Abstract is missing.
- Compression Forensics Beyond The First Significant DigitSujoy Chakraborty, Matthias Kirchner. 1-7 [doi]
- Optically written watermarking technology using temporally and spatially luminance-modulated lightKohei Oshita, Hiroshi Unno, Kazutake Uehira. 1-6 [doi]
- Accelerating the DCTR Features Extraction for JPEG Steganalysis Based on CUDAChao Xia, Qingxiao Guan, Xianfeng Zhao, Yong Deng. 1-6 [doi]
- Banknote crease detection and banknote fitness classificationReinhold Huber-Mörk, Johannes Ruisz. 1-6 [doi]
- Toss that BOSSbase, Alice!Vahid Sedighi, Jessica J. Fridrich, Rémi Cogranne. 1-9 [doi]
- Avoiding detection on twitter: embedding strategies for linguistic steganographyAlex Wilson, Andrew D. Ker. 1-9 [doi]
- Detecting Copy-Move Forgeries in Scanned Text DocumentsSvetlana Abramova, Rainer Böhme. 1-9 [doi]
- Telltale Watermarks for Counting JPEG CompressionsMatthias Carnein, Pascal Schöttle, Rainer Böhme. 1-10 [doi]
- Security Evaluation based on the Analytic Hierarchy Process for First-line Anti-counterfeit ElementsManabu Yamakoshi, Junichi Tanaka, Hiroshi Iwasaki. 1-6 [doi]
- Maximal stable extremal regions for robust video watermarkingWaldemar Berchtold, Marcel Schäfer, Martin Steinebach. 1-8 [doi]
- Patch-Based Desynchronization of Digital Camera Sensor FingerprintsJohn Entrieri, Matthias Kirchner. 1-9 [doi]
- Separating Steganographic Images by Embedding KeyTu-Thach Quach. 1-6 [doi]
- Effect of Compression on Sensor-Fingerprint Based Camera IdentificationMiroslav Goljan, Mo Chen, Pedro Comesaña, Jessica J. Fridrich. 1-10 [doi]
- Quality Metric for 2D Textures on 3D ObjectsWaldemar Berchtold, Marcel Schäfer, Sascha Wombacher, Martin Steinebach. 1-6 [doi]
- Experimental study of Print-and-Scan impact as random processIuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel. 1-11 [doi]
- Robust smartphone fingerprint by mixing device sensors features for mobile strong authenticationIrene Amerini, Paolo Bestagini, Luca Bondi, Roberto Caldelli, Matteo Casini, Stefano Tubaro. 1-8 [doi]
- Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatchLionel Pibre, Jérôme Pasquet, Dino Ienco, Marc Chaumont. 1-11 [doi]
- A Novel Attack Model for Collusion Secure Fingerprinting CodesMarcel Schäfer, Waldemar Berchtold, Teetje Stark, Nils Reimers, Martin Steinebach. 1-11 [doi]
- Forensic authentication of banknotes on mobile phonesThomas Dewaele, Maurits Diephuis, Taras Holotyak, Sviatoslav Voloshynovskiy. 1-8 [doi]
- Improvement of trade-off between compression tolerance and perceptibility of video watermark for broadcastingKeizo Kato, Kensuke Kuraki, Ryuta Tanaka. 1-9 [doi]
- Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic TestJun Yu, Enping Li, Scott Craver. 1-3 [doi]
- Attacks on Speaker Identification Systems Constrained to Speech-to-Text DecodingAlireza Farrokh Baroughi, Scott Craver, Daniel Douglas. 1-7 [doi]
- Improving Selection-Channel-Aware Steganalysis FeaturesTomás Denemark, Jessica J. Fridrich, Pedro Comesaña Alfaro. 1-8 [doi]
- Malicons: Detecting Payload in FaviconsTomás Pevný, Martin Kopp, Jakub Kroustek, Andrew D. Ker. 1-9 [doi]