Abstract is missing.
- FPGA Time-Bounded Unclonable AuthenticationMehrdad Majzoobi, Ahmed Elnably, Farinaz Koushanfar. 1-16 [doi]
- A Unified Submodular Framework for Multimodal IC Trojan DetectionFarinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani. 17-32 [doi]
- A Secure and Robust Approach to Software Tamper ResistanceSudeep Ghosh, Jason Hiser, Jack W. Davidson. 33-47 [doi]
- Security with Noisy Data - (Extended Abstract of Invited Talk)Boris Skoric. 48-50 [doi]
- Detection of Copy-Rotate-Move Forgery Using Zernike MomentsSeung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee. 51-65 [doi]
- Scene Illumination as an Indicator of Image ManipulationChristian Riess, Elli Angelopoulou. 66-80 [doi]
- Capacity of Collusion Secure Fingerprinting - A Tradeoff between Rate and Efficiency - (Extended Abstract of Invited Talk)Gábor Tardos. 81-85 [doi]
- Short Collusion-Secure Fingerprint Codes against Three PiratesKoji Nuida. 86-102 [doi]
- Tardos s Fingerprinting Code over AWGN ChannelMinoru Kuribayashi. 103-117 [doi]
- Steganalysis Using Partially Ordered Markov ModelsJennifer L. Davidson, Jaikishan Jalan. 118-132 [doi]
- The Influence of the Image Basis on Modeling and Steganalysis PerformanceValentin Schwamberger, Pham Hai Dang Le, Bernhard Schölkopf, Matthias O. Franz. 133-144 [doi]
- The Square Root Law in Stegosystems with Imperfect InformationAndrew D. Ker. 145-160 [doi]
- Using High-Dimensional Image Models to Perform Highly Undetectable SteganographyTomás Pevný, Tomás Filler, Patrick Bas. 161-177 [doi]
- Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same DetectabilityAnindya Sarkar, Kaushal Solanki, B. S. Manjunath. 178-192 [doi]
- Robust and Undetectable Steganographic Timing Channels for i.i.d. TrafficYali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser. 193-207 [doi]
- STBS: A Statistical Algorithm for Steganalysis of Translation-Based SteganographyPeng Meng, Liusheng Huang, Zhili Chen, Yuchong Hu, Wei Yang. 208-220 [doi]
- The Reverse Statistical Disclosure AttackNayantara Mallesh, Matthew K. Wright. 221-234 [doi]
- Security Analysis of ISS Watermarking Using Natural Scene StatisticsDong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang. 235-248 [doi]
- Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack FrameworkJian Cao, Jiwu Huang. 249-261 [doi]
- A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and RobustnessJian Cao, Jiwu Huang, Jiangqun Ni. 262-276 [doi]