Abstract is missing.
- A Blind Image Watermarking Algorithm in the Combine DomainQingtang Su. 3-17 [doi]
- Reversible Contrast EnhancementZhenxing Qian, Xinpeng Zhang, Weiming Zhang, Yimin Wang. 18-27 [doi]
- On Improving Homomorphic Encryption-Based Reversible Data HidingXiaotian Wu, Zhuoqian Liang, Bing Chen, Tong Liu. 28-38 [doi]
- Coverless Information Hiding Method Based on Multi-keywordsZhili Zhou, Yan Mu, Ningsheng Zhao, Q. M. Jonathan Wu, Ching-Nung Yang. 39-47 [doi]
- Reversible Data Hiding with Low Bit-Rate Growth in H.264/AVC Compressed Video by Adaptive Hybrid CodingTian-Qi Wang, Hong-Xia Wang, Yue Li. 48-62 [doi]
- An Information Hiding Algorithm for HEVC Based on Differences of Intra Prediction ModesQi Sheng, Rangding Wang, Anshan Pei, Bin Wang. 63-74 [doi]
- Improvement of Universal Steganalysis Based on SPAM and Feature OptimizationLei Min, LiuXiao Ming, Yang Xue, Yang Yu, Wang Mian. 75-83 [doi]
- Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences MatricesBing Cao, Guorui Feng, Zhaoxia Yin. 84-93 [doi]
- Improved Separable Reversible Data Hiding in Encrypted Image Based on Neighborhood PredictionShu Yan, Fan Chen, HongJie He. 94-103 [doi]
- Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation CodingPing Ji, Chuan Qin, Zhenjun Tang. 104-113 [doi]
- Schur Decomposition Based Robust Watermarking Algorithm in Contourlet DomainJunxiang Wang, Ying Liu. 114-124 [doi]
- Improved Uniform Embedding for Efficient JPEG SteganographyYuanfeng Pan, Jiangqun Ni, Wenkang Su. 125-133 [doi]
- A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast EnhancementHaishan Chen, Wien Hong, Jiangqun Ni, Junying Yuan. 134-144 [doi]
- Coverless Text Information Hiding Method Based on the Word Rank MapJianjun Zhang, Jun Shen, Lucai Wang, HaiJun Lin. 145-155 [doi]
- A Phishing Webpage Detecting Algorithm Using Webpage Noise and N-GramQiong Deng, Huajun Huang, Liangmin Pan, Shuang Pang, Jiaohua Qin. 156-165 [doi]
- A Construction Scheme of Steganographic Codes Based on Matrix UnwrappingWeiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai. 166-177 [doi]
- A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song DynastyYanchen Liu, Jian Wang, Zhibin Wang, Qifeng Qu, Shun Yu. 178-189 [doi]
- Multi-objective Ant Colony Optimization Algorithm Based on Load BalanceLiwen Zhu, Ruichun Tang, Ye Tao, Meiling Ren, Lulu Xue. 193-205 [doi]
- A Novel Spatio-Temporal Data Storage and Index Method for ARM-Based Hadoop ServerLaipeng Han, Lan Huang, Xueyi Yang, Wei Pang, Kangping Wang. 206-216 [doi]
- An Efficient Hierarchical Comparison Mechanism for Cloud-Based Heterogeneous Product Lifecycle Management SystemsMikayla Cohen, Yanzhen Qu. 217-228 [doi]
- Automatic Classification of Cloud Service Based on Weighted Euclidean DistanceYanqiu Lou, Yi Zhuang, Ying Huo. 229-239 [doi]
- A Conflict Prevention Scheduling Strategy for Shared-State Scheduling in Large Scale ClusterLibo He, Zhenping Qiang, Lin Liu 0001, Wei Zhou, Shaowen Yao. 240-250 [doi]
- Design and Performance Comparison of Modular Multipliers Implemented on FPGA PlatformKhalid Javeed, Daniel Irwin, Xiaojun Wang. 251-260 [doi]
- Cloud-Based Video Surveillance System Using EFD-GMM for Object DetectionCe Li, Jianchen Su, Baochang Zhang. 261-272 [doi]
- Enhanced Edge Detection Technique for Satellite ImagesRenu Gupta. 273-283 [doi]
- Phone Call Detection Based on Smartphone Sensor DataHuiyu Sun, Suzanne McIntosh. 284-295 [doi]
- A Survey of Speculative Execution Strategy in MapReduceQi Liu, Dandan Jin, Xiaodong Liu, Nigel Linge. 296-307 [doi]
- Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud ComputingQi Jiang 0001, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang. 311-321 [doi]
- Another SPA Key Recovery Against Random Order Countermeasures for AES Key ExpansionMengting Chen, Yang Li, Jian Wang. 322-334 [doi]
- A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model"Wenting Shen, Jia Yu, Hui Xia, Rong Hao. 335-342 [doi]
- Supervised Nonlinear Latent Feature Extraction and Regularized Random Weights Neural Network Modeling for Intrusion Detection SystemJian Tang, Liu Zhuo, Meiying Jia, Chunlai Sun, Chaowen Shi. 343-354 [doi]
- A Revocable Certificateless Signature Scheme Without PairingYinxia Sun, Zhuoran Zhang, Limin Shen. 355-364 [doi]
- Privacy Protection of Digital Speech Based on Homomorphic EncryptionCanghong Shi, Hongxia Wang, Qing Qian, Huan Wang. 365-376 [doi]
- Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure ConstructionFushan Wei, Ruijie Zhang, Chuangui Ma. 377-388 [doi]
- Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud ComputingJian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li. 389-408 [doi]
- Location Privacy Protected Recommendation System in Mobile CloudHaiyan Guan, Hongyan Qian, Yanchao Zhao. 409-420 [doi]
- An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using PasswordXiong Li, Junguo Liao, Wei Liang, Jingqiang Zhao. 421-431 [doi]
- A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-MatchingMingfan Ma, Jun Gao, Ning Lu, Wenbo Shi. 432-442 [doi]
- TransPro: Mandatory Sensitive Information Protection Based on Virtualization and EncryptionXue-Zhi Xie, Hu-Qiu Liu, Yu-Ping Wang. 443-455 [doi]
- Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel AttacksStelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang. 456-467 [doi]
- An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital WatermarkingZhangjie Fu, Xinyue Cao. 468-474 [doi]
- Distributed Quantum Computation Assisted by Remote Toffoli GateMingxing Luo, Hui-Ran Li. 475-485 [doi]