Abstract is missing.
- Reversible transformations may improve the quality of reversible watermarkingAjith M. Kamath. [doi]
- Audio watermarking forensics: detecting malicious re-embeddingSascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser, Ulrich Rührmair. 75410 [doi]
- Audio annotation watermarking with robustness against DA/AD conversionKun Qian, Christian Krätzer, Michael Biermann, Jana Dittmann. 75410 [doi]
- On information leakage in fuzzy commitmentTanya Ignatenko, Frans M. J. Willems. 75410 [doi]
- Biometric template transformation: a security analysisAbhishek Nagar, Karthik Nandakumar, Anil K. Jain. 75410 [doi]
- Automatic counterfeit protection system code classificationJoost van Beusekom, Marco Schreyer, Thomas M. Breuel. 75410 [doi]
- Better security levels for broken arrowsFuchun Xie, Teddy Furon, Caroline Fontaine. 75410 [doi]
- Detecting content adaptive scaling of images for forensic applicationsClaude Fillion, Gaurav Sharma. 75410 [doi]
- IT and SLT characterizations of secured biometric authentication systemsNatalia A. Schmid, Harry Wechsler. 75410 [doi]
- JPEG recompression detectionXiaoying Feng, Gwenaël J. Doërr. 75410 [doi]
- Detecting double compression of audio signalRui Yang, Yun Q. Shi, Jiwu Huang. 75410 [doi]
- Alignment and bit extraction for secure fingerprint biometricsAbhishek Nagar, Shantanu Rane, Anthony Vetro. 75410 [doi]
- Forensic hash for multimedia informationWenjun Lu, Avinash L. Varna, Min Wu. 75410 [doi]
- Human visual system-based color image steganography using the contourlet transformWadood Abdul, Philippe Carré, Philippe Gaborit. 75410 [doi]
- Multimodal object authentication with random projections: a worst-case approachOleksiy J. Koval, Sviatoslav Voloshynovskiy. 75410 [doi]
- On the security of biohashingXuebing Zhou, Ton Kalker. 75410 [doi]
- Texture based attacks on intrinsic signature based printer identificationAravind K. Mikkilineni, Nitin Khanna, Edward J. Delp. 75410 [doi]
- Improving re-sampling detection by adding noiseLakshmanan Nataraj, Anindya Sarkar, B. S. Manjunath. 75410 [doi]
- Digital image authentication from thumbnailsEric Kee, Hany Farid. 75410 [doi]
- Robust minutiae hash for fingerprint template protectionBian Yang, Christoph Busch, Patrick Bours, Davrondzhon Gafurov. 75410 [doi]
- Exploring image dependencies: a new challenge in image forensicsAlessia De Rosa, F. Uccheddu, A. Costanzo, Alessandro Piva, Mauro Barni. 75410 [doi]
- Feature point based image watermarking with insertions, deletions, and substitution codesDieter Bardyn, Philippe Belet, Tim Dams, Ann Dooms, Peter Schelkens. 75410 [doi]
- Joint reversible data hiding and image encryptionBian Yang, Christoph Busch, Xiamu Niu. 75410 [doi]
- SIFT features in semi-fragile video watermarksStefan Thiemert, Martin Steinebach. 75410 [doi]
- Sensor noise camera identification: countering counter-forensicsMiroslav Goljan, Jessica J. Fridrich, Mo Chen. 75410 [doi]
- Modern steganalysis can detect YASSJan Kodovský, Tomás Pevný, Jessica J. Fridrich. 754102 [doi]
- Subset selection circumvents the square root lawScott Craver, Jun Yu. 754103 [doi]
- Feature selection for steganalysis using the Mahalanobis distanceJennifer L. Davidson, Jaikishan Jalan. 754104 [doi]
- Minimizing embedding impact in steganography using trellis-coded quantizationTomás Filler, Jan Judas, Jessica J. Fridrich. 754105 [doi]
- Image forensic analyses that elude the human visual systemHany Farid, Mary J. Bravo. 754106 [doi]
- Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensicsThomas Gloe, Karsten Borowka, Antje Winkler. 754107 [doi]
- Managing a large database of camera fingerprintsMiroslav Goljan, Jessica J. Fridrich, Tomás Filler. 754108 [doi]
- Efficient techniques for sensor fingerprint matching in large image and video databasesSevinc Bayram, Husrev T. Sencar, Nasir D. Memon. 754109 [doi]
- On detection of median filtering in digital imagesMatthias Kirchner, Jessica J. Fridrich. 754110 [doi]
- Efficient estimation of CFA pattern configuration in digital camera imagesMatthias Kirchner. 754111 [doi]
- A framework for theoretical analysis of content fingerprintingAvinash L. Varna, Wei-Hong Chuang, Min Wu. 754112 [doi]
- Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channelsAnindya Sarkar, B. S. Manjunath. 754113 [doi]
- On the embedding capacity of DNA strands under substitution, insertion, and deletion mutationsFélix Balado. 754114 [doi]
- Fast identification of highly distorted imagesTaras Holotyak, Sviatoslav Voloshynovskiy, Fokko Beekhof, Oleksiy J. Koval. 754116 [doi]