Abstract is missing.
- Passive Detection of Paint-Doctored JPEG ImagesYu Qian Zhao, Frank Y. Shih, Yun Q. Shi. 1-11 [doi]
- Detecting Digital Image Splicing in Chroma SpacesXudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang. 12-22 [doi]
- Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree ModelFeng Pan, Jiwu Huang. 23-28 [doi]
- A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-PlaneLiang Zhao, Avishek Adhikari, Kouichi Sakurai. 29-44 [doi]
- Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel BitLiang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai. 45-59 [doi]
- Plane Transform Visual CryptographyJonathan Weir, Weiqi Yan. 60-74 [doi]
- A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap ImagesGopal Narayanan, Yun-Qing Shi. 75-89 [doi]
- A Smart Phone Image Database for Single Image Recapture DetectionXinting Gao, Bo Qiu, JingJing Shen, Tian-Tsong Ng, Yun-Qing Shi. 90-104 [doi]
- Detection of Tampering Inconsistencies on Mobile PhotosHong Cao, Alex C. Kot. 105-119 [doi]
- Tampered Region Localization of Digital Color Images Based on JPEG Compression NoiseWei Wang 0025, Jing Dong, Tieniu Tan. 120-133 [doi]
- Robust Audio Watermarking by Using Low-Frequency HistogramShijun Xiang. 134-147 [doi]
- Robust Blind Watermarking Scheme Using Wave AtomsH. Y. Leung, L. M. Cheng. 148-158 [doi]
- Robust Watermarking of H.264/SVC-Encoded Video: Quality and Resolution ScalabilityPeter Meerwald, Andreas Uhl. 159-169 [doi]
- Reversible Watermarking Using Prediction Error Histogram and BlockingBo Ou, Yao Zhao, Rongrong Ni. 170-180 [doi]
- An Efficient Pattern Substitution Watermarking Method for Binary ImagesKeming Dong, Hyoung Joong Kim. 181-188 [doi]
- New JPEG Steganographic Scheme with High Security PerformanceFangjun Huang, Yun-Qing Shi, Jiwu Huang. 189-201 [doi]
- Ternary Data Hiding Technique for JPEG SteganographyVasiliy Sachnev, Hyoung Joong Kim. 202-210 [doi]
- Interleaving Embedding Scheme for ECC-Based Multimedia FingerprintingXuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang. 211-223 [doi]
- A Novel Collusion Attack Strategy for Digital FingerprintingHefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, Zhengding Lu. 224-238 [doi]
- Privacy Preserving Facial and Fingerprint Multi-biometric AuthenticationEsla Timothy Anzaku, Hosik Sohn, Yong Man Ro. 239-250 [doi]
- Blind Linguistic Steganalysis against Translation Based SteganographyZhili Chen, Liusheng Huang, Peng Meng, Wei Yang, Haibo Miao. 251-265 [doi]
- Blind Quantitative Steganalysis Based on Feature Fusion and Gradient BoostingQingxiao Guan, Jing Dong, Tieniu Tan. 266-279 [doi]
- IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device CharacteristicsTakayuki Yamada, Seiichi Gohshi, Isao Echizen. 280-292 [doi]
- On Limits of Embedding in 3D Images Based on 2D Watson s ModelZahra Kavehvash, Shahrokh Ghaemmaghami. 293-304 [doi]
- A Reversible Acoustic Steganography for Integrity VerificationXuping Huang, Akira Nishimura, Isao Echizen. 305-316 [doi]