Abstract is missing.
- Exploiting Micro-Signals for Physiological ForensicsMin Wu. 1 [doi]
- Game-Theoretic Perspectives and Algorithms for CybersecurityChristopher Kiekintveld. 3 [doi]
- Linguistic Steganalysis via Densely Connected LSTM with Feature PyramidHao Yang, Yongjian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang, Saimei Jiao. 5-10 [doi]
- Deep Audio Steganalysis in Time DomainDaewon Lee, Tae-Woo Oh, Kibom Kim. 11-21 [doi]
- Reinforcement Learning Aided Network Architecture Generation for JPEG Image SteganalysisJianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi. 23-32 [doi]
- Feature Aggregation Networks for Image SteganalysisHaneol Jang, Tae-Woo Oh, Kibom Kim. 33-38 [doi]
- Pixels-off: Data-augmentation Complementary Solution for Deep-learning SteganalysisMehdi Yedroudj, Marc Chaumont, Frédéric Comby, Ahmed Oulad Amara, Patrick Bas. 39-48 [doi]
- Protecting Smartphone Screen Notification Privacy by Verifying the Gripping HandChen Wang, Jingjing Mu, Long Huang. 49-54 [doi]
- What if Adversarial Samples were Digital Images?Benoît Bonnet, Teddy Furon, Patrick Bas. 55-66 [doi]
- LiveDI: An Anti-theft Model Based on Driving BehaviorHashim Abu-gellban, Long H. Nguyen, Mahdi Moghadasi, Zhenhe Pan, Fang Jin. 67-72 [doi]
- On the Difficulty of Hiding Keys in Neural NetworksTobias Kupek, Cecilia Pasquini, Rainer Böhme. 73-78 [doi]
- Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and StorageThomas Jerkovits, Onur Günlü, Vladimir Sidorenko, Gerhard Kramer. 79-89 [doi]
- Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of HumansAndrey Makrushin, Dennis Siegel, Jana Dittmann. 91-96 [doi]
- Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake VideosIrene Amerini, Roberto Caldelli. 97-102 [doi]
- Photo Forensics From Rounding ArtifactsShruti Agarwal, Hany Farid. 103-114 [doi]
- Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its DetectionMario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert, Claus Vielhauer. 115-120 [doi]
- Simulating Suboptimal Steganographic EmbeddingChristy Kin-Cleaves, Andrew D. Ker. 121-126 [doi]
- A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side ChannelPingan Fan, Hong Zhang, Yifan Cai, Pei Xie, Xianfeng Zhao. 127-137 [doi]
- JPEG Steganography and Synchronization of DCT Coefficients for a Given Development PipelineThéo Taburet, Patrick Bas, Wadih Sawaya, Rémi Cogranne. 139-149 [doi]
- Turning Cost-Based Steganography into Model-BasedJan Butora, Yassine Yousfi, Jessica J. Fridrich. 151-159 [doi]
- Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color ImagesRémi Cogranne, Quentin Giboulot, Patrick Bas. 161-167 [doi]