649 | -- | 650 | Fairouz Kamareddine. Capsule Reviews |
651 | -- | 652 | Wojciech Mazurczyk, Krzysztof Szczypiorski. Toward Effective and Reliable Digital Forensics |
653 | -- | 666 | Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux. Steganography: A Class of Secure and Robust Algorithms |
667 | -- | 685 | Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. Image and Video Encryption based on Dual Space-Filling Curves |
686 | -- | 701 | Xiaofeng Wang, Nanning Zheng, Jianru Xue, Zhenli Liu. A Novel Image Signature Method for Content Authentication |
702 | -- | 716 | Hui Tian, Hong Jiang, Ke Zhou, Dan Feng. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography |
717 | -- | 727 | Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang. Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane |
728 | -- | 739 | Ronaldo M. Salles, Donato A. Marino Jr.. Strategies and Metric for Resilience in Computer Networks |
740 | -- | 755 | João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic |
756 | -- | 768 | Chao-Hsien Lee, Chung-Ming Huang, Chia-Ching Yang, Tai-Hsiang Wang. Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks |
769 | -- | 775 | Antoine Bossard, Keiichi Kaneko. The Set-to-Set Disjoint-Path Problem in Perfect Hierarchical Hypercubes |