Abstract is missing.
- A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural NetworksJingjing Yu, Yifeng Zhan, Jianhua Yang, Xiangui Kang. 3-15 [doi]
- Detection of Video-Based Face Spoofing Using LBP and Multiscale DCTYe Tian, Shijun Xiang. 16-28 [doi]
- Source Cell-Phone Identification Using Spectral Features of Device Self-noiseChao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei. 29-45 [doi]
- Speech Authentication and Recovery Scheme in Encrypted DomainQing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi. 46-60 [doi]
- Detecting Double H.264 Compression Based on Analyzing Prediction Residual DistributionS. Chen, T. F. Sun, X. H. Jiang, P. S. He, S. L. Wang, Y. Q. Shi. 61-74 [doi]
- Identification of Electronic Disguised Voices in the Noisy EnvironmentWencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi. 75-87 [doi]
- Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric ImagesAamo Iorliam, Anthony T. S. Ho, Adrian Waller, Xi Zhao. 88-105 [doi]
- Source Camera Identification Based on Guided Image Estimation and Block Weighted AverageLe-Bing Zhang, Fei Peng, Min Long. 106-118 [doi]
- Recapture Image Forensics Based on Laplacian Convolutional Neural NetworksPengpeng Yang, Rongrong Ni, Yao Zhao. 119-128 [doi]
- Concealing Fingerprint-Biometric Data into Audio Signals for Identify AuthenticationSani M. Abdullahi, Hongxia Wang, Qing Qian, Wencheng Cao. 129-144 [doi]
- A Novel Robust Image Forensics Algorithm Based on L1-Norm EstimationXin He, Qingxiao Guan, Yanfei Tong, Xianfeng Zhao, Haibo Yu. 145-158 [doi]
- Detection of Copy-Move Forgery in Flat Region Based on Feature EnhancementWeiwei Zhang, ZhengHong Yang, Shaozhang Niu, Junbin Wang. 159-171 [doi]
- A Local Derivative Pattern Based Image Forensic Framework for Seam Carving DetectionJingyu Ye, Yun-Qing Shi. 172-184 [doi]
- Privacy MonitorTeng Guo, Feng Liu, Wen Wang, BingTao Yu. 187-197 [doi]
- Information Security Display Technology with Multi-view EffectWen Wang, Feng Liu, Teng Guo, YaWei Ren, Gang Shen. 198-208 [doi]
- Random Grids-Based Threshold Visual Secret Sharing with Improved Visual QualityXuehu Yan, Yuliang Lu, Lintao Liu, Song Wan. 209-222 [doi]
- Halftone Visual Cryptography with Complementary Cover ImagesGang Shen, Feng Liu, Zhengxin Fu, Bin Yu, Wen Wang. 223-237 [doi]
- Collusive Attacks to Partition Authentication Visual Cryptography SchemeYaWei Ren, Feng Liu, Wen Wang. 238-250 [doi]
- On the Robustness of Visual Cryptographic SchemesSabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai. 251-262 [doi]
- Optimal Distortion Estimation for Prediction Error Expansion Based Reversible WatermarkingAniket Roy, Rajat Subhra Chakraborty. 265-279 [doi]
- Blind 3D Mesh Watermarking Based on Sphere-Shape TemplateHak-Yeol Choi, Jeongho Son, Han-Ul Jang, Heung-Kyu Lee. 280-295 [doi]
- Fragile Watermarking Based Proofs of Retrievability for Archival Cloud DataXin Tang, Yining Qi, Yongfeng Huang. 296-311 [doi]
- Multiple Watermarking Using Multilevel Quantization Index ModulationBingwen Feng, Jian Weng, Wei Lu, Bei Pei. 312-326 [doi]
- Increasing Secret Data Hiding Capacity in QR Code Using 3 \times 3 3 × 3 SubcellsWisdarmanto Erlangga, Ari Moesriami Barmawi. 327-342 [doi]
- Databases Traceability by Means of Watermarking with Optimized DetectionJavier Franco-Contreras, Gouenou Coatrieux. 343-357 [doi]
- A New Card Authentication Scheme Based on Image Watermarking and EncryptionXinxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang, Qili Zhou. 358-369 [doi]
- Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed ObjectsKazutake Uehira, Masahiro Suzuki, Piyarat Silapasuphakornwong, Hideyuki Torii, Youichi Takashima. 370-378 [doi]
- Watermarking with Fixed Decoder for Aesthetic 2D BarcodeMinoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki. 379-392 [doi]
- Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC VideosDawen Xu 0001, Yani Zhu, Rangding Wang, Jianjing Fu, Kai Chen. 393-406 [doi]
- Second Order Perdicting-Error Sorting for Reversible Data HidingJiajia Xu, Hang Zhou, Weiming Zhang, Ruiqi Jiang, Guoli Ma, Nenghai Yu. 407-420 [doi]
- Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality ScalabilityYuanzhi Yao, Weiming Zhang, Nenghai Yu. 421-435 [doi]
- Reversible Data Hiding in Encrypted AMBTC Compressed ImagesXuejing Niu, Zhao-Xia Yin, Xinpeng Zhang, Jin Tang, Bin Luo. 436-445 [doi]
- Reversible 3D Image Data Hiding with Quality EnhancementWengai Liu, Rongrong Ni, Yao Zhao. 446-455 [doi]
- An Adaptive Reversible Data Hiding Scheme for JPEG ImagesJiaxin Yin, Rui Wang, Yuanfang Guo, Feng Liu. 456-469 [doi]
- Separable Multiple Bits Reversible Data Hiding in Encrypted DomainYan Ke, Minqing Zhang, Jia Liu. 470-484 [doi]
- Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding ChangeZichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang. 487-493 [doi]
- Embedding Strategy for Batch Adaptive SteganographyZengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu. 494-505 [doi]
- Adaptive Steganography Using 2D Gabor Filters and Ensemble ClassifiersYuan Bian, Guangming Tang, Shuo Wang, Zhanzhan Gao, Shiyuan Chen. 506-517 [doi]
- An Adaptive Video Steganography Based on Intra-prediction Mode and Cost AssignmentLingyu Zhang, Xianfeng Zhao. 518-532 [doi]
- Segmentation Based Steganalysis of Spatial Images Using Local Linear TransformRan Wang, Xijian Ping, Shaozhang Niu, Tao Zhang. 533-549 [doi]
- Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis TestingWei Huang, Xianfeng Zhao. 550-563 [doi]
- Deep Learning on Spatial Rich Model for SteganalysisXiaoyu Xu, Yifeng Sun, Guangming Tang, Shiyuan Chen, Jian Zhao. 564-577 [doi]
- A High Embedding Capacity Data Hiding Scheme Based upon Permutation VectorsChin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou, Hsin-Lung Wu. 578-587 [doi]
- Data Hiding in H.264/AVC Video Files Using the Coded Block PatternHong Zhang, Yun Cao, Xianfeng Zhao, Haibo Yu, Changjun Liu. 588-600 [doi]
- A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in SteganalysisDonghui Hu, Zhongjin Ma, Yuqi Fan, Lina Wang. 601-615 [doi]