Abstract is missing.
- Asymptotic Fingerprinting Capacity for Non-binary AlphabetsDion Boesten, Boris Skoric. 1-13 [doi]
- Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos CodesAntonino Simone, Boris Skoric. 14-27 [doi]
- Towards Joint Tardos Decoding: The 'Don Quixote' AlgorithmPeter Meerwald, Teddy Furon. 28-42 [doi]
- An Asymmetric Fingerprinting Scheme Based on Tardos CodesAna Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox. 43-58 [doi]
- "Break Our Steganographic System": The Ins and Outs of Organizing BOSSPatrick Bas, Tomás Filler, Tomás Pevný. 59-70 [doi]
- A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)Gokhan Gul, Fatih Kurugollu. 71-84 [doi]
- Breaking HUGO - The Process DiscoveryJessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan. 85-101 [doi]
- Steganalysis of Content-Adaptive Steganography in Spatial DomainJessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan. 102-117 [doi]
- I Have a DREAM! (DiffeRentially privatE smArt Metering)Gergely Ács, Claude Castelluccia. 118-132 [doi]
- Anonymity Attacks on Mix Systems: A Formal AnalysisSami Zhioua. 133-147 [doi]
- Differentially Private Billing with RebatesGeorge Danezis, Markulf Kohlweiss, Alfredo Rial. 148-162 [doi]
- Statistical Decision Methods in Hidden Information DetectionCathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu. 163-177 [doi]
- A Cover Image Model For Reliable SteganalysisRémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor Nikiforov, Philippe Cornu. 178-192 [doi]
- Video Steganography with Perturbed Motion EstimationYun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng. 193-207 [doi]
- Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution MatchingPatrick Bas. 208-222 [doi]
- Improving Tonality Measures for Audio WatermarkingMichael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël J. Doërr. 223-237 [doi]
- Watermarking as a Means to Enhance Biometric Systems: A Critical SurveyJutta Hämmerle-Uhl, Karl Raab, Andreas Uhl. 238-254 [doi]
- Capacity-Approaching Codes for Reversible Data HidingWeiming Zhang, Biao Chen, Nenghai Yu. 255-269 [doi]
- Code Obfuscation against Static and Dynamic Reverse EngineeringSebastian Schrittwieser, Stefan Katzenbeisser. 270-284 [doi]
- Countering Counter-Forensics: The Case of JPEG CompressionShiyue Lai, Rainer Böhme. 285-298 [doi]
- Stegobot: A Covert Social Network BotnetShishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov. 299-313 [doi]
- CoCo: Coding-Based Covert Timing Channels for Network FlowsAmir Houmansadr, Nikita Borisov. 314-328 [doi]
- LinL: Lost in n-best ListPeng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, Abdelrahman Desoky. 329-341 [doi]