Abstract is missing.
- A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital ImagesJingyu Ye, Yuxi Shi, Guanshuo Xu, Yun-Qing Shi. 3-13 [doi]
- Convolutional Neural Network for Larger JPEG Images SteganalysisQian Zhang, Xianfeng Zhao, Changjun Liu. 14-28 [doi]
- Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG SteganalysisHuilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi. 29-39 [doi]
- A Deep Residual Multi-scale Convolutional Network for Spatial SteganalysisShiyang Zhang, Hong Zhang 0005, Xianfeng Zhao, Haibo Yu. 40-52 [doi]
- Provably Secure Generative Steganography Based on Autoregressive ModelKuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu. 55-68 [doi]
- A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio WaveformAkira Nishimura. 69-82 [doi]
- Cycle GAN-Based Attack on Recaptured Images to Fool both Human and MachineWei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li. 83-92 [doi]
- Spherical Panorama Image Watermarking Using Viewpoint DetectionJi-Hyeon Kang, Sang-Keun Ji, Heung-Kyu Lee. 95-109 [doi]
- Traitor Tracing After Visible Watermark RemovalHannes Mareen, Johan De Praeter, Glenn Van Wallendael, Peter Lambert. 110-123 [doi]
- Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard MatricesYiming Xue, Kai Mu, Yan Li, Juan Wen, Ping Zhong, Shaozhang Niu. 124-136 [doi]
- DWT and QR Code Based Watermarking for Document DRMNicolò Cardamone, Fabrizio d'Amore. 137-150 [doi]
- Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic DataDavid Niyitegeka, Gouenou Coatrieux, Reda Bellafqira, Emmanuelle Génin, Javier Franco-Contreras. 151-166 [doi]
- Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and ModificationBo Ou, Xiaolong Li, Wei Li, Yun-Qing Shi. 169-179 [doi]
- Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial CorrelationChang Song, Yifeng Zhang, Guojun Lu. 180-194 [doi]
- A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data HidingBin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi. 195-205 [doi]
- A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram ShiftingYinyin Peng, Zhao-Xia Yin. 206-215 [doi]
- Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression CodingFan Chen, Yuan Yuan, Yuyu Chen, HongJie He, Lingfeng Qu. 216-229 [doi]
- A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction BlocksYi Dong, Tanfeng Sun, Xinghao Jiang. 233-247 [doi]
- Improving the Embedding Strategy for Batch Adaptive SteganographyXinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu. 248-260 [doi]
- Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel InformationShijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li. 261-274 [doi]
- Pitch Delay Based Adaptive Steganography for AMR Speech StreamChen Gong, Xiaowei Yi, Xianfeng Zhao. 275-289 [doi]
- An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG DomainThéo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya. 290-303 [doi]
- VPCID - A VoIP Phone Call Identification DatabaseYuankun Huang, Shunquan Tan, Bin Li, Jiwu Huang. 307-321 [doi]
- Secure Multilayer Perceptron Based on Homomorphic EncryptionReda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Michel Cozic. 322-336 [doi]
- Surveillance Video Authentication Using Universal Image Quality Index of Temporal AverageSondos Fadl, Qi Han, Qiong Li. 337-350 [doi]
- Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial NetworksHakil Kim, Xuenan Cui, Man-Gyu Kim, Thi Hai Binh Nguyen. 353-362 [doi]
- Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature LevelHyoungwoo Park, Minjeong Ju, Sangkeun Moon, Chang D. Yoo. 363-372 [doi]
- Towards Robust Neural Networks with Lipschitz ContinuityMuhammad Usama, Dong Eui Chang. 373-389 [doi]