Abstract is missing.
- A cost-effective decision tree based approach to steganalysisLiyun Li, Husrev Taha Sencar, Nasir D. Memon. [doi]
- Quantitative steganalysis using rich modelsJan Kodovský, Jessica J. Fridrich. [doi]
- A study of embedding operations and locations for steganography in H.264 videoAndreas Neufeld, Andrew D. Ker. [doi]
- A sneak peek into the camcorder pathCherif Ben Zid, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr. [doi]
- Video steganography with multi-path motion estimationYun Cao, Xianfeng Zhao, FengHua Li, Nenghai Yu. [doi]
- On the role of side information in steganography in empirical coversJessica J. Fridrich. [doi]
- Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottomsRobert Fischer 0001, Claus Vielhauer, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann. [doi]
- Sensor fingerprint digests for fast camera identification from geometrically distorted imagesMiroslav Goljan, Jessica J. Fridrich. [doi]
- Forensic analysis of interdependencies between vignetting and radial lens distortionAndré Fischer, Thomas Gloe. [doi]
- Stegatone performance characterizationYung-Yao Chen, Robert Ulichney, Matthew Gaubatz, Stephen Pollard, Chun-Jung Tai, Jan P. Allebach. [doi]
- Image tampering localization via estimating the non-aligned double JPEG compressionLanying Wu, Xiangwei Kong, Bo Wang, Shize Shang. [doi]
- Case studies and further improvements on source camera identificationKenji Kurosawa, Kenro Kuroki, Ken'ichi Tsuchiya, Naoaki Igarashi, Norimitsu Akiba. [doi]
- Random projections of residuals as an alternative to co-occurrences in steganalysisVojtech Holub, Jessica J. Fridrich, Tomás Denemark. [doi]
- Accelerating video carving from unallocated spaceHari Kalva, Anish Parikh, Avinash Srinivasan. [doi]
- Exploring multitask learning for steganalysisJulie Makelberge, Andrew D. Ker. [doi]
- The challenges of rich features in universal steganalysisTomás Pevný, Andrew D. Ker. [doi]
- A histogram shifting based RDH scheme for H.264/AVC with controllable driftZafar Shahid, William Puech. [doi]
- Photocopier forensics based on arbitrary text charactersChangyou Wang, Xiangwei Kong, Shize Shang, Xingang You. [doi]
- Insertion, deletion robust audio watermarking: a set theoretic, dynamic programming approachAndrew Nadeau, Gaurav Sharma 0001. 866503 [doi]
- Impeding forgers at photo inceptionMatthias Kirchner, Peter Winkler, Hany Farid. 866504 [doi]
- Watermark embedding in optimal color directionRobert G. Lyons, Alastair Reed, John Stach. 866505 [doi]
- Video game watermarkingWaldemar Berchtold, Marcel Schäfer, Huajian Liu, Fábio Touceira Takahashi, André Schmitz, Sascha Zmudzinski, Martin Steinebach, Jonas Wieneke. 866506 [doi]
- Banknote authentication with mobile devicesVolker Lohweg, Jan Leif Hoffmann, Helene Dörksen, Roland Hildebrand, Eugen Gillich, Jürg Hofmann, Johannes Schaede. 866507 [doi]
- Visibility enhancement and validation of segmented latent fingerprints in crime scene forensicsAndrey Makrushin, Tobias Kiertscher, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer. 866508 [doi]
- Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopesMario Hildebrandt, Stefan Kiltz, Jana Dittmann. 866509 [doi]