Abstract is missing.
- Watermarking, a Mature Technology - Retrospect and ProspectBede Liu. 1 [doi]
- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and DetectionAhmad-Reza Sadeghi. 2-18 [doi]
- Detecting Photographic Composites of PeopleMicah K. Johnson, Hany Farid. 19-33 [doi]
- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005Raphael Chung-Wei Phan, Bok-Min Goi. 34-44 [doi]
- Attack Analysis for He & Wu s Joint Watermarking/Fingerprinting SchemeHans Georg Schaathun. 45-59 [doi]
- Multiple Watermarking in Visual CryptographyHao Luo, Zhe-Ming Lu, Jeng-Shyang Pan. 60-70 [doi]
- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video CodingYeongyun Kim, Sung Ho Jin, Yong Man Ro. 71-86 [doi]
- Fusion Based Blind Image Steganalysis by Boosting Feature SelectionJing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan. 87-98 [doi]
- Steganalysis of Multi Bit Plane Image SteganographyJohann Barbier, Kichenakoumar Mayoura. 99-111 [doi]
- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential AnalysisShunquan Tan, Jiwu Huang, Yun Q. Shi. 112-126 [doi]
- Weaknesses of MB2Christian Ullerich, Andreas Westfeld. 127-142 [doi]
- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG SteganalysisBin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi. 143-157 [doi]
- Steganalysis Versus Splicing DetectionYun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su. 158-172 [doi]
- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and ScanningChris Culnane, Helen Treharne, Anthony T. S. Ho. 173-187 [doi]
- A General Data Hiding Framework and Multi-level Signature for Binary ImagesHuijuan Yang, Alex ChiChung Kot. 188-202 [doi]
- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy DocumentsWalter Geisselhardt, Taswar Iqbal. 203-221 [doi]
- Reversible Quantization-Index Modulation Using Neighboring CorrelationChin-Chen Chang, Wen-Chuan Wu. 222-232 [doi]
- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ DomainZhe-Ming Lu, Zhen Li. 233-243 [doi]
- Reversible Data Hiding Using Prediction Error Values EmbeddingYongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen. 244-253 [doi]
- An Improved Reversible Difference Expansion Watermarking AlgorithmVasiliy Sachnev, Hyoung Joong Kim, Shijun Xiang, Jeho Nam. 254-263 [doi]
- Optimum Histogram Pair Based Image Lossless Data EmbeddingGuorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong. 264-278 [doi]
- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data HidingAnu Pramila, Anja Keskinarkaus, Tapio Seppänen. 279-293 [doi]
- GA-Based Robustness Evaluation Method for Digital Image WatermarkingGiulia Boato, V. Conotter, Francesco G. B. De Natale. 294-307 [doi]
- Dither Modulation in the Logarithmic DomainPedro Comesaña, Fernando Pérez-González. 308-322 [doi]
- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling AttackKyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee. 323-334 [doi]
- Secure Video Multicast Based on Desynchronized Fingerprint and Partial EncryptionZhongxuan Liu, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, Haila Wang. 335-349 [doi]
- Design an Aperiodic Stochastic Resonance Signal Processor for Digital WatermarkingShuifa Sun, Bangjun Lei, Sheng Zheng, Sam Kwong, Xuejun Zhou. 350-364 [doi]
- Watermarking for Authentication of LZ-77 Compressed DocumentsYanfang Du, Jing Zhang, Yuting Su. 365-372 [doi]
- Robust Audio Zero-Watermark Based on LWT and Chaotic ModulationRangding Wang, Wenji Hu. 373-381 [doi]
- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone ImagesLinna Tang, Jiangqun Ni, Chuntao Wang, Rongyue Zhang. 382-394 [doi]
- On the Complexity of Obtaining Optimal Watermarking SchemesJulien Lafaye. 395-409 [doi]
- A Theoretical Framework for Watermarking of Compressed SignalsSéverine Baudry, Philippe Nguyen. 410-422 [doi]
- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control ModelWeina Jiang, Anthony T. S. Ho, Helen Treharne. 423-439 [doi]
- Multiple Scrambling and Adaptive Synchronization for Audio WatermarkingYiqing Lin, Waleed H. Abdulla. 440-453 [doi]
- A Comparison of DCT and DWT Block Based Watermarking on Medical Image QualityJason Dowling, Birgit M. Planitz, Anthony J. Maeder, Jiang Du, Binh Pham, Colin Boyd, Shaokang Chen, Andrew P. Bradley, Stuart Crozier. 454-466 [doi]
- A High Payload VQ Steganographic Method for Binary ImagesChin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang. 467-481 [doi]