banner image
image of Volume 5, Issue 1
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 5, Issue 1, March 2011

Volume 5, Issue 1

March 2011

Show / Hide details
    • Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification
      Steganalysis of JPEG steganography with complementary embedding strategy
      Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients
      Steganalysis of compressed speech to detect covert voice over Internet protocol channels
      Self-checking alternating logic bit-parallel Gaussian normal basis multiplier with type-t
      New watermark-removal method based on Eigen-image energy
      Cheating immune visual cryptography scheme
      Hardware–software co-design of an iris recognition algorithm
      Quantum entanglement and non-locality based secure computation for future communication

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address