Abstract is missing.
- The Importance of Aliasing in Structured Quantization Index Modulation Data HidingFernando Pérez-González. 1-17 [doi]
- Image Steganography and Steganalysis: Concepts and PracticeRajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon. 35-49 [doi]
- On the Integration of Watermarks and CryptographyStefan Katzenbeisser. 50-60 [doi]
- Content-Dependent Anti-disclosure Image WatermarkChun-Shien Lu, Chao-Yong Hsu. 61-76 [doi]
- Performance Measurement of Watermark Embedding PatternsRobert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. 77-85 [doi]
- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet TransformYongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan. 86-100 [doi]
- Optimal Data-Hiding Strategies for Games with BER PayoffsPedro Comesaña, Fernando Pérez-González, Félix Balado. 101-116 [doi]
- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) CodesYu Yi, Moon Ho Lee, Ji Hyun Kim, Gi Yean Hwang. 117-128 [doi]
- Natural Language Watermarking Using Semantic Substitution for Chinese TextYuei-Lin Chiang, Lu-Ping Chang, Wen-Tai Hsieh, Wen-Chih Chen. 129-140 [doi]
- Resilient Information Hiding for Abstract Semi-structuresRadu Sion, Mikhail J. Atallah, Sunil Prabhakar. 141-153 [doi]
- Model-Based SteganographyPhil Sallee. 154-167 [doi]
- Authentication of 3-D Polygonal MeshesHsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin. 168-183 [doi]
- Use of Motion Estimation to Improve Video Watermarking for MPEG EncodersIsao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Satoru Tezuka. 184-199 [doi]
- A Robust Printed Image Watermarking Based on Iterative Halftoning MethodIn-Gook Chun, Sangho Ha. 200-211 [doi]
- A Feature-Watermarking Scheme for JPEG Image AuthenticationJinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang. 212-222 [doi]
- An Intelligent Watermark Detection Decoder Based on Independent Component AnalysisZhang Li, Sam Kwong, Marian Choy, Wei-wei Xiao, Ji Zhen, Ji-Hong Zhang. 223-234 [doi]
- Coefficient Selection Methods for Scalable Spread Spectrum WatermarkingAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins. 235-246 [doi]
- Performance Analysis of Order Statistical PatchworkHyojeong Kuk, Yong Cheol Kim. 247-262 [doi]
- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation FilterHyungshin Kim, B. V. K. Vijaya Kumar. 263-276 [doi]
- On Perceptual Quality of Watermarked Images - An Experimental ApproachBassem Abdel-Aziz, Jean-Yves Chouinard. 277-288 [doi]
- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale ModificationWei Li, Xiangyang Xue. 289-300 [doi]
- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual ModelsYoung-Yoon Lee, Han-Seung Jung, Sang Uk Lee. 301-315 [doi]
- EM Estimation of Scale Factor for Quantization-Based Audio WatermarkingKiryung Lee, Dong Sik Kim, Taejeong Kim, Kyung-Ae Moon. 316-327 [doi]
- Semi-fragile Watermarking for Tamper Proofing and Authentication of Still ImagesSang-Jin Han, In Su Chang, Rae-Hong Park. 328-339 [doi]
- Secure Video Watermarking via Embedding Strength ModulationGwenaël J. Doërr, Jean-Luc Dugelay. 340-354 [doi]
- On the Insecurity of Non-invertible Watermarking Schemes for Dispute ResolvingAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi. 355-369 [doi]
- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin TransformBum-Soo Kim, Jae-Gark Choi, Kil-Houm Park. 370-381 [doi]
- Robust Audio Watermarking Using Both DWT and Masking EffectWon Young Hwang, Hwan-il Kang, Seung-Soo Han, Kab Il Kim, Hwan Soo Kang. 382-389 [doi]
- Normalization Domain Watermarking Method Based on Pattern ExtractionSi-Woong Lee, Jae-Gark Choi, Hyun Soo Kang, Jin Woo Hong, Hyoung Joong Kim. 390-395 [doi]
- Robust Watermarking with Adaptive ReceivingXiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu. 396-407 [doi]
- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis ExtractionThai Duy Hien, Zensho Nakao, Yen-Wei Chen. 408-422 [doi]
- Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet TransformKi-Ryong Kwon, Ji-Hwan Park, Eung-Joo Lee, Ahmed H. Tewfik. 423-434 [doi]
- Metadata Hiding for Content AdaptationYong Ju Jung, Ho Kyung Kang, Yong Man Ro. 435-446 [doi]
- Echo Watermarking in Sub-band DomainJae-Won Cho, Ha-Joong Park, Young Huh, Hyun-Yeol Chung, Ho-Youl Jung. 447-455 [doi]
- Modification of Polar Echo Kernel for Performance Improvement of Audio WatermarkingSiho Kim, Hong-Seok Kwon, Keun-Sung Bae. 456-466 [doi]
- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack CharacterizationNedeljko Cvejic, Tapio Seppänen. 467-473 [doi]
- Enhancement Methods of Image Quality in Screen Mark AttackKi Hyun Kim, Yong Man Ro. 474-482 [doi]
- A Method to Improve the Stego-Image Quality for Palette-Based Image SteganographyMei-Yi Wu, Yu-Kun Ho, Jia-Hong Lee. 483-496 [doi]
- A Secure Steganographic Scheme against Statistical AnalysesJeong Jae Yu, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, Il Hwan Park. 497-507 [doi]
- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle StripsJeonghee Jeon, Sang-Kwang Lee, Yo-Sung Ho. 508-517 [doi]
- High Quality Perceptual Steganographic TechniquesKisik Chang, Changho Jung, Sangjin Lee, Wooil Yang. 518-531 [doi]
- A Watermarking Scheme Applicable for Fingerprinting ProtocolMinoru Kuribayashi, Hatsukazu Tanaka. 532-543 [doi]
- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on VertexBong-Ju Jang, Kwang-Seok Moon, Young Huh, Ki-Ryong Kwon. 544-557 [doi]
- Public Watermark Detection Using Multiple Proxies and Secret SharingQiming Li, Ee-Chien Chang. 558-569 [doi]
- Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark DetectionHang Hui Patrick Then, Wang Yin Chai. 570-580 [doi]
- Lossless Watermarking Considering the Human Visual SystemMohammad Awrangjeb, Mohan S. Kankanhalli. 581-592 [doi]
- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding MethodHyon-Gon Choo, Whoi-Yul Kim. 593-599 [doi]