Abstract is missing.
- Image Noise and Digital Image ForensicsThibaut Julliand, Vincent Nozick, Hugues Talbot. 3-17 [doi]
- Camera Source Identification with Limited Labeled Training SetYue Tan, Bo Wang, Ming Li, Yanqing Guo, Xiangwei Kong, Yunqing Shi. 18-27 [doi]
- Detecting Video Forgery by Estimating Extrinsic Camera ParametersXianglei Hu, Jiangqun Ni, Runbiao Pan. 28-38 [doi]
- Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local EntropyHuy H. Nguyen, Hoang-Quoc Nguyen-Son, Thuc Dinh Nguyen, Isao Echizen. 39-50 [doi]
- Multiple MP3 Compression Detection Based on the Statistical Properties of Scale FactorsJinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan. 51-60 [doi]
- Detection of Double Compression for HEVC Videos Based on the Co-occurrence Matrix of DCT CoefficientsMeiling Huang, Rangding Wang, Jian Xu, Dawen Xu 0001, Qian Li. 61-71 [doi]
- An Advanced Texture Analysis Method for Image Sharpening DetectionFeng Ding, Weiqiang Dong, Guopu Zhu, Yun-Qing Shi. 72-82 [doi]
- Source Camera Model Identification Using Features from Contaminated Sensor NoiseAmel Tuama, Frédéric Comby, Marc Chaumont. 83-93 [doi]
- Inter-frame Forgery Detection for Static-Background Video Based on MVP ConsistencyZhenzhen Zhang, Jianjun Hou, Zhaohong Li, Dongdong Li. 94-106 [doi]
- An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD ScreensRuihan Li, Rongrong Ni, Yao Zhao. 107-116 [doi]
- Video Steganalysis Based on Intra Prediction Mode CalibrationYanbin Zhao, Hong Zhang, Yun Cao, Peipei Wang, Xianfeng Zhao. 119-133 [doi]
- Feature Selection for High Dimensional SteganalysisYanping Tan, Fangjun Huang, Jiwu Huang. 134-144 [doi]
- Synthetic Speech Detection and Audio Steganography in VoIP ScenariosDaniele Capolupo, Fabrizio d'Amore. 145-159 [doi]
- Fingerprinting for Broadcast Content Distribution SystemMinoru Kuribayashi. 163-175 [doi]
- Image Watermarking Based on Reflectance ModificationPiyanart Chotikawanid, Thumrongrat Amornraksa. 176-190 [doi]
- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional BarcodesTakeru Maehara, Ryo Ikeda, Satoshi Ono. 191-205 [doi]
- An Authentication and Recovery Scheme for Digital Speech Signal Based on DWTJing Wang, Zhenghui Liu, Junjie He, Chuanda Qi. 206-219 [doi]
- Enrichment of Visual Appearance of Aesthetic QR CodeMinoru Kuribayashi, Masakatu Morii. 220-231 [doi]
- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D PrintersPiyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Hideyuki Torii, Kazutake Uehira, Youichi Takashima. 232-238 [doi]
- Blind Watermarking Based on Adaptive Lattice Quantization Index ModulationBingwen Feng, Wei Lu, Wei Sun 0007, Zhuoqian Liang, Juan Liu. 239-249 [doi]
- Self-Embedding Watermarking Scheme Based on MDS CodesDongmei Niu, Hongxia Wang, Minquan Cheng, Linna Zhou. 250-258 [doi]
- Watermarking Method Using Concatenated Code for Scaling and Rotation AttacksNobuhiro Hirata, Masaki Kawamura. 259-270 [doi]
- DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling AttacksHiroaki Ogawa, Minoru Kuribayashi, Motoi Iwata, Koichi Kise. 271-284 [doi]
- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual MaskingSang-Keun Ji, Wook-Hyung Kim, Han-Ul Jang, Seung-Min Mun, Heung-Kyu Lee. 285-298 [doi]
- Detection of Frequency-Scale Modification Using Robust Audio Watermarking Based on Amplitude ModulationAkira Nishimura. 299-311 [doi]
- Audio Watermarking Using Different Wavelet FiltersToshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen. 312-320 [doi]
- A Commutative Encryption and Reversible Watermarking for Fingerprint ImageVaibhav B. Joshi, Dhruv Gupta 0004, Mehul S. Raval. 323-336 [doi]
- Distortion-Free Robust Reversible Watermarking by Modifying and Recording IWT Means of Image BlocksShijun Xiang, Yi Wang. 337-349 [doi]
- Reversible Data Hiding for Encrypted Audios by High Order SmoothnessJing-Yong Qiu, Yu-Hsun Lin, Ja-Ling Wu. 350-364 [doi]
- Completely Separable Reversible Data Hiding in Encrypted ImagesDawen Xu 0001, Kai Chen, Rangding Wang, Shubing Su. 365-377 [doi]
- Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical ImagesXuefeng Tong, Xin Wang, Guorong Xuan, Shumeng Li, Yun Q. Shi. 378-391 [doi]
- Authenticated Secret Sharing Scheme Based on GMEMDWen-Chung Kuo, Shao-Hung Kuo, Hong-Yi Chang, Lih-Chyau Wuu. 395-405 [doi]
- Robust Content-Based Image Hash Functions Using Nested Lattice CodesThanh Xuan Nguyen, Ricardo Antonio Parrao Hernandez, Brian M. Kurkoski. 406-417 [doi]
- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel ExpansionWen Wang, Feng Liu, Weiqi Yan, Gang Shen, Teng Guo. 418-432 [doi]
- A New Construction of Tagged Visual Cryptography SchemeYaWei Ren, Feng Liu, Dongdai Lin, Rongquan Feng, Wen Wang. 433-445 [doi]