Abstract is missing.
- Implications of Cyber WarfareDavid Aucsmith. 1 [doi]
- IoT Privacy: Can We Regain Control?Richard Chow. 3 [doi]
- Improving Steganographic Security by Synchronizing the Selection ChannelTomás Denemark, Jessica J. Fridrich. 5-14 [doi]
- Steganalysis of Adaptive JPEG Steganography Using 2D Gabor FiltersXiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang. 15-23 [doi]
- Video Steganography Based on Optimized Motion Estimation PerturbationYun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu. 25-31 [doi]
- Effect of Imprecise Knowledge of the Selection Channel on SteganalysisVahid Sedighi, Jessica J. Fridrich. 33-42 [doi]
- On Characterizing and Measuring Out-of-Band Covert ChannelsBrent C. Carrara, Carlisle M. Adams. 43-54 [doi]
- LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTPYao Shen, Liusheng Huang, Fei Wang, Xiaorong Lu, Wei Yang, Lu Li. 55-64 [doi]
- Visual Honey Encryption: Application to SteganographyJi Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee. 65-74 [doi]
- Flicker Forensics for Pirate Device IdentificationAdi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr. 75-84 [doi]
- Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical EvaluationBei-Bei Liu, Xingjie Wei, Jeff Yan. 85-90 [doi]
- ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking PropertiesChristian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer. 91-96 [doi]
- Optimal Sequential Fingerprinting: Wald vs. TardosThijs Laarhoven. 97-107 [doi]
- Universal Threshold Calculation for Fingerprinting Decoders using Mixture ModelsMarcel Schäfer, Sebastian Mair, Waldemar Berchtold, Martin Steinebach. 109-114 [doi]
- 3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding StructureJong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee. 115-121 [doi]
- End-to-Display Encryption: A Pixel-Domain Encryption with Security BenefitSebastian Matthias Burg, Dustin Peterson, Oliver Bringmann. 123-128 [doi]
- Touch-based Static Authentication Using a Virtual GridWilliam F. Bond, Ahmed Awad E. A.. 129-134 [doi]
- SATTVA: SpArsiTy inspired classificaTion of malware VAriantsLakshmanan Nataraj, S. Karthikeyan, B. S. Manjunath. 135-140 [doi]
- Thumbnail-Preserving Encryption for JPEGCharles V. Wright, Wu-chi Feng, Feng Liu. 141-146 [doi]
- On Elliptic Curve Based Untraceable RFID Authentication ProtocolsEun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo. 147-153 [doi]
- A Negative Number Vulnerability for Histogram-based Face Recognition SystemsAlireza Farrokh Baroughi, Scott Craver, Mohammed Faizan Mohsin. 155-160 [doi]
- Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression TopographyRobert Fischer, Claus Vielhauer. 161-171 [doi]