Abstract is missing.
- Probabilistic fingerprinting codes used to detect traitor zero-bit watermarkMathieu Desoubeaux, Gaëtan Le Guelvouit, William Puech. [doi]
- Re-synchronizing audio watermarking after non-linear time stretchingMartin Steinebach, Sascha Zmudzinski, Stefan Nürnberger. [doi]
- Lossless image data embedding in plain areasMehdi Fallahpour, David Megías, Yun Q. Shi. [doi]
- Design of adaptive steganographic schemes for digital imagesTomás Filler, Jessica J. Fridrich. [doi]
- Assessment of camera phone distortion and implications for watermarkingAparna Gurijala, Alastair Reed, Eric Evans. [doi]
- A new paradigm for steganalysis via clusteringAndrew D. Ker, Tomás Pevný. [doi]
- Trading-off performance and complexity in identification problemTaras Holotyak, Svyatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof. [doi]
- A curiosity regarding steganographic capacity of pathologically nonstationary sourcesAndrew D. Ker. [doi]
- Private content identification based on soft fingerprintingSviatoslav Voloshynovskiy, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh. [doi]
- Feature point-based 3D mesh watermarking that withstands the cropping attackMireia Montañola Sales, Rony Darazi, Joachim Giard, Patrice Rondao-Alface, Benoît Macq. [doi]
- Steganalysis using logistic regressionIvans Lubenko, Andrew D. Ker. [doi]
- Contrast-enhancing and deterministic tone mapping method in natural image hiding scheme using halftone imagesEmi Myodo, Koichi Takagi, Ryoichi Kawada. [doi]
- Forensic printer detection using intrinsic signaturesAravind K. Mikkilineni, Nitin Khanna, Edward J. Delp. [doi]
- Rihamark: perceptual image hash benchmarkingChristoph Zauner, Martin Steinebach, Eckehard Hermann. [doi]
- Geometrically robust perceptual fingerprinting: an asymmetric caseOleksiy J. Koval, Svyatoslav Voloshynovskiy, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof. [doi]
- A perceptually driven hybrid additive-multiplicative watermarking technique in the wavelet domainFlorent Autrusseau, Sylvain David, Vinod Pankajakshan, Patrizio Campisi. [doi]
- A context model for microphone forensics and its application in evaluationsChristian Kraetzer, Kun Qian, Maik Schott, Jana Dittmann. [doi]
- On locating steganographic payload using residualsTu-Thach Quach. [doi]
- Non-destructive forensic latent fingerprint acquisition with chromatic white light sensorsMarcus Leich, Stefan Kiltz, Jana Dittmann, Claus Vielhauer. [doi]
- A new metric for measuring the visual quality of video watermarksDaniel Trick, Stefan Thiemert. [doi]
- Detecting messages of unknown lengthTomás Pevný. [doi]
- Collusion-secure patchwork embedding for transaction watermarkingWaldemar Berchtold, Sascha Zmudzinski, Marcel Schäfer, Martin Steinebach. [doi]
- Steganalysis in high dimensions: fusing classifiers built on random subspacesJan Kodovský, Jessica J. Fridrich. [doi]
- Double H.264/AVC compression detection using quantized nonzero AC coefficientsDandan Liao, Rui Yang, Hongmei Liu, Jian Li, Jiwu Huang. [doi]
- Feature restoration and distortion metricsVentsislav Chonev, Andrew D. Ker. [doi]
- Signal rich art: enabling the vision of ubiquitous computingBruce Davis. 788002 [doi]
- Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystemNaveed Islam, William Puech, Robert Brouzet. 788004 [doi]
- Homomorphic encryption-based secure SIFT for privacy-preserving feature extractionChao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei. 788005 [doi]
- Determining approximate age of digital images using sensor defectsJessica J. Fridrich, Miroslav Goljan. 788006 [doi]
- Performance comparison of denoising filters for source camera identificationAndrea Cortiana, Valentina Conotter, Giulia Boato, Francesco G. B. De Natale. 788007 [doi]
- Identifying image forgeries using change points detectionBabak Mahdian, Stanislav Saic. 788008 [doi]
- Enhancing ROC performance of trustworthy camera source identificationXiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang. 788009 [doi]
- Toward the identification of DSLR lenses by chromatic aberrationJun Yu, Scott Craver, Enping Li. 788010 [doi]