Abstract is missing.
- Advance Fake Video Detection via Vision TransformersJoy Battocchio, Stefano Dell'Anna, Andrea Montibeller, Giulia Boato. 1-11 [doi]
- Modality-Agnostic Deepfakes DetectionYu Cai, Peng Chen, Jiahe Tian, Jin Liu, Jiao Dai, Xi Wang, Shan Jia, Siwei Lyu, Jizhong Han. 12-23 [doi]
- Can GPT tell us why these images are synthesized? Empowering Multimodal Large Language Models for ForensicsYiran He, Yun Cao, Bowen Yang, Zeyu Zhang. 24-34 [doi]
- Analysis and Detection of Android Stegomalware: the Impact of the Loading StageDiego Soi, Silvia Lucia Sanna, Giacomo Benedetti, Angelica Liguori, Leonardo Regano, Luca Caviglione, Giorgio Giacinto. 35-45 [doi]
- Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmorJana Dittmann, Stefan Kiltz, Robert Altschaffel, Judith Antal. 46-51 [doi]
- Towards Modeling Hidden & Steganographic Malware Communication based on ImagesClaus Vielhauer, Fabian Loewe, Michael Pilgermann. 52-63 [doi]
- Support of Forensic Attribution by Visualizing Textual Embeddings of StegomalwareFelix Feist, Sebastian Karius, Mandy Knöchel, Sandro Wefel. 64-73 [doi]
- Detecting and Attributing Tor-Obfuscated Malware Communications Through Traffic FingerprintingPascal Tippe, Adrian Tippe, Jörg Keller 0001. 74-79 [doi]
- Implications of Neural Compression to Scientific ImagesJoão Phillipe Cardenuto, Joshua Krinsky, Lucas Nogueira, Aparna Bharati, Daniel Moreira. 80-85 [doi]
- Exploring Adversarial Attacks on the MaSTer Truncation ProtocolMartin Zbudila, Aysajan Abidin, Bart Preneel. 86-97 [doi]
- MOCHA: Mixnet Optimization Considering Honest Client AnonymityMahdi Rahimi. 98-107 [doi]
- How (Not) to Build Dual-Regev Covert ChannelHoover H. F. Yin, Harry W. H. Wong. 108-113 [doi]
- Reinforcement Learning-based Copyright Protection Watermarking for Large Language ModelShengnan Guo 0008, Kaiyi Pang, Zhongliang Yang, Yamin Li, Yu Qing, Yongfeng Huang 0001. 114-120 [doi]
- Secure Payload Scaling in Detector-Informed Batch Steganography: The Mismatched Detectors CaseEli Dworetzky, Jessica J. Fridrich. 121-130 [doi]
- Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media ChannelsZiping Zhang, Jiamin Zeng, Yan Xu, Xiaowei Yi, Yun Cao, Changjun Liu. 131-141 [doi]
- Color Image Steganography Using Generative Adversarial Networks with a Phased Training StrategySaixing Zhou, Miaoxin Ye, Weiqi Luo 0001, Xin Liao, Kangkang Wei. 142-152 [doi]
- Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic SteganalysisYuFei Luo, Zhen Yang, Xin Xu, Yelei Wang, Ru Zhang, Yongfeng Huang. 153-163 [doi]
- Effect of Acquisition Noise Outliers on SteganalysisEdgar Kaziakhmedov, Jessica J. Fridrich, Patrick Bas. 164-173 [doi]
- SAFE: Synthetic Audio Forensics Evaluation ChallengeKirill Trapeznikov, Paul Cummer, Pranay Pherwani, Jai Aslam, Michael Davinroy, Peter Bautista, Laura Cassani, Matthew C. Stamm. 174-180 [doi]
- Robust Multilingual Audio Deepfake Detection Through Hybrid ModelingCandy Olivia Mawalim, Yutong Wang, Aulia Adila, Shogo Okada, Masashi Unoki. 181-192 [doi]