Abstract is missing.
- On Joint Coding for Watermarking and EncryptionNeri Merhav. 1-10 [doi]
- Compulsion Resistant Anonymous CommunicationsGeorge Danezis, Jolyon Clulow. 11-25 [doi]
- Provable Anonymity for Networks of MixesMarek Klonowski, Miroslaw Kutylowski. 26-38 [doi]
- On Blending Attacks for Mixes with MemoryLuke O Connor. 39-52 [doi]
- Pervasive Random Beacon in the Internet for Covert CoordinationHui Huang Lee, Ee-Chien Chang, Mun Choon Chan. 53-61 [doi]
- Censorship Resistance RevisitedGinger Perng, Michael K. Reiter, Chenxi Wang. 62-76 [doi]
- Optimal Embedding for Watermarking in Discrete Data SpacesStéphane Bounkong, Borémi Toch, David Saad. 77-90 [doi]
- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital ImagesVincent Martin, Marie Chabert, Bernard Lacaze. 91-105 [doi]
- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating QuantizersPatrick Bas. 106-117 [doi]
- Efficient Steganography with Provable Security GuaranteesAggelos Kiayias, Yona Raekow, Alexander Russell. 118-130 [doi]
- Information-Theoretic Analysis of Security in Side-Informed Data HidingLuis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González. 131-145 [doi]
- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum AnalysisPedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González. 146-160 [doi]
- How to Combat Block Replacement Attacks?Gwenaël J. Doërr, Jean-Luc Dugelay. 161-175 [doi]
- On the Intractability of Inverting Geometric Distortions in Watermarking SchemesMaciej Liskiewicz, Ulrich Wölfel. 176-188 [doi]
- Pre-processing for Adding Noise SteganographyElke Franz, Antje Schneidewind. 189-203 [doi]
- Efficient Wet Paper CodesJessica J. Fridrich, Miroslav Goljan, David Soukal. 204-218 [doi]
- Translation-Based SteganographyChristian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah. 219-233 [doi]
- ID Modulation: Embedding Sensor Data in an RFID TimeseriesJoshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander Mamishev. 234-246 [doi]
- Embedding Covert Channels into TCP/IPSteven J. Murdoch, Stephen Lewis. 247-261 [doi]
- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic FunctionsGuorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen. 262-277 [doi]
- Assessment of Steganalytic Methods Using Multiple Regression ModelsRainer Böhme. 278-295 [doi]
- A General Framework for Structural Steganalysis of LSB ReplacementAndrew D. Ker. 296-311 [doi]
- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB SteganographyKwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim. 312-326 [doi]
- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image SteganographyStark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David Wagner. 327-341 [doi]
- Self-validating Branch-Based Software WatermarkingGinger Myles, Hongxia Jin. 342-356 [doi]
- Data Hiding in Compiled Program Binaries for Enhancing Computer System PerformanceAshwin Swaminathan, Yinian Mao, Min Wu, Krishnan Kailas. 357-371 [doi]
- Dither Modulation Watermarking of Dynamic Memory TracesAlan J. Larkin, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre. 372-386 [doi]
- A Family of Collusion 2-Secure CodesJosep Cotrina Navau, Marcel Fernandez, Miguel Soriano. 387-397 [doi]
- Best Security Index for Digital FingerprintingKozo Banno, Shingo Orihara, Takaaki Mizuki, Takao Nishizeki. 398-412 [doi]