Abstract is missing.
- A New Approach to Estimating Hidden Message Length in Stochastic Modulation SteganographyJunhui He, Jiwu Huang, Guoping Qiu. 1-14 [doi]
- Information Transmission and SteganographyIngemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel. 15-29 [doi]
- On the Existence of Perfect StegosystemsValery I. Korzhik, Guillermo Morales-Luna, Moon Ho Lee. 30-38 [doi]
- Towards Multi-class Blind Steganalyzer for JPEG ImagesTomás Pevný, Jessica J. Fridrich. 39-53 [doi]
- An Efficient Fingerprinting Scheme with Symmetric and Commutative EncryptionSeunglim Yong, Sang Ho Lee. 54-66 [doi]
- Collusion Secure Convolutional Spread Spectrum FingerprintingYan Zhu, Dengguo Feng, Wei Zou. 67-83 [doi]
- Performance Study on Multimedia Fingerprinting Employing Traceability CodesShan He, Min Wu. 84-96 [doi]
- Regular Simplex Fingerprints and Their Optimality PropertiesNegar Kiyavash, Pierre Moulin. 97-109 [doi]
- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet DomainJiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang. 110-123 [doi]
- Robust Detection of Transform Domain Additive WatermarksXingliang Huang, Bo Zhang. 124-138 [doi]
- Multi-band Wavelet Based Digital Watermarking Using Principal Component AnalysisXiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng. 139-146 [doi]
- A New Inter-frame Collusion Attack and a CountermeasureP. Vinod, P. K. Bora. 147-157 [doi]
- Effectiveness of ST-DM Watermarking Against Intra-video CollusionRoberto Caldelli, Alessandro Piva, Mauro Barni, Andrea Carboni. 158-170 [doi]
- Oracle Attacks and Covert ChannelsIlaria Venturini. 171-185 [doi]
- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital ImagesPatrick Bas, Jarmo Hurri. 186-200 [doi]
- A Survey of Watermarking SecurityTeddy Furon. 201-215 [doi]
- Countermeasures for Collusion Attacks Exploiting Host Signal RedundancyGwenaël J. Doërr, Jean-Luc Dugelay. 216-230 [doi]
- Fingerprinting Schemes. Identifying the Guilty Sources Using Side InformationMiguel Soriano, Marcel Fernandez, Josep Cotrina Navau. 231-243 [doi]
- Practical Data-Hiding: Additive Attacks Performance AnalysisJosé-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun. 244-259 [doi]
- The Return of the Sensitivity AttackPedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González. 260-274 [doi]
- Look Up Table(LUT) Method for Halftone Image WatermarkingIn-Gook Chun. 275-285 [doi]
- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity AttacksSergio Vicente Denser Pamboukian, Hae Yong Kim. 286-298 [doi]
- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software WatermarkingBalaji Venkatachalam. 299-312 [doi]
- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution AnalysisMin-Su Kim, Sébastien Valette, Ho-Youl Jung, Rémy Prost. 313-324 [doi]
- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding InfluenceMarcos de Castro Pacitti, Weiler Alves Finamore. 325-335 [doi]
- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed SchemesFélix Balado. 336-350 [doi]
- Trellis-Coded Rational Dither Modulation for Digital WatermarkingAndrea Abrardo, Mauro Barni, Fernando Pérez-González, Carlos Mosquera. 351-360 [doi]
- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive AttacksWei Sun, En-Hui Yang. 361-371 [doi]
- Improved QIM Strategies for Gaussian WatermarkingPierre Moulin, Ying Wang. 372-386 [doi]
- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic ConstraintsMark T. Hogan, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre. 387-402 [doi]
- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation TechniquesMarcos de Castro Pacitti, Weiler Alves Finamore. 403-417 [doi]
- Evaluation of Feature Extraction Techniques for Robust WatermarkingHae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh. 418-431 [doi]
- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative ApproachPatrizio Campisi, Alessandro Neri. 432-443 [doi]
- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking EffectAmir Houman Sadr, Shahrokh Ghaemmaghami. 444-458 [doi]
- Secure Mutual Distrust Transaction Tracking Using Cryptographic ElementsAngela S. L. Wong, Matthew Sorell, Robert Clarke. 459-469 [doi]
- ViWiD : Visible Watermarking Based Defense Against PhishingMercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru. 470-483 [doi]