Abstract is missing.
- Resampling and the detection of LSB matching in color bitmapsAndrew D. Ker. 1-15
- ML detection of steganographyMark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan. 16-27
- Space filling curves in steganalysisAndreas Westfeld. 28-37
- Steganalysis of spread spectrum data hiding exploiting cover memoryKenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath. 38-46
- Efficient secure image transmission: compression integrated with encryptionPaul Salama, Brian King. 47-58
- A model for improving the performance of feature-extraction-based robust hashingElizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley. 59-67
- Cumulant-based image fingerprintsLongjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun. 68-75
- Development of a platform offering video copyright protection and security against illegal distributionElisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas. 76-83
- Security architectures and analysis for content adaptationWenjun Zeng, Junqiang Lan, Xinhua Zhuang. 84-95
- Group-based joint coding and embedding technique for multimedia fingerprintingShan He, Min Wu. 96-105
- Shedding light on some possible remedies against watermark desynchronization: a case studyMauro Barni. 106-113
- Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS)Roman Tzschoppe, Robert Bauml, Robert F. H. Fischer, Johannes B. Huber, André Kaup. 114-123
- Time jitter versus additive noise in a game theory contextAbdellatif Zaidi, Rémy Boyer, Pierre Duhamel. 124-135
- Worst-case additive attack against quantization-based data-hiding methodsJosé-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun. 136-146
- Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attackChun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang. 147-163
- Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarkingRoberto Caldelli, Alessia De Rosa, Rudy Becarelli, Mauro Barni. 164-174
- Embedding multiple watermarks in the DFT domain using low- and high-frequency bandsEmir Ganic, Scott D. Dexter, Ahmet M. Eskicioglu. 175-184
- TCQ-based quantizer design for data hiding in imagesNing Liu, Koduvayur P. Subbalakshmi. 185-193
- Handling uneven embedding capacity in binary images: a revisitMin Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou. 194-205
- Ensuring gain-invariance in high-rate data hidingFernando Pérez-González, Carlos Mosquera, Mauro Barni, Andrea Abrardo. 206-217
- Integer-DCT-based reversible image watermarking by adaptive coefficient modificationBian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun. 218-229
- Three-dimensional image quality measurement for the benchmarking of 3D watermarking schemesPatrice Rondao-Alface, Mathieu De Craene, Benoit M. Macq. 230-240
- Further progress in watermark evaluation testbed (WET)Hyung Cook Kim, Eugene T. Lin, Oriol Guitart, Edward J. Delp. 241-251
- Benchmarking steganographic and steganalysis techniquesMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon. 252-263
- Characterization of steganographic algorithms using software metricsChad Heitzenrater. 264-274
- Application-oriented audio watermark benchmark serviceAndreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp. 275-286
- A framework for data-driven algorithm testingWolfgang Funk, Daniel Kirchner. 287-297
- Applying Erez and Ten Brink s dirty paper codes to data hidingPedro Comesaña, Fernando Pérez-González, Frans M. Willems. 298-307
- On achievable error exponents for watermarkingPierre Moulin, Ying Wang. 308-317
- Secure Lempel-Ziv compression with embedded encryptionDahua Xie, C. C. Jay Kuo. 318-327
- Writing on wet paperJessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal. 328-340
- Spread-spectrum vs. quantization-based data hiding: misconceptions and implicationsLuis Pérez-Freire, Fernando Pérez-González. 341-352
- Applying interest operators in semi-fragile video watermarkingStefan Thiemert, Hichem Sahbi, Martin Steinebach. 353-362
- Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statisticsMehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan. 363-369
- Temporal synchronization of watermarked video using image hashingOztan Harmanci, Mehmet Kucukgoz, Mehmet Kivanç Mihçak. 370-380
- Robust digital watermark solution for intercoded frames of MPEG video dataEnrico Hauer, Martin Steinebach. 381-390
