Abstract is missing.
- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human EyesTakashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako. 1-14 [doi]
- Hiding a Needle in a Haystack Using Negative DatabasesFernando Esponda. 15-29 [doi]
- Information Leakage in Optimal Anonymized and Diversified DataChengfang Fang, Ee-Chien Chang. 30-44 [doi]
- Perturbation Hiding and the Batch Steganography ProblemAndrew D. Ker. 45-59 [doi]
- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper CodesWeiming Zhang, Xinpeng Zhang, Shuozhong Wang. 60-71 [doi]
- Detecting Re-projected VideoWeihong Wang, Hany Farid. 72-86 [doi]
- Residual Information of Redacted Images Hidden in the Compression ArtifactsNicholas Zhong-Yang Ho, Ee-Chien Chang. 87-101 [doi]
- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction ApproachYousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak. 102-117 [doi]
- Reversible Watermarking with Subliminal ChannelXianfeng Zhao, Ning Li. 118-131 [doi]
- Watermarking Security Incorporating Natural Scene StatisticsJiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung Joong Kim. 132-146 [doi]
- Block-Chain Based Fragile Watermarking Scheme with Superior LocalizationHongJie He, Jiashu Zhang, Heng-Ming Tai. 147-160 [doi]
- Generic Adoption of Spatial Steganalysis to Transformed DomainAndreas Westfeld. 161-177 [doi]
- Weighted Stego-Image Steganalysis for JPEG CoversRainer Böhme. 178-194 [doi]
- Practical Insecurity for Effective SteganalysisJohann Barbier, Stéphanie Alt. 195-208 [doi]
- Authorship Proof for Textual DocumentJiang Wu, Douglas R. Stinson. 209-223 [doi]
- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between WordsZhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, Xinxin Zhao. 224-235 [doi]
- A Data Mapping Method for Steganography and Its Application to ImagesHao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung. 236-250 [doi]
- Benchmarking for SteganographyTomás Pevný, Jessica J. Fridrich. 251-267 [doi]
- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep FaceCsaba Salamon, Jonathan R. Corney, James M. Ritchie. 268-282 [doi]
- A Supraliminal Channel in a Videoconferencing ApplicationScott Craver, Enping Li, Jun Yu, Idris M. Atakli. 283-293 [doi]
- C-Mix: A Lightweight Anonymous Routing ApproachVinayak Kandiah, Dijiang Huang, Harsh Kapoor. 294-308 [doi]
- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine TransformXianfeng Zhao, Bingbing Xia, Yi Deng. 309-324 [doi]
- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-HidingBenjamin Mathon, Patrick Bas, François Cayre, Fernando Pérez-González. 325-340 [doi]
- On the Design and Optimization of Tardos Probabilistic Fingerprinting CodesTeddy Furon, Arnaud Guyader, Frédéric Cérou. 341-356 [doi]
- Iterative Detection Method for CDMA-Based Fingerprinting SchemeMinoru Kuribayashi, Masakatu Morii. 357-371 [doi]