Abstract is missing.
- Bitspotting: Detecting Optimal Adaptive SteganographyBenjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme. 3-18 [doi]
- Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited AlgorithmFangjun Huang, Yane Zhong, Jiwu Huang. 19-31 [doi]
- Steganography Based on Adaptive Pixel-Value Differencing Scheme RevisitedHong Zhang, Qingxiao Guan, Xianfeng Zhao. 32-47 [doi]
- Non-uniform Quantization in Breaking HUGOLicong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu. 48-62 [doi]
- Steganalysis of Compressed Speech Based on Markov and EntropyHaibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen. 63-76 [doi]
- Improved Tagged Visual Cryptograms by Using Random GridsDuanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun. 79-94 [doi]
- Cheating Immune Block-Based Progressive Visual CryptographyChing-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu. 95-108 [doi]
- Visual Cryptography and Random Grids SchemesZhengxin Fu, Bin Yu. 109-122 [doi]
- Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error DiffusionDuanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun. 123-138 [doi]
- Reversible Data Hiding in Encrypted H.264/AVC Video StreamsDawen Xu, Rangding Wang, Yun-Qing Shi. 141-152 [doi]
- Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data HidingXuefeng Tong, Guorong Xuan, Guangce Shen, Xiaoli Huan, Yun-Qing Shi. 153-166 [doi]
- Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and CalibrationJianquan Yang, Guopu Zhu, Junlong Wang, Yun-Qing Shi. 169-179 [doi]
- A Novel Method for Detecting Image Sharpening Based on Local Binary PatternFeng Ding, Guopu Zhu, Yun-Qing Shi. 180-191 [doi]
- Camera Source Identification Game with Incomplete InformationHui Zeng, Xiangui Kang. 192-204 [doi]
- Detecting Traitors in Re-publishing Updated DatasetsAnh-Tu Hoang, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen. 205-220 [doi]
- On User Interaction Behavior as Evidence for Computer Forensic AnalysisChao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan. 221-231 [doi]
- Effective Video Copy Detection Using Statistics of Quantized Zernike MomentsJiehao Chen, Chenglong Chen, Jiangqun Ni. 232-243 [doi]
- Identifying Video Forgery Process Using Optical FlowWan Wang, Xinghao Jiang, Shilin Wang, Meng Wan, Tanfeng Sun. 244-257 [doi]
- A Huffman Table Index Based Approach to Detect Double MP3 CompressionPengfei Ma, Rangding Wang, Diqun Yan, Chao Jin. 258-271 [doi]
- Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude ExpansionAkira Nishimura. 275-287 [doi]
- Visual Cryptography Schemes Based in k -Linear MapsAgustín Moreno Cañadas, Nelly Paola Palma Vanegas, Margoth Hernández Quitián. 288-302 [doi]
- A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic ImageShang Gao, Cong Zhang, Chanle Wu, Gang Ye, Lei Huang. 303-313 [doi]
- A Distributed Scheme for Image Splicing DetectionXudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Xiang Lin. 314-325 [doi]
- A New Reversible Data Hiding Scheme Based on Efficient PredictionJian Li, Xiaolong Li, Xingming Sun. 326-336 [doi]
- Digital Forensics of Printed Source Identification for Chinese CharactersMin-Jen Tsai, Jung Liu, Jin-Sheng Yin, Imam Yuadi. 337-361 [doi]
- A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel ExpansionShenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya. 362-375 [doi]
- Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding LocationsXuping Huang, Nobutaka Ono, Isao Echizen, Akira Nishimura. 376-389 [doi]
- A Restorable Semi-fragile Watermarking Combined DCT with InterpolationYaoran Huo, HongJie He, Fan Chen. 393-408 [doi]
- A Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency ConstraintClaude Delpha, Said Hijazi, Rémy Boyer. 409-422 [doi]
- Watermarking-Based Perceptual Hashing Search Over Encrypted SpeechHongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu. 423-434 [doi]
- Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking ServicesHoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen. 437-451 [doi]
- Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-ResolutionHyun-seok Min, Seung-Ho Lee, Wesley De Neve, Yong Man Ro. 452-462 [doi]
- Hiding a Secret Pattern into Color Halftone ImagesYuanfang Guo, Oscar C. Au, Ketan Tang, Jiahao Pang. 465-474 [doi]
- An Image Authentication Scheme for Accurate Localization and RestorationQunting Yang, Tiegang Gao. 475-487 [doi]
- Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side ModificationMasaaki Fujiyoshi. 488-502 [doi]
- New Forensic Methods for OOXML Format DocumentsZhangjie Fu, Xingming Sun, Lu Zhou, Jiangang Shu. 503-513 [doi]
- High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping DistortionBingwen Feng, Wei Lu, Wei Sun 0007. 514-528 [doi]