Abstract is missing.
- Every Move You Make: Tracking Smartphone Users through Motion SensorsAnupam Das. 1 [doi]
- Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond CyclostationarityCecilia Pasquini, Rainer Böhme. 3-14 [doi]
- Countering Anti-Forensics of Lateral Chromatic AberrationOwen Mayer, Matthew C. Stamm. 15-20 [doi]
- Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial MorphingChristian Kraetzer, Andrey Makrushin, Tom Neubert, Mario Hildebrandt, Jana Dittmann. 21-32 [doi]
- The Square Root Law of Steganography: Bringing Theory Closer to PracticeAndrew D. Ker. 33-44 [doi]
- Nonlinear Feature Normalization in SteganalysisMehdi Boroumand, Jessica J. Fridrich. 45-54 [doi]
- Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted HistogramsChao Xia, Qingxiao Guan, Xianfeng Zhao, Zhoujun Xu, Yi Ma. 55-66 [doi]
- Deep Convolutional Neural Network to Detect J-UNIWARDGuanshuo Xu. 67-73 [doi]
- JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG ImagesMo Chen, Vahid Sedighi, Mehdi Boroumand, Jessica J. Fridrich. 75-84 [doi]
- Audio Steganalysis with Convolutional Neural NetworkBolin Chen, Weiqi Luo, Haodong Li. 85-90 [doi]
- Using Stylometry to Attribute Programmers and WritersRachel Greenstadt. 91 [doi]
- Towards Imperceptible Natural Language Watermarking for GermanOren Halvani, Martin Steinebach, Lukas Graner. 93-98 [doi]
- Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic PoetryYubo Luo, Yongfeng Huang. 99-104 [doi]
- Audio Reversible Watermarking Scheme in the intDCT Domain with Modified Prediction Error ExpansionAlejandra Menendez-Ortiz, Claudia Feregrino Uribe, Jose Juan Garcia Hernandez. 105-110 [doi]
- A Minimum Distortion: High Capacity Watermarking Technique for Relational DataMaikel L. Pérez Gort, Claudia Feregrino Uribe, Jyrki Nummenmaa. 111-121 [doi]
- A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC VideosPeipei Wang, Yun Cao, Xianfeng Zhao, Meineng Zhu. 123-133 [doi]
- Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVCLiming Zhai, Lina Wang, Yanzhen Ren. 135-146 [doi]
- A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural NetworksBelhassen Bayar, Matthew C. Stamm. 147-157 [doi]
- Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery DetectionDavide Cozzolino, Giovanni Poggi, Luisa Verdoliva. 159-164 [doi]
- Image Forensics Based on Transfer Learning and Convolutional Neural NetworkYifeng Zhan, Yifang Chen, Qiong Zhang, Xiangui Kang. 165-170 [doi]