Abstract is missing.
- New Channel Selection Criterion for Spatial Domain SteganographyYane Zhong, Fangjun Huang, Dong Zhang. 1-7 [doi]
- A Study of Optimal Matrix for Efficient Matrix Embedding inYuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang. 8-18 [doi]
- A Novel Mapping Scheme for SteganalysisLicong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu. 19-33 [doi]
- Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image EstimationYanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao. 34-43 [doi]
- Calibration Based Reliable Detector for Detecting LSB Matching SteganographyFei Peng, Xiaolong Li, Bin Yang. 44-53 [doi]
- LSB Replacement Steganography Software Detection Based on Model CheckingZheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu. 54-68 [doi]
- An Attempt to Generalize Distortion Measure for JPEG SteganographyVasiliy Sachnev, Hyoung Joong Kim. 69-82 [doi]
- Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective InvariantsYagiz Yasaroglu, A. Aydin Alatan. 83-97 [doi]
- Consideration of the Watermark Inversion Attack and Its Invalidation FrameworkKazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato. 98-110 [doi]
- Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT TransformHuang Zhang, Xiao-Qiang Li. 111-119 [doi]
- Self-embedding Fragile Watermarking Scheme Combined Average with VQ EncodingHongJie He, Fan Chen, Yaoran Huo. 120-134 [doi]
- An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML DocumentsQuan Wen, Yufei Wang. 135-144 [doi]
- Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric ExtensionQiyin Zhao, Daqing Chen, Zhi Tao, Ji-Hua Gu. 145-155 [doi]
- High Capacity Data Hiding for Halftone Image AuthenticationMeng Guo, Hongbin Zhang. 156-168 [doi]
- Coded Spread Spectrum Watermarking SchemeMinoru Kuribayashi. 169-183 [doi]
- Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface ReflectionTakayuki Yamada, Seiichi Gohshi, Isao Echizen. 184-197 [doi]
- Image Splicing Verification Based on Pixel-Based Alignment MethodRimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai. 198-212 [doi]
- Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic ToolsPedro Comesaña, Fernando Pérez-González. 213-227 [doi]
- Distinguishing Computer Graphics from Photographic Images Using Local Binary PatternsZhaohong Li, Jingyu Ye, Yun-Qing Shi. 228-241 [doi]
- Detecting Removed Object from Video with Stationary BackgroundLeida Li, Xuewei Wang, Wei Zhang, Gaobo Yang, Guozhang Hu. 242-252 [doi]
- Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference SignalYongjian Hu, Chang-Tsun Li, Zhisheng Lv, Bei-Bei Liu. 253-266 [doi]
- A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow ConsistencyJuan Chao, Xinghao Jiang, Tanfeng Sun. 267-281 [doi]
- Countering Universal Image Tampering Detection with Histogram RestorationLuyi Chen, Shilin Wang, Shenghong Li, Jianhua Li. 282-289 [doi]
- Face Verification Using Color Sparse RepresentationWook Jin Shin, Seung-Ho Lee, Hyun-seok Min, Hosik Sohn, Yong Man Ro. 290-299 [doi]
- Rapid Image Splicing Detection Based on Relevance Vector MachineBo Su, Quanqiao Yuan, Yujin Zhang, Mengying Zhai, Shilin Wang. 300-310 [doi]
- An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation DegreeZhenghui Liu, Hongxia Wang. 311-326 [doi]
- Saliency-Based Region Log Covariance Feature for Image Copy DetectionXin He, Huiyun Jing, Qi Han, Xiamu Niu. 327-335 [doi]
- Blind Detection of Electronic Voice Transformation with Natural DisguiseYong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang. 336-343 [doi]
- Robust Median Filtering Detection Based on Filtered ResidualAnjie Peng, Xiangui Kang. 344-357 [doi]
- Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence ModulationXinpeng Zhang, Chuan Qin, Guangling Sun. 358-367 [doi]
- Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data HidingGuorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun-Qing Shi. 368-383 [doi]
- An Improved Algorithm for Reversible Data Hiding in Encrypted ImageJie Yu, Guopu Zhu, Xiaolong Li, Jianquan Yang. 384-394 [doi]
- Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion EmbeddingQuan Chen, Shijun Xiang, Xinrong Luo. 395-409 [doi]
- Automatic Anonymous Fingerprinting of Text Posted on Social Networking ServicesHoang-Quoc Nguyen-Son, Minh-Triet Tran, Dung Tran Tien, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen. 410-424 [doi]
- Memoryless Hash-Based Perceptual Image AuthenticationFang Liu, Qi-Kai Fu, Lee-Ming Cheng. 425-434 [doi]
- Visual Cryptography Based Watermarking: Definition and MeaningStelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu. 435-448 [doi]
- Region-in-Region Incrementing Visual Cryptography SchemeChing-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu. 449-463 [doi]
- A Secret Enriched Visual CryptographyFeng Liu, Wei Q. Yan, Peng Li, Chuan-Kun Wu. 464-484 [doi]
- On the Security of Multi-secret Visual Cryptography Scheme with Ring SharesZhengxin Fu, Bin Yu. 485-494 [doi]
- An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse RepresentationAixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li. 495-506 [doi]
- A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CAConghuan Ye, Hefei Ling, Fuhao Zou, Zhengding Lu, Zenggang Xiong, Kaibing Zhang. 507-519 [doi]
- A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel LearningDongyang Cheng, Tanfeng Sun, Xinghao Jiang. 520-529 [doi]