Abstract is missing.
- Reverse Engineering: What Can We Learn From a Digital Image About Its Own History ?Jean-Michel Morel. 1 [doi]
- Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse PositionChen Gong, Xiaowei Yi, Xianfeng Zhao, Yi Ma. 2-13 [doi]
- Defining Joint Embedding Distortion for Adaptive MP3 SteganographyYunzhao Yang, Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Yi Ma. 14-24 [doi]
- Adaptive VP8 Steganography Based on Deblocking FilteringPei Xie, Hong Zhang 0005, Weike You, Xianfeng Zhao, Jianchang Yu, Yi Ma. 25-30 [doi]
- Vibrational Covert Channels using Low-Frequency Acoustic SignalsNikolay Matyunin, Yujue Wang, Stefan Katzenbeisser 0001. 31-36 [doi]
- Towards Automatic Embedding Cost Learning for JPEG SteganographyJianhua Yang, Danyang Ruan, Xiangui Kang, Yun-Qing Shi. 37-46 [doi]
- Effect of JPEG Quality on Steganographic SecurityJan Butora, Jessica J. Fridrich. 47-56 [doi]
- Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG DomainThéo Taburet, Patrick Bas, Jessica J. Fridrich, Wadih Sawaya. 57-62 [doi]
- Enhancing Steganography via Stego Post-processing by Reducing Image Residual DifferenceBolin Chen, Weiqi Luo, Peijia Zheng. 63-68 [doi]
- Camera Identification from HDR ImagesMorteza Darvish Morshedi Hosseini, Miroslav Goljan. 69-76 [doi]
- Estimation of Copy-sensitive Codes Using a Neural ApproachRohit Yadav, Iuliia Tkachenko, Alain Trémeau, Thierry Fournel. 77-82 [doi]
- De-identification Without Losing FacesYuezun Li, Siwei Lyu. 83-88 [doi]
- Impact of Spatial Constraints when Signing in Uncontrolled Mobile ConditionsMajd Abazid, Nesma Houmani, Sonia Garcia-Salicetti. 89-94 [doi]
- A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTDTom Neubert, Christian Kraetzer, Jana Dittmann. 95-100 [doi]
- Image Forensics from Chroma Subsampling of High-Quality JPEG ImagesBenedikt Lorch, Christian Riess. 101-106 [doi]
- A Simple and Effective Initialization of CNN for Forensics of Image Processing OperationsIvan Castillo Camacho, Kai Wang. 107-112 [doi]
- Exposing GAN-synthesized Faces Using Landmark LocationsXin Yang, Yuezun Li, Honggang Qi, Siwei Lyu. 113-118 [doi]
- CNN-based Rescaling Factor EstimationChang Liu, Matthias Kirchner. 119-124 [doi]
- The ALASKA Steganalysis Challenge: A First Step Towards SteganalysisRémi Cogranne, Quentin Giboulot, Patrick Bas. 125-137 [doi]
- Breaking ALASKA: Color Separation for Steganalysis in JPEG DomainYassine Yousfi, Jan Butora, Jessica J. Fridrich, Quentin Giboulot. 138-149 [doi]
- Trusting Machine Learning: Privacy, Robustness, and Transparency ChallengesReza Shokri. 150 [doi]
- Proving Multimedia Integrity using Sanitizable Signatures Recorded on BlockchainKarthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti. 151-160 [doi]
- Revisiting Multivariate Lattices for Encrypted Signal ProcessingAlberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González. 161-172 [doi]
- Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone DetectorTeddy Furon. 173-181 [doi]
- Nearest Neighbor Decoding for Tardos Fingerprinting CodesThijs Laarhoven. 182-187 [doi]
- Reference Channels for Steganalysis of Images with Convolutional Neural NetworksMo Chen, Mehdi Boroumand, Jessica J. Fridrich. 188-197 [doi]
- A Customized Convolutional Neural Network with Low Model Complexity for JPEG SteganalysisJunwen Huang, Jiangqun Ni, Linhong Wan, Jingwen Yan. 198-203 [doi]
- Steganalysis of VoIP Streams with CNN-LSTM NetworkHao Yang, Zhongliang Yang, Yongfeng Huang. 204-209 [doi]
- Audio Steganalysis with Improved Convolutional Neural NetworkYuzhen Lin, Rangding Wang, Diqun Yan, Li Dong, Xueyuan Zhang. 210-215 [doi]
- Exploiting Adversarial Embeddings for Better SteganographySolène Bernard, Tomás Pevný, Patrick Bas, John Klein. 216-221 [doi]
- Detection of Classifier Inconsistencies in Image SteganalysisDaniel Lerch-Hostalot, David Megías. 222-229 [doi]
- Fast and Effective Global Covariance Pooling Network for Image SteganalysisXiaoqing Deng, Bolin Chen, Weiqi Luo, Da Luo. 230-234 [doi]
- Linear Hash Functions as a Means of Distortion-Rate Optimization in Data EmbeddingBoris Ryabko, Andrey Fionov. 235-238 [doi]