Abstract is missing.
- Multi-modal Steganography Based on Semantic RelevancyYuting Hu, Zhongliang Yang, Han Cao, Yongfeng Huang. 3-14 [doi]
- Variable Rate Syndrome-Trellis Codes for Steganography on Bursty ChannelsBingwen Feng, Zhiquan Liu, Kaimin Wei, Wei Lu 0001, Yuchun Lin. 15-30 [doi]
- Steganographic Distortion Function for Enhanced ImagesZichi Wang, Guorui Feng, Xinpeng Zhang 0001. 31-40 [doi]
- Improving Text-Image Matching with Adversarial Learning and Circle Loss for Multi-modal SteganographyYuting Hu, Han Cao, Zhongliang Yang, Yongfeng Huang. 41-52 [doi]
- Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System ApproachHongxia Wang, Zhilong Chen, Peisong He. 53-67 [doi]
- Generating JPEG Steganographic Adversarial Example via Segmented Adversarial EmbeddingSai Ma, Xianfeng Zhao. 68-79 [doi]
- High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic PositioningJiajun Zou, Zhongliang Yang, Si-yu Zhang, Sadaqat ur Rehman, Yongfeng Huang. 80-93 [doi]
- On the Sharing-Based Model of SteganographyXianfeng Zhao, Chunfang Yang, Fenlin Liu. 94-105 [doi]
- Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage DetectionSebastian Gruber, Bernd Neumayr, Christoph Fabianek, Eduard Gringinger, Christoph Georg Schütz, Michael Schrefl. 109-124 [doi]
- Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity FunctionalitiesKokSheik Wong, Mohamed N. M. Nazeeb, Jean-Luc Dugelay. 125-135 [doi]
- Visible Reversible Watermarking for 3D Models Based on Mesh SubdivisionFei Peng, Wenjie Qian, Min Long. 136-149 [doi]
- Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur and Artificial BlurXiaoyu Zhao, Yakun Niu, Rongrong Ni, Yao Zhao 0001. 153-167 [doi]
- Deepfake Video Detection Using Audio-Visual ConsistencyYewei Gu, Xianfeng Zhao, Chen Gong, Xiaowei Yi. 168-180 [doi]
- A Machine Learning Approach to Approximate the Age of a Digital ImageRobert Jöchl, Andreas Uhl. 181-195 [doi]
- Facing Image Source Attribution on iPhone XDaniele Baracchi, Massimo Iuliani, Andrea G. Nencini, Alessandro Piva. 196-207 [doi]
- Data-Dependent Scaling of CNN's First Layer for Improved Image Manipulation DetectionIvan Castillo Camacho, Kai Wang. 208-223 [doi]
- ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image ForensicsHui Zeng, Kang Deng, Anjie Peng. 224-236 [doi]
- A Hybrid Loss Network for Localization of Image ManipulationQilin Yin, Jinwei Wang, Xiangyang Luo. 237-247 [doi]
- Efficient Generation of Speech Adversarial Examples with Generative ModelDonghua Wang, Rangding Wang, Li Dong 0006, Diqun Yan, Yiming Ren. 251-264 [doi]
- Lightweight DCT-Like Domain Forensics Model for Adversarial ExampleJunJie Zhao, Jinwei Wang. 265-279 [doi]