Abstract is missing.
- Digital Flamenco with Video PiratesGwenaël J. Doërr. 1-2 [doi]
- Dreams and Drama of Applied Image ForensicsChristian Riess. 3-4 [doi]
- Image-Based Evidence in International Criminal Prosecutions: Charting a Path ForwardJonathan W. Hak. 5-6 [doi]
- Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social MediaGuorui Liao, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang 0001. 7-12 [doi]
- Dataset, Noise Analysis, and Automated Parameter Estimation for Natural SteganographyIvy K. Y. Woo, Sheung Yiu, Hoover H. F. Yin, Russell W. F. Lai. 13-18 [doi]
- Improving Steganographic Security with Source BiasingEli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich. 19-30 [doi]
- Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image SteganalysisAntoine Mallet, Rémi Cogranne, Patrick Bas. 31-39 [doi]
- Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner DecisionsMathias Ibsen, Robert Nichols, Christian Rathgeb, David J. Robertson, Josh P. Davis, Frøy Løvåsdal, Kiran B. Raja, Ryan E. Jenkins, Christoph Busch 0001. 41-46 [doi]
- Did You Note My Palette? Unveiling Synthetic Images Through Color StatisticsLea Uhlenbrock, Davide Cozzolino, Denise Moussa, Luisa Verdoliva, Christian Riess. 47-52 [doi]
- Investigating Translation Invariance and Shiftability in CNNs for Robust Multimedia Forensics: A JPEG Case StudyEdoardo Daniele Cannas, Sara Mandelli, Paolo Bestagini, Stefano Tubaro. 53-63 [doi]
- Improving the Robustness of Synthetic Images Detection by Means of Print and Scan AugmentationNischay Purnekar, Lydia Abady, Benedetta Tondi, Mauro Barni. 65-73 [doi]
- Exploring Diffusion-Inspired Pixel Predictors for WS SteganalysisMartin Benes 0001, Rainer Böhme. 75-86 [doi]
- Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source MismatchAntoine Mallet, Patrick Bas, Rémi Cogranne. 87-94 [doi]
- A Development Framework for TCP/IP Network Steganography Malware DetectionSebastian Zillien, Denis Petrov, Pascal Ruffing, Friedrich Gross. 95-100 [doi]
- Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware IdentificationJana Dittmann, Christian Kraetzer, Jost Alemann, Bernhard Birnbaum. 101-112 [doi]
- Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and EvaluationMandy Knöchel, Sebastian Karius. 113-124 [doi]
- Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image SetsStefan Kiltz, Jana Dittmann, Fabian Loewe, Christian Heidecke, Max John, Jonas Mädel, Fabian Preißler. 125-130 [doi]
- Forensic Recognition of Codec-Specific Image Compression ArtefactsMichael Häfner, Aleksandar Radovic, Moritz Langer, Stefan Findenig, Andreas Uhl. 131-136 [doi]
- Shedding Light on some Leaks in PRNU-based Source AttributionAndrea Montibeller, Roy Alia Asiku, Fernando Pérez-González, Giulia Boato. 137-142 [doi]
- The Adobe Hidden Feature and its Impact on Sensor AttributionJan Butora, Patrick Bas. 143-148 [doi]
- A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything ModelYang Su, Shunquan Tan, Jiwu Huang. 149-158 [doi]
- Evading DeepFake Detectors via Conditional Diffusion ModelsWenhao Wang, Fangjun Huang. 159-164 [doi]
- AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in OcclusionZhitong Lu, Duohe Ma, Linna Fan, Zhen Xu, Kai Chen. 165-174 [doi]
- GAN-based Minutiae-driven Fingerprint MorphingMeghana Rao Bangalore Narasimha Prasad, Andrey Makrushin, Matteo Ferrara, Christian Kraetzer, Jana Dittmann. 175-186 [doi]
- Watermarking Text Documents With Watermarked FontsChenghua He, Deyang Wu, Xinpeng Zhang 0001, Hanzhou Wu. 187-197 [doi]
- CLAM: Client-Aware Routing in Mix NetworksMahdi Rahimi. 199-209 [doi]
- Monchi: Multi-scheme Optimization For Collaborative Homomorphic IdentificationAlberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen. 211-222 [doi]
- Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-AliasingLi Zhang, Yong Liu, Xinpeng Zhang, Hanzhou Wu. 223-234 [doi]
- Extending the Scope of Gradient Reconstruction Attacks in Federated AveragingPierre Jobic, Aurélien Mayoue, Sara Tucci Piergiovanni, François Terrier. 235-246 [doi]
- Honest Fraction Differential PrivacyImane Taibi, Jan Ramon. 247-251 [doi]
- Making Federated Learning Accessible to Scientists: The AI4EOSC ApproachJudith Sáinz-Pardo Díaz, Andrés Heredia Canales, Ignacio Heredia Cacha, Viet D. Tran, Giang T. Nguyen 0001, Khadijeh Alibabaei, Marta Obregón Ruiz, Susana Rebolledo Ruiz, Álvaro López García. 253-264 [doi]
- Enhancing Privacy in Federated Learning: A Practical Assessment of Combined PETs in a Cross-Silo SettingJaime Loureiro-Acuña, Xavier Martínez Luaña, Héctor Padín-Torrente, Gonzalo Jiménez-Balsa, Carlos García-Pagán, Ines Ortega-Fernandez. 265-270 [doi]
- Detecting Audio Deepfakes: Integrating CNN and BiLSTM with Multi-Feature ConcatenationTaiba Majid Wani, Syed Asif Ahmad Qadri, Danilo Comminiello, Irene Amerini. 271-276 [doi]
- Are Recent Deepfake Speech Generators Detectable?Kratika Bhagtani, Amit Kumar Singh Yadav, Paolo Bestagini, Edward J. Delp. 277-282 [doi]
- Is Audio Spoof Detection Robust to Laundering Attacks?Hashim Ali, Surya Subramani, Shefali Sudhir, Raksha Varahamurthy, Hafiz Malik. 283-288 [doi]
- Training-Free Deepfake Voice Recognition by Leveraging Large-Scale Pre-Trained ModelsAlessandro Pianese, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva. 289-294 [doi]