Abstract is missing.
- HEVC Double Compression Detection Based on SN-PUPM FeatureQianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong. 3-17 [doi]
- Towards Automated Forensic Pen Ink Verification by Spectral AnalysisMichael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer. 18-30 [doi]
- Recaptured Image Forensics Based on Quality Aware and Histogram FeaturePengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao. 31-41 [doi]
- Website Fingerprinting Attack on Psiphon and Its Forensic AnalysisTekachew Gobena Ejeta, Hyoung Joong Kim. 42-51 [doi]
- Deep Learning Based Counter-Forensic Image Classification for Camera Model IdentificationVenkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla. 52-64 [doi]
- Block-Based Convolutional Neural Network for Image Forgery DetectionJianghong Zhou, Jiangqun Ni, Yuan Rao. 65-76 [doi]
- A Hybrid Feature Model for Seam Carving DetectionJingyu Ye, Yun-Qing Shi. 77-89 [doi]
- Face Morphing Detection: An Approach Based on Image Degradation AnalysisTom Neubert. 93-106 [doi]
- Detection of Face Morphing Attacks by Deep LearningClemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert. 107-120 [doi]
- CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image MorphingLukasz Wandzik, Raul Vicente-Garcia, Gerald Kaeding, Xi Chen. 121-135 [doi]
- Topological Data Analysis for Image Tampering DetectionAras Asaad, Sabah Jassim. 136-146 [doi]
- Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel ModelYi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu. 149-162 [doi]
- A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion OptimizationYu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou. 163-176 [doi]
- Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis CodingWeiqi Luo, Yue Zhang, Haodong Li. 177-186 [doi]
- Information Hiding Using CAVLC: Misconceptions and a Detection StrategyWeike You, Yun Cao, Xianfeng Zhao. 187-201 [doi]
- Adaptive MP3 Steganography Using Equal Length Entropy Codes SubstitutionKun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou. 202-216 [doi]
- A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter FrameYanzhen Ren, Qiaochu Xiong, Lina Wang. 217-231 [doi]
- A Prediction Model Based Approach to Open Space Steganography Detection in HTML WebpagesIman Sedeeq, Frans Coenen, Alexei Lisitsa. 235-247 [doi]
- Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual NetworksDaniel Spiekermann, Jörg Keller 0001, Tobias Eggendorfer. 248-262 [doi]
- Steganalysis Based on Awareness of Selection-Channel and Deep LearningJianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, Yunqing Shi. 263-272 [doi]
- Improved Algorithms for Robust Histogram Shape-Based Image WatermarkingBingwen Feng, Jian Weng, Wei Lu. 275-289 [doi]
- Image Quality Assessment in Reversible Data Hiding with Contrast EnhancementHao-Tian Wu, Shaohua Tang, Yun-Qing Shi. 290-302 [doi]
- Improved Reversible Visible Watermarking Based on Adaptive Block PartitionGuangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo. 303-317 [doi]
- Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral InvariantsChenchen Cui, Rongrong Ni, Yao Zhao. 318-330 [doi]
- On the Statistical Properties of Syndrome Trellis CodingOlaf Markus Köhler, Cecilia Pasquini, Rainer Böhme. 331-346 [doi]
- A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse HistogramMasaaki Fujiyoshi, Hitoshi Kiya. 347-361 [doi]
- A Novel Visual Cryptography Scheme with Different Importance of ShadowsPeng Li, Zuquan Liu. 365-377 [doi]
- A Novel Image Classification Method with CNN-XGBoost ModelXudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li. 378-390 [doi]
- Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation SystemsAkira Nishimura. 391-405 [doi]
- Temporal Integration Based Visual Cryptography Scheme and Its ApplicationWen Wang, Feng Liu, Teng Guo, YaWei Ren. 406-419 [doi]