Abstract is missing.
- An Implementation of, and Attacks on, Zero-Knowledge WatermarkingScott Craver, Bede Liu, Wayne Wolf. 1-12 [doi]
- On the Possibility of Non-invertible Watermarking SchemesQiming Li, Ee-Chien Chang. 13-24 [doi]
- Reversing Global and Local Geometrical Distortions in Image WatermarkingDariusz Bogumil. 25-37 [doi]
- On Achievable Regions of Public Multiple-Access Gaussian Watermarking SystemsWei Sun, En-Hui Yang. 38-51 [doi]
- Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image WatermarkingAndrea Abrardo, Mauro Barni. 52-66 [doi]
- Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic SchemesJessica J. Fridrich. 67-81 [doi]
- Exploiting Preserved Statistics for SteganalysisRainer Böhme, Andreas Westfeld. 82-96 [doi]
- Improved Detection of LSB Steganography in Grayscale ImagesAndrew D. Ker. 97-115 [doi]
- An Improved Sample Pairs Method for Detection of LSB EmbeddingPeizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen. 116-127 [doi]
- Statistical Tools for Digital ForensicsAlin C. Popescu, Hany Farid. 128-147 [doi]
- Relative Generic Computational Forensic TechniquesJennifer L. Wong, Miodrag Potkonjak. 148-163 [doi]
- Syntax and Semantics-Preserving Application-Layer Protocol SteganographyNorka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin. 164-179 [doi]
- A Method of Linguistic Steganography Based on Collocationally-Verified SynonymyIgor A. Bolshakov. 180-191 [doi]
- Graph Theoretic Software Watermarks: Implementation, Analysis, and AttacksChristian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend. 192-207 [doi]
- Threading Software WatermarksJasvir Nagra, Clark D. Thomborson. 208-223 [doi]
- Soft IP Protection: Watermarking HDL CodesLin Yuan, Pushkin R. Pari, Gang Qu. 224-238 [doi]
- An Asymmetric Security Mechanism for Navigation SignalsMarkus G. Kuhn. 239-252 [doi]
- Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting SchemeJae-Gwi Choi, Ji-Hwan Park, Ki-Ryong Kwon. 253-265 [doi]
- Empirical and Theoretical Evaluation of Active Probing Attacks and Their CountermeasuresXinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao. 266-281 [doi]
- Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial RingHirofumi Muratani. 282-292 [doi]
- Statistical Disclosure or Intersection Attacks on Anonymity SystemsGeorge Danezis, Andrei Serjantov. 293-308 [doi]
- Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy TrafficClaudia Díaz, Bart Preneel. 309-325 [doi]
- The Hitting Set Attack on Anonymity ProtocolsDogan Kesdogan, Lexi Pimenidis. 326-339 [doi]
- Information Hiding in Finite State MachineLin Yuan, Gang Qu. 340-354 [doi]
- Covert Channels for Collusion in Online Computer GamesSteven J. Murdoch, Piotr Zielinski. 355-370 [doi]