Abstract is missing.
- New Developments in Image Tampering DetectionGuanshuo Xu, Jingyu Ye, Yun-Qing Shi. 3-17 [doi]
- Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance DescriptorLu Zheng, Tanfeng Sun, Yun-Qing Shi. 18-30 [doi]
- Universal Counterforensics of Multiple Compressed JPEG ImagesMauro Barni, Marco Fontani, Benedetta Tondi. 31-46 [doi]
- Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor FingerprintBabak Mahdian, Adam Novozámský, Stanislav Saic. 47-59 [doi]
- Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy DetectionZhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi. 60-71 [doi]
- A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary KeyChin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin. 75-89 [doi]
- Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D ImagesHsin Miao, Yu-Hsun Lin, Ja-Ling Wu. 90-104 [doi]
- Watermarking for Digital Audio Based on Adaptive Phase ModulationNhut Minh Ngo, Masashi Unoki. 105-119 [doi]
- Adapted Quantization Index Modulation for Database WatermarkingJavier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux. 120-134 [doi]
- Image Watermarking Based on Various Discrete Fractional Fourier TransformsFong-Maw Tsai, Wen-Liang Hsue. 135-144 [doi]
- An Audio Watermarking Scheme Based on Singular-Spectrum AnalysisJessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai. 145-159 [doi]
- Superpixel-Based Watermarking Scheme for Image Authentication and RecoveryXiumei Qiao, Rongrong Ni, Yao Zhao. 160-173 [doi]
- Effects of Fragile and Semi-fragile Watermarking on Iris Recognition SystemZairan Wang, Jing Dong, Wei Wang, Tieniu Tan. 174-186 [doi]
- Zero-Watermarking Based on Improved ORB Features Against Print-cam AttackJianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang. 187-198 [doi]
- Stereo Image Coding with Histogram-Pair Based Reversible Data HidingXuefeng Tong, Guangce Shen, Guorong Xuan, Shumeng Li, Zhiqiang Yang, Jian Li, Yun-Qing Shi. 201-214 [doi]
- Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude ExpansionAkira Nishimura. 215-229 [doi]
- Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram ShiftingDawen Xu, Rangding Wang. 230-242 [doi]
- High-Dimensional Histogram Utilization for Reversible Data HidingXinlu Gui, Xiaolong Li, Bin Yang. 243-253 [doi]
- Reversible Data Hiding Based on Combined Predictor and Prediction Error ExpansionXiaochao Qu, Suah Kim, Run Cui, Fangjun Huang, Hyoung Joong Kim. 254-265 [doi]
- Reversible Shared Data Hiding Based on Modified Signed Digit EMDWen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou, Chen-Tsun Chuang. 266-275 [doi]
- Adaptive Predictor Structure Based Interpolation for Reversible Data HidingSunil Prasad Jaiswal, Oscar C. Au, Vinit Jakhetiya, Andy Yuanfang Guo, Anil Kumar Tiwari. 276-288 [doi]
- Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast EnhancementHao-Tian Wu, Yuan Liu, Yun-Qing Shi. 289-301 [doi]
- Two-in-One Image Secret Sharing Scheme Based on Boolean OperationsPeng Li, Ching-Nung Yang, Qian Kong. 305-318 [doi]
- Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean OperationsXuehu Yan, Guohui Chen, Ching-Nung Yang, Song-Ruei Cai. 319-332 [doi]
- Optimal XOR Based (2, n)-Visual Cryptography SchemesFeng Liu, Chuan-Kun Wu. 333-349 [doi]
- Visual Two-Secret Sharing Schemes by Different Superimposition PositionsYi Hao Li, Shyong Jian Shyu. 350-363 [doi]
- Visual Cryptography Scheme with AutostereogramDaoshun Wang, Feng Yi, Ching-Nung Yang. 364-375 [doi]
- Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded SharesGuohui Chen, Chunying Wang, Xuehu Yan, Peng Li. 376-386 [doi]
- Content-Adaptive Residual for SteganalysisXu Lin, Bingwen Feng, Wei Lu, Wei Sun 0007. 389-398 [doi]
- Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure WatermarkingJian Cao. 399-409 [doi]
- Cloning Localization Based on Feature Extraction and K-means ClusteringAreej S. Alfraih, Johann A. Briffa, Stephan Wesemeyer. 410-419 [doi]
- A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA AlgorithmBin Ma, Yun-Qing Shi. 420-432 [doi]
- A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed ImagesChia-Chen Lin, Yuehong Huang, Wei-Liang Tai. 433-443 [doi]
- An Improved Visual Cryptography with Cheating PreventionYu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu. 444-454 [doi]
- Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB EmbeddingHanzhou Wu, Hongxia Wang, Yi Hu, Linna Zhou. 455-469 [doi]
- Multi-class JPEG Image Steganalysis by Ensemble Linear SVM ClassifierJie Zhu, Qingxiao Guan, Xianfeng Zhao. 470-484 [doi]
- Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike MomentsOsamah M. Al-Qershi, Bee Ee Khoo. 485-497 [doi]
- An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage ForensicsDa-Yu Kao, Ying-Hsuan Chiu. 498-512 [doi]
- Tag Detection for Preventing Unauthorized Face Image ProcessingAlberto Escalada Jimenez, Adrian Dabrowski, Noboru Sonehara, Juan M. Montero Martinez, Isao Echizen. 513-524 [doi]
- Detecting Fake-Quality WAV Audio Based on Phase DifferencesJinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan. 525-534 [doi]
- Non-integer Expansion Embedding for Prediction-Based Reversible WatermarkingShangyi Liu, Shijun Xiang. 535-543 [doi]
- Definition of Private Information for Image Sharing in Social Networking ServicesErwan Chaussy, Shimon Machida, Noboru Sonehara, Isao Echizen. 544-556 [doi]
- Variable Multi-dimensional Co-occurrence for SteganalysisLicong Chen, Yun-Qing Shi, Patchara Sutthiwan. 559-573 [doi]
- Steganography Based on High-Dimensional Reference TableBingwen Feng, Wei Lu, Lu Dai, Wei Sun 0007. 574-587 [doi]
- Steganography Based on Grayscale Images Using (5, 3) Hamming CodeCheonshik Kim, Ching-Nung Yang. 588-598 [doi]
- Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQWei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang. 599-612 [doi]
- Evaluation of a Zero-Watermarking-Type SteganographyHirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai. 613-624 [doi]