Abstract is missing.
- LECA: A learned approach for efficient cover-agnostic watermarkingXiyang Luo, Michael Goebel, Elnaz Barshan, Feng Yang. 1-6 [doi]
- Cost polarization by dequantizing for JPEG steganographyEdgar Kaziakhmedov, Yassine Yousfi, Eli Dworetzky, Jessica J. Fridrich. 1-14 [doi]
- Detecting GAN-generated synthetic images using semantic inconsistenciesDanial Samadi Vahdati, Matthew C. Stamm. 1-6 [doi]
- Synthetic speech attribution using self supervised audio spectrogram transformerAmit Kumar Singh Yadav, Emily R. Bartusiak, Kratika Bhagtani, Edward J. Delp. 1-11 [doi]
- Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behaviorDennis Siegel, Stefan Seidlitz, Christian Krätzer, Jana Dittmann. 1-6 [doi]
- Making digital cameras less attractive targets for theftHenry Gordon Dietz, Oluwatofunmi Oyetan. 1-7 [doi]
- Audio captcha breaking and consequences for human usersFabian Oberthür, Martin Steinebach, Verena Battis. 373-1 [doi]
- Predicting positions of flipped bits in robust image hashesMarius Leon Hammann, Martin Steinebach, Huajian Liu, Niklas Bunzel. 375-1 [doi]
- Privacy preserving leak detection in peer-to-peer communicationJulian Heeger, Simon Bugert, Waldemar Berchtold, Alexander Gruler, Martin Steinebach. 377-1 [doi]
- Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection modelsChristian Krätzer, Dennis Siegel, Stefan Seidlitz, Jana Dittmann. 379-1 [doi]
- Detection of deepfakes using background-matchingStephanie Blümer, Martin Steinebach, Raphael Antonius Frick, Niklas Bunzel. 381-1 [doi]