Abstract is missing.
- Natural Watermarking: A Secure Spread Spectrum Technique for WOAPatrick Bas, François Cayre. 1-14 [doi]
- An Improved Asymmetric Watermarking System Using Matrix EmbeddingScott Craver. 15-25 [doi]
- A Cryptographic Method for Secure Watermark DetectionMichael Malkin, Ton Kalker. 26-41 [doi]
- Steganographic Communication in Ordered ChannelsR. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, Guevara Noubir, C. Pandu Rangan, Ravi Sundaram. 42-57 [doi]
- Analyzing Network-Aware Active Wardens in IPv6Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin. 58-77 [doi]
- Video Watermarking by Using Geometric Warping Without Visible ArtifactsDima Pröfrock, Mathias Schlauweg, Erika Müller. 78-92 [doi]
- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time DomainShijun Xiang, Jiwu Huang, Rui Yang. 93-108 [doi]
- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded WardensRichard Bergmair, Stefan Katzenbeisser. 109-123 [doi]
- Noisy Timing Channels with Binary Inputs and OutputsKeye Martin, Ira S. Moskowitz. 124-144 [doi]
- A Computational Model for Watermark RobustnessAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi. 145-160 [doi]
- Hiding Information HidingAdam Young, Moti Yung. 161-171 [doi]
- Reversible Watermarking of NURBS-Based CAD ModelsWolfgang Funk. 172-187 [doi]
- A High-Capacity Data Hiding Method for Polygonal MeshesHao-Tian Wu, Yiu-ming Cheung. 188-200 [doi]
- Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan TelevisionAndreas Westfeld. 201-215 [doi]
- Delayed and Controlled Failures in Tamper-Resistant SoftwareGang Tan, Yuqun Chen, Mariusz H. Jakubowski. 216-231 [doi]
- A Model for Self-Modifying CodeBertrand Anckaert, Matias Madou, Koen De Bosschere. 232-248 [doi]
- A Markov Process Based Approach to Effective Attacking JPEG SteganographyYun Q. Shi, Chunhua Chen, Wen Chen. 249-264 [doi]
- Batch Steganography and Pooled SteganalysisAndrew D. Ker. 265-281 [doi]
- On Steganographic Embedding EfficiencyJessica J. Fridrich, Petr Lisonek, David Soukal. 282-296 [doi]
- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext AttacksTri Van Le, Kaoru Kurosawa. 297-313 [doi]
- Modified Matrix Encoding Technique for Minimal Distortion SteganographyYounhee Kim, Zoran Duric, Dana Richards. 314-327 [doi]
- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical FingerprintingJae-Min Seol, Seong-Whan Kim. 328-342 [doi]
- A Collusion-Resistant Video Watermarking SchemeAmir Houman Sadr, Shahrokh Ghaemmaghami. 343-354 [doi]
- An Elliptic Curve Backdoor Algorithm for RSASSAAdam Young, Moti Yung. 355-374 [doi]
- A Subliminal-Free Variant of ECDSAJens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt. 375-387 [doi]