- Use of inferential statistics to estimate error probability of video watermarksIsao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka. 391-399
- Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronizationPatrice Rondao-Alface, Benoit M. Macq. 400-408
- High-capacity reversible watermarking for 2D vector dataMichael Voigt, Bian Yang, Christoph Busch. 409-417
- Modeling the print-scan process for resilient data hidingKaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran. 418-429
- Printer identification based on graylevel co-occurrence features for security and forensic applications.Aravind K. Mikkilineni, Pei-Ju Chiang, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. 430-440
- Natural language watermarkingMercan Topkara, Cüneyt M. Taskiran, Edward J. Delp. 441-452
- Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and managementRenato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun. 453-464
- Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiersPablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar. 465-473
- Security analysis for biometric data in ID documentsSascha Schimke, Stefan Kiltz, Claus Vielhauer, Ton Kalker. 474-485
- Quaternion correlation filters for color face recognitionChunyan Xie, B. V. K. Vijaya Kumar. 486-494
- A watermarking algorithm for map and chart imagesMark A. Masry. 495-503
- Finding meta data in speech and handwriting biometricsClaus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta. 504-515
- Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of ditherIvo D. Shterev, Reginald L. Lagendijk. 516-527
- Geometrically robust digital image watermarking using scale normalization and flowline curvatureChaw-Seng Woo, Jiang Du, Binh Pham. 528-538
- Watermarking in JPEG bitstreamRobert J. Berger II, Bijan G. Mobasseri. 539-548
- Iterative estimation of amplitude scaling on distortion-compensated dither modulationKevin M. Whelan, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley. 549-560
- Simple reversible watermarking schemesDinu Coltuc, Alain Trémeau. 561-568
- Robustness improvement of known-host-state watermarking using host statisticsOleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun. 569-577
- Illustration watermarking: an object-based approach for digital imagesThomas Vogel, Jana Dittmann. 578-589
- On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysisRajarathnam Chandramouli. 590-594
- Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domainJessica J. Fridrich, David Soukal, Miroslav Goljan. 595-606
- Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool setJana Dittmann, Danny Hesse, Reyk Hillert. 607-618
- Unitary embedding for data hiding with the SVDClifford Bergman, Jennifer Davidson. 619-630
- Forensic steganalysis: determining the stego key in spatial domain steganographyJessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak. 631-642
- On steganalysis of plus-minus one embedding of continuous-tone imagesPing Wah Wong, Hong Chen, Zhongjue Tang. 643-652
- New multilevel DCT, feature vectors, and universal blind steganalysisSos S. Agaian, Hong Cai. 653-663
- Steganalysis of recorded speechMicah K. Johnson, Siwei Lyu, Hany Farid. 664-672
- Stochastic approach to secret message length estimation in ±k embedding steganographyTaras Holotyak, Jessica J. Fridrich, David Soukal. 673-684
- Collusion issue in video watermarkingGwenaël J. Doërr, Jean-Luc Dugelay. 685-696
- Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithmsChuhong Fei, Deepa Kundur, Raymond H. Kwong. 697-708
- Security analysis of robust data-hiding with geometrically structured codebooksEmre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun. 709-720
- Detection in quantization-based watermarking: performance and security issuesLuis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González. 721-733
- New sensitivity analysis attackMaha El Choubassi, Pierre Moulin. 734-745
- Watermarking security part one: TheoryFrançois Cayre, Caroline Fontaine, Teddy Furon. 746-757
- Watermarking security part two: PracticeFrançois Cayre, Caroline Fontaine, Teddy Furon. 758-768
- An investigation of robustness in nonlinear audio watermarkingFinbarr B. O Donovan, Neil J. Hurley, Guenole C. M. Silvestre. 769-778
- Audio watermarking and partial encryptionMartin Steinebach, Sascha Zmudzinski, Torsten Bolke. 779-788
- High-capacity invertible data-hiding algorithm for digital audioBrett A. Bradley, Adnan M. Alattar. 789