Abstract is missing.
- Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresBattista Biggio. 1-2 [doi]
- Bringing Multimedia Security from the Research Lab to the Forensic LabMartino Jerian. 3 [doi]
- A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional LayerBelhassen Bayar, Matthew C. Stamm. 5-10 [doi]
- Forensics of High Quality and Nearly Identical JPEG Image RecompressionCecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, Fernando Pérez-González. 11-21 [doi]
- A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving AttackHiroki Koga, Kaoru Itabashi. 23-28 [doi]
- Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized HistogramJunxiang Wang, Jiangqun Ni, Xing Zhang. 29-38 [doi]
- A Novel CDMA Based High Performance Reversible Data Hiding SchemeBin Ma, Jian Xu, Yun Q. Shi. 39-44 [doi]
- Dynamic Privacy-Preserving Genomic Susceptibility TestingMina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González. 45-50 [doi]
- Group Testing for Identification with PrivacyAhmet Iscen, Teddy Furon. 51-56 [doi]
- Differentially Private Matrix Factorization using Sketching TechniquesRaghavendran Balu, Teddy Furon. 57-62 [doi]
- Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)Jia Duan, Jiantao Zhou, Yuanman Li. 63-68 [doi]
- Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key AggregationHung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang. 69-80 [doi]
- Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way FunctionsSebastian Berndt, Maciej Liskiewicz. 81-92 [doi]
- Rethinking Optimal EmbeddingAndrew D. Ker, Tomás Pevný, Patrick Bas. 93-102 [doi]
- Ensemble of CNNs for Steganalysis: An Empirical StudyGuanshuo Xu, Han-Zhou Wu, Yun Q. Shi. 103-107 [doi]
- Color Image Steganalysis Based On Steerable Gaussian Filters BankHasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. 109-114 [doi]
- A Survey and Taxonomy Aimed at the Detection and Measurement of Covert ChannelsBrent Carrara, Carlisle Adams. 115-126 [doi]
- A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical DistributionPeipei Wang, Hong Zhang, Yun Cao, Xianfeng Zhao. 127-137 [doi]
- Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial SteganographyZengzhen Zhao, Qingxiao Guan, Xianfeng Zhao. 139-148 [doi]
- Boosting Steganalysis with Explicit Feature MapsMehdi Boroumand, Jessica J. Fridrich. 149-157 [doi]
- Information Hiding in the RSA ModulusStefan Wüller, Marián Kühnel, Ulrike Meyer. 159-167 [doi]
- Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human EyeJong-Uk Hou, Dongkyu Kim, Hyun-Ji Song, Heung-Kyu Lee. 169-174 [doi]
- Image Segmentation Based Visual Security EvaluationChristof Kauba, Stefan Mayer, Andreas Uhl. 175-180 [doi]
- Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]David Megías, Amna Qureshi. 181-182 [doi]
- Study of a Verifiable Biometric MatchingHervé Chabanne, Julien Keuffer, Roch Lescuyer. 183-184 [doi]
- Privacy Protection for JPEG Content on Image-Sharing PlatformsKun He, Christophe Bidan, Gaëtan Le Guelvouit. 185-186 [doi]
- PPE-Based Reversible Data HidingHan-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi. 187-188 [doi]