Abstract is missing.
- GAN-Based Steganography with the Concatenation of Multiple Feature MapsHaibin Wu, Fengyong Li, Xinpeng Zhang, Kui Wu 0001. 3-17 [doi]
- GAN-TStega: Text Steganography Based on Generative Adversarial NetworksZhongliang Yang, Nan Wei, Qinghe Liu, Yongfeng Huang, Yujin Zhang. 18-31 [doi]
- Optimized CNN with Point-Wise Parametric Rectified Linear Unit for Spatial Image SteganalysisYiming Xue, Wan-li Peng, Yuzhu Wang, Juan Wen, Ping Zhong. 32-42 [doi]
- Light Multiscale Conventional Neural Network for MP3 SteganalysisJinghong Zhang, Xiaowei Yi, Xianfeng Zhao, Yun Cao. 43-56 [doi]
- Improving Audio Steganalysis Using Deep Residual NetworksZhenyu Zhang, Xiaowei Yi, Xianfeng Zhao. 57-70 [doi]
- Cover-Source Mismatch in Deep Spatial SteganalysisXunpeng Zhang, Xiangwei Kong, Pengda Wang, Bo Wang 0024. 71-83 [doi]
- Ensemble Steganalysis Based on Deep Residual NetworkQiangjie Li, Guorui Feng, Hanzhou Wu, Xinpeng Zhang. 84-95 [doi]
- Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small PatchesLudovic Darmet, Kai Wang 0002, François Cayre. 99-114 [doi]
- GRU-SVM Model for Synthetic Speech DetectionTing Huang, Hongxia Wang, Yi Chen 0008, Peisong He. 115-125 [doi]
- Median Filtering Detection of Small-Size Image Using AlexCaps-NetworkGuiduo Duan, Jiayu Miao, Tianxi Huang. 126-140 [doi]
- Double JPEG Compression Detection Based on Markov ModelJinwei Wang, Wei Huang, Xiangyang Luo, Yung-Qing Shi. 141-149 [doi]
- Anti-forensics of Image Sharpening Using Generative Adversarial NetworkZhangyi Shen, Feng Ding 0007, Yunqing Shi. 150-157 [doi]
- A New JPEG Image Watermarking Method Exploiting Spatial JND ModelLiwen Qin, Xiaolong Li, Yao Zhao. 161-170 [doi]
- Improved DM-QIM Watermarking Scheme for PDF DocumentMinoru Kuribayashi, KokSheik Wong. 171-183 [doi]
- New Paradigm for Self-embedding Image Watermarking with Poisson EquationFang Cao, Tianwei Wu, Chuan Qin, Zhenxing Qian, Xinpeng Zhang. 184-191 [doi]
- Reversible Data Hiding Based on Partitioning the Prediction ValuesHaihang Wu, Fangjun Huang. 195-203 [doi]
- A Novel Reversible Data Hiding with Skin Tone Smoothing Effect for Face ImagesYang Yang 0059, Xue Cai, Xingxing Xiao, Jinghan Ye, Wenyi Shi. 204-212 [doi]
- A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted ImagesAsad Malik, Hongxia Wang, Ahmad Neyaz Khan, Yanli Chen, Yi Chen 0008. 213-220 [doi]
- Information Hiding Based on Typing ErrorsLinna Zhou, Derui Liao. 221-230 [doi]
- High-Capacity Reversible Data Hiding in Encrypted Images Based on MSB PredictionDawen Xu 0001, Bo Guan, Shubing Su, Xuena Qiu. 231-243 [doi]
- Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field ModelYichen Tong, Jiangqun Ni, Wenkang Su. 247-255 [doi]
- Broadcasting Steganography in the BlockchainMengtian Xu, Hanzhou Wu, Guorui Feng, Xinpeng Zhang, Feng Ding. 256-267 [doi]
- Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts ReductionYubo Lu, Liming Zhai, Lina Wang. 268-280 [doi]
- Halftone Image Steganography with Distortion Measurement Based on Structural SimilarityWanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang. 281-292 [doi]
- A Motion Vector-Based Steganographic Algorithm for HEVC with MTB Mapping StrategyMengyuan Guo, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu 0003. 293-306 [doi]
- New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint DensityChen Gong, Xianfeng Zhao. 307-321 [doi]
- A Novel Feature Selection Model for JPEG Image SteganalysisLiran Yang, Jing Zhong, Ping Zhong, Yiming Xue, Juan Wen. 322-336 [doi]
- New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix FactorizationHui Ge, Donghui Hu, Haiyan Xu, Meng Li, Shuli Zheng. 337-351 [doi]
- IStego100K: Large-Scale Image Steganalysis DatasetZhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao. 352-364 [doi]
- BNS-CNN: A Blind Network Steganalysis Model Based on Convolutional Neural Network in IPv6 NetworkDanyang Zhao, Kaixi Wang. 365-373 [doi]
- Behavioral Security in Covert Communication SystemsZhongliang Yang, Yuting Hu, Yongfeng Huang, Yujin Zhang. 377-392 [doi]
- Image Visually Meaningful Cryptography Based on Julia Set Generating and Information HidingLongfu Zhou, Sen Bai, Yuqiang Cao, Yinglong Wang. 393-406 [doi]
- Multi-attack Reference Hashing Generation for Image AuthenticationLing Du, Yijing Wang, Anthony T. S. Ho. 407-420 [doi]
- Cheating Detection in (k, n) Secret Image Sharing SchemeJianfeng Ma, Liping Yin, Peng Li. 421-428 [doi]