Abstract is missing.
- Image security tools for JPEG standardsPeter Schelkens. 1 [doi]
- Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parametersTong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint. 3-13 [doi]
- Slice groups for post-compression region of interest encryption in SVCAndreas Unterweger, Andreas Uhl. 15-22 [doi]
- What's the PointiSA?Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson. 23-34 [doi]
- Gradient based prediction for reversible watermarking by difference expansionIoan-Catalin Dragoi, Dinu Coltuc, Ion Caciula. 35-40 [doi]
- On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacksErwin Quiring, Pascal Schöttle. 41-48 [doi]
- Application of Grubbs' test for outliers to the detection of watermarksMatthieu Urvoy, Florent Autrusseau. 49-60 [doi]
- FastPass: automated border control as challenging combination of various security technologiesMarkus Clabian. 61 [doi]
- Biometrics based observer free transferable E-cashKamlesh Tiwari, Phalguni Gupta. 63-70 [doi]
- From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detectionMario Hildebrandt, Jana Dittmann. 71-76 [doi]
- Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial featuresRobert Fischer, Claus Vielhauer. 77-82 [doi]
- Video steganalysis based on subtractive probability of optimal matching featureYanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu. 83-90 [doi]
- Adaptive steganalysis against WOW embedding algorithmWeixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang. 91-96 [doi]
- Predictable rain?: steganalysis of public-key steganography using wet paper codesMatthias Carnein, Pascal Schöttle, Rainer Böhme. 97-108 [doi]
- Steganographic key leakage through payload metadataTomás Pevný, Andrew D. Ker. 109-114 [doi]
- Video steganography with perturbed macroblock partitionHong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu. 115-122 [doi]
- Capacities and capacity-achieving decoders for various fingerprinting gamesThijs Laarhoven. 123-134 [doi]
- Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT"Matthias Schneider, Thomas Schneider. 135-140 [doi]
- Distributional differential privacy for large-scale smart meteringMárk Jelasity, Kenneth P. Birman. 141-146 [doi]
- Influence of data granularity on nonintrusive appliance load monitoringGünther Eibl, Dominik Engel. 147-151 [doi]
- Architecture-driven smart grid security managementMarkus Kammerstetter, Lucie Langer, Florian Skopik, Wolfgang Kastner. 153-158 [doi]
- Audio source authentication and splicing detection using acoustic environmental signatureHong Zhao, Yifan Chen, Rui Wang, Hafiz Malik. 159-164 [doi]
- A universal image forensic strategy based on steganalytic modelXiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang. 165-170 [doi]
- Automatic location of frame deletion point for digital video forensicsChunhui Feng, ZhengQuan Xu, Wenting Zhang, Yanyan Xu. 171-179 [doi]
- Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive studyR. Raghavendra, Christoph Busch. 181-185 [doi]
- GSHADE: faster privacy-preserving distance computation and biometric identificationJulien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider 0003, Michael Zohner. 187-198 [doi]