Abstract is missing.
- Exposing digital forgeries by detecting inconsistencies in lightingMicah K. Johnson, Hany Farid. 1-10 [doi]
- Capacity of steganographic channelsJeremiah J. Harmsen, William A. Pearlman. 11-24 [doi]
- LSB steganalysis based on high-order statisticsSorina Dumitrescu, Xiaolin Wu. 25-32 [doi]
- A Bayesian image steganalysis approach to estimate the embedded secret messageAruna Ambalavanan, Rajarathnam Chandramouli. 33-38 [doi]
- Audio watermark attacks: from single to profile attacksAndreas Lang, Jana Dittmann, Ryan Spring, Claus Vielhauer. 39-50 [doi]
- An SVD-based audio watermarking techniqueHamza Özer, Bülent Sankur, Nasir D. Memon. 51-56 [doi]
- Verifier-tuple for audio-forensic to determine speaker environmentAndrea Oermann, Andreas Lang, Jana Dittmann. 57-62 [doi]
- Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryptionDominik Engel, Andreas Uhl. 63-70 [doi]
- On the security of a clipped hopfield neural network-based cryptosystemDaniel Socek, Dubravko Culibrk. 71-76 [doi]
- A government perspective on digital data embedding: taking a systems approachChad Heitzenrater. 77-78 [doi]
- Resolution and quality scalable spread spectrum image watermