- Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme. Adaptive Steganography and Steganalysis with Fixed-Size Embedding. T. Data Hiding and Multimedia Security, 10:69-91, 2015.
- Isao Echizen, Takayuki Yamada, Seiichi Gohshi. IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images. T. Data Hiding and Multimedia Security, 10:38-54, 2015.
- John Aycock, Daniel Medeiros Nunes de Castro. Permutation Steganography in FAT Filesystems. T. Data Hiding and Multimedia Security, 10:92-105, 2015.
- Bingbing Xia, Xianfeng Zhao, Dengguo Feng, Mingsheng Wang. Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter. T. Data Hiding and Multimedia Security, 10:1-20, 2015.
- Fang Liu, Lee-Ming Cheng. Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks. T. Data Hiding and Multimedia Security, 10:21-37, 2015.
- Harrison Neal, Hala ElAarag. A Reliable Covert Communication Scheme Based on VoIP Steganography. T. Data Hiding and Multimedia Security, 10:55-68, 2015.
- Zhengxin Fu, Bin Yu. Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares. T. Data Hiding and Multimedia Security, 9:42-56, 2014.
- Roman V. Yampolskiy, Jovan David Rebolledo Méndez, Musa Hindi. Password Protected Visual Cryptography via Cellular Automaton Rule 30. T. Data Hiding and Multimedia Security, 9:57-67, 2014.
- Yasushi Yamaguchi. Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images. T. Data Hiding and Multimedia Security, 9:25-41, 2014.
- Feng Liu, Wei Q. Yan, Peng Li, Chuan-Kun Wu. ESSVCS: An Enriched Secret Sharing Visual Cryptography. T. Data Hiding and Multimedia Security, 9:1-24, 2014.