Abstract is missing.
- Blind Median Filtering Detection Using Statistics in Difference DomainChenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang. 1-15 [doi]
- Robustness of Color Interpolation Identification against Anti-forensic OperationsWei-Hong Chuang, Min Wu 0001. 16-30 [doi]
- Steganalysis of LSB Replacement Using Parity-Aware FeaturesJessica J. Fridrich, Jan Kodovský. 31-45 [doi]
- Statistical Detection of LSB Matching Using Hypothesis Testing TheoryRémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu. 46-62 [doi]
- Textural Features for SteganalysisYun Q. Shi, Patchara Sutthiwan, Licong Chen. 63-77 [doi]
- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression ArtifactsJan Kodovský, Jessica J. Fridrich. 78-93 [doi]
- Hiding a Second Appearance in a Physical Relief SurfaceYi-Liu Chao, Daniel G. Aliaga. 94-109 [doi]
- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion DataLing Du, Xiaochun Cao, Muhua Zhang, Huazhu Fu. 110-124 [doi]
- A Game-Theoretic Approach to Content-Adaptive SteganographyPascal Schöttle, Rainer Böhme. 125-141 [doi]
- Key-Efficient SteganographyAggelos Kiayias, Alexander Russell, Narasimha Shashidhar. 142-159 [doi]
- Secret Agent Radio: Covert Communication through Dirty ConstellationsAveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker. 160-175 [doi]
- Lower Bounds for Private Broadcast EncryptionAggelos Kiayias, Katerina Samari. 176-190 [doi]
- The Dangers of Composing Anonymous ChannelsGeorge Danezis, Emilia Käsper. 191-206 [doi]
- A New Measure of Watermarking Security Applied on QIMTeddy Furon, Patrick Bas. 207-223 [doi]
- Non-Integer Expansion Embedding for Prediction-Based Reversible WatermarkingShijun Xiang. 224-239 [doi]
- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image WatermarkingPeijia Zheng, Jiwu Huang. 240-254 [doi]
- Asymptotic Fingerprinting Capacity in the Combined Digit ModelDion Boesten, Boris Skoric. 255-268 [doi]
- Bias Equalizer for Binary Probabilistic Fingerprinting CodesMinoru Kuribayashi. 269-283 [doi]