Abstract is missing.
- Data Hiding and the Statistics of ImagesIngemar J. Cox. 1 [doi]
- The Changing Face of CryptographyFred Piper. 2 [doi]
- Forensic Techniques for Image Source Classification: A Comparative StudyEdward J. Delp. 3 [doi]
- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS ModelH. Y. Leung, L. M. Cheng, L. L. Cheng. 4-13 [doi]
- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking TechniquesMitsuo Okada, Yasuo Okabe, Tetsutaro Uehara. 14-28 [doi]
- Robust AVS Audio WatermarkingYong Wang, Jiwu Huang. 29-38 [doi]
- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG AttacksDieter Bardyn, Ann Dooms, Tim Dams, Peter Schelkens. 39-53 [doi]
- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization AttacksAndrea Abrardo, Mauro Barni, Cesare Maria Carretti. 54-68 [doi]
- A Robust Watermarking for MPEG-2Huang Li, Jian Li, Hongmei Liu. 69-80 [doi]
- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame DroppingChong Chen, Jiangqun Ni, Jiwu Huang. 81-95 [doi]
- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed VideoDawen Xu, Rangding Wang, Jicheng Wang. 96-109 [doi]
- Fast Embedding Technique for Dirty Paper Trellis WatermarkingMarc Chaumont. 110-120 [doi]
- A Homomorphic Method for Sharing Secret ImagesNaveed Islam, William Puech, Robert Brouzet. 121-135 [doi]
- Dot-Size Variant Visual CryptographyJonathan Weir, Wei-Qi Yan. 136-148 [doi]
- High Capacity Data Hiding in Binary Document ImagesNiladri B. Puhan, Anthony Tung Shuen Ho, F. Sattar. 149-161 [doi]
- Hiding Information by Context-Based Synonym SubstitutionXueling Zheng, Liusheng Huang, Zhili Chen, Zhenshan Yu, Wei Yang. 162-169 [doi]
- A Statistical and Iterative Method for Data Hiding in Palette-Based ImagesSemin Kim, Wesley De Neve, Yong Man Ro. 170-183 [doi]
- Estimating the Information Theoretic Optimal Stego NoiseAndrew D. Ker. 184-198 [doi]
- Multi-class Blind Steganalysis Based on Image Run-Length AnalysisJing Dong, Wei Wang, Tieniu Tan. 199-210 [doi]
- Local Patch Blind Spectral Watermarking Method for 3D GraphicsMing Luo, Kai Wang, Adrian G. Bors, Guillaume Lavoué. 211-226 [doi]
- Reading Watermarks from Printed Binary Images with a Camera PhoneAnu Pramila, Anja Keskinarkaus, Tapio Seppänen. 227-240 [doi]
- A New Approach in Reversible WatermarkingAhmad Mahmoudi Aznaveh, Azadeh Mansouri, Farah Torkamani-Azar. 241-251 [doi]
- Classification Framework for Fair Content Tracing ProtocolsGeong Sen Poh, Keith M. Martin. 252-267 [doi]
- Fragile Watermarking Scheme with Extensive Content Restoration CapabilityXinpeng Zhang, Shuozhong Wang, Guorui Feng. 268-278 [doi]
- Improving Capability of Locating Tampered Pixels of Statistical Fragile WatermarkingKazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara. 279-293 [doi]
- Camera-Model Identification Using Markovian Transition Probability MatrixGuanshuo Xu, Shang Gao, Yun-Qing Shi, Ruimin Hu, Wei Su. 294-307 [doi]
- A Survey of Passive Image Tampering DetectionWei Wang, Jing Dong, Tieniu Tan. 308-322 [doi]
- An Enhanced Statistical Approach to Identifying Photorealistic ImagesPatchara Sutthiwan, Jingyu Ye, Yun Q. Shi. 323-335 [doi]