypted Image
IEEE Transactions on Information Forensics and Security
2012
531
22
Deep Residual Network for Steganalysis of Digital Images
IEEE Transactions on Information Forensics and Security
2019
496
23
Edge Adaptive Image Steganography Based on LSB Matching Revisited
IEEE Transactions on Information Forensics and Security
2010
466
24
PUF Modeling Attacks on Simulated and Silicon Data
IEEE Transactions on Information Forensics and Security
2013
450
25
Robust and Secure Image Hashing
IEEE Transactions on Information Forensics and Security
2006
447
26
Deep Learning Hierarchical Representations for Image Steganalysis
IEEE Transactions on Information Forensics and Security
2017
445
27
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
IEEE Transactions on Information Forensics and Security
2016
444
28
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
2007
434
29
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
IEEE Transactions on Information Forensics and Security
2012
418
30
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection
IEEE Transactions on Information Forensics and Security
2015
405
31
Content-Adaptive Steganography by Minimizing Statistical Detectability
IEEE Transactions on Information Forensics and Security
2016
384
32
Face Spoofing Detection Using Colour Texture Analysis
IEEE Transactions on Information Forensics and Security
2016
380
33
VerifyNet: Secure and Verifiable Federated Learning
IEEE Transactions on Information Forensics and Security
2020
373
34
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
IEEE Transactions on Information Forensics and Security
2015
347
35
Attribute-Based Encryption With Verifiable Outsourced Decryption
IEEE Transactions on Information Forensics and Security
2013
346
36
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
IEEE Transactions on Information Forensics and Security
2018
343
37
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
IEEE Transactions on Information Forensics and Security
2012
342
38
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
IEEE Transactions on Information Forensics and Security
2017
342
39
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
2008
340
40
Region Duplication Detection Using Image Feature Matching
IEEE Transactions on Information Forensics and Security
2010
337
41
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
IEEE Transactions on Information Forensics and Security
2012
336
42
Exposing Digital Forgeries From JPEG Ghosts
IEEE Transactions on Information Forensics and Security
2009
333
43
Information-Theoretically Secret Key Generation for Fading Wireless Channels
IEEE Transactions on Information Forensics and Security
2010
325
44
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
IEEE Transactions on Information Forensics and Security
2015
322
45
Zipf’s Law in Passwords
IEEE Transactions on Information Forensics and Security
2017
314
46
Steganalysis Using Higher-Order Image Statistics
IEEE Transactions on Information Forensics and Security
2006
313
47
Face Recognition Performance: Role of Demographic Information
IEEE Transactions on Information Forensics and Security
2012
312
48
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
IEEE Transactions on Information Forensics and Security
2019
312
49
Effective and Efficient Global Context Verification for Image Copy Detection
IEEE Transactions on Information Forensics and Security
2017
303
50
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
IEEE Transactions on Information Forensics and Security
2017
302
site/software ©
exaly
; All materials licenced under
CC by-SA
.