Abstract is missing.
- Modern Trends in Steganography and SteganalysisJessica J. Fridrich. 1 [doi]
- Photo Forensics - There Is More to a Picture than Meets the EyeNasir Memon. 2 [doi]
- An Improved Matrix Encoding Scheme for JPEG SteganographyVasiliy Sachnev, Hyoung Joong Kim. 3-15 [doi]
- Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline FunctionsShunquan Tan. 16-29 [doi]
- A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking SchemeXinghao Jiang, Tanfeng Sun, Yue Zhou, Yun Q. Shi. 30-41 [doi]
- A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step EmbeddingJunxiang Wang, Jiangqun Ni, Jinwei Pan. 42-56 [doi]
- A New Watermarking Method with Obfuscated Quasi-Chirp TransformKazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato. 57-71 [doi]
- A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG CompressionHui Wang, Anthony T. S. Ho, Xi Zhao. 72-85 [doi]
- A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value DecompositionBai Ying Lei, Ing Yann Soon, Zhen Li. 86-96 [doi]
- Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed AudioAlper Koz, Claude Delpha. 97-110 [doi]
- IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular ReflectionTakayuki Yamada, Seiichi Gohshi, Isao Echizen. 111-125 [doi]
- IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image DatabasesJong Yun Jun, Kunho Kim, Jae-Pil Heo, Sung-Eui Yoon. 126-141 [doi]
- Self-recovery Fragile Watermarking Scheme with Variable Watermark PayloadFan Chen, HongJie He, Yaoran Huo, Hongxia Wang. 142-155 [doi]
- Spread Spectrum-Based Multi-bit Watermarking for Free-View VideoHuawei Tian, Zheng Wang, Yao Zhao, Rongrong Ni, Lunming Qin. 156-166 [doi]
- Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental UpdatesHongmei Liu, Lei Li, Jian Li, Jiwu Huang. 167-180 [doi]
- Use of "Emergable Watermarks" as Copy Indicators for Securing Video ContentTakaaki Yamada, Yoshiyasu Takahashi. 181-195 [doi]
- Authenticating Visual Cryptography Shares Using 2D BarcodesJonathan Weir, Weiqi Yan. 196-210 [doi]
- Flexible Visual Cryptography Scheme without DistortionFeng Liu, Teng Guo, Chuan-Kun Wu, Ching-Nung Yang. 211-227 [doi]
- An Extended Visual Cryptography Scheme for Continuous-Tone ImagesYasushi Yamaguchi. 228-242 [doi]
- A Comprehensive Study on Third Order Statistical Features for Image Splicing DetectionXudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li. 243-256 [doi]
- Blind Copy-Paste Detection Using Improved SIFT Ring DescriptorLin-na Zhou, Yun-biao Guo, Xin-Gang You. 257-267 [doi]
- Camera Model Identification Based on the Characteristic of CFA and InterpolationShang Gao, Guanshuo Xu, Ruimin Hu. 268-280 [doi]
- Detecting Re-captured Videos Using Shot-Based Photo Response Non-UniformityDae-Jin Jung, Dai-Kyung Hyun, Seung-Jin Ryu, Ji Won Lee, Hae-Yeoun Lee, Heung-Kyu Lee. 281-291 [doi]
- Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image EdgesRong Zhang, Rang-ding Wang, Tian-Tsong Ng. 292-305 [doi]
- Exposing Original and Duplicated Regions Using SIFT Features and Resampling TracesDavid Vazquez-Padin, Fernando Pérez-González. 306-320 [doi]
- Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDRRonny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann. 321-335 [doi]
- Image Forensics of High Dynamic Range ImagingPhilip Bateman, Anthony T. S. Ho, Johann A. Briffa. 336-348 [doi]
- Improved Run Length Based Detection of Digital Image SplicingZhongwei He, Wei Lu, Wei Sun 0007. 349-360 [doi]
- Median Filtering Detection Using Edge Based Prediction MatrixChenglong Chen, Jiangqun Ni. 361-375 [doi]
- New Feature Presentation of Transition Probability Matrix for Image Tampering DetectionLuyi Chen, Shilin Wang, Shenghong Li, Jianhua Li. 376-386 [doi]
- Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital ImagesHieu Cuong Nguyen, Stefan Katzenbeisser. 387-397 [doi]
- Alternative Anti-Forensics Method for Contrast EnhancementChun Wing Kwok, Oscar C. Au, Sung Him Chui. 398-410 [doi]
- Anti-Forensics of Double JPEG Compression DetectionPatchara Sutthiwan, Yun Q. Shi. 411-424 [doi]
- (r, n)-Threshold Image Secret Sharing Methods with Small Shadow ImagesXiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang, Jing Chen. 425-438 [doi]
- An Algorithm for k-Anonymity-Based FingerprintingSebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar Weippl. 439-452 [doi]
- Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy LeakageHosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis, Yong Man Ro. 453-467 [doi]
- Perceptual Image Hashing via Wave Atom TransformFang Liu, Lee-Ming Cheng. 468-478 [doi]
- Witsenhausen's Counterexample and Its Links with Multimedia Security ProblemsPedro Comesaña, Fernando Pérez-González, Chaouki T. Abdallah. 479-493 [doi]
- Data Forensics Constructions from Cryptographic Hashing and CodingGiovanni Di Crescenzo, Gonzalo R. Arce. 494-509 [doi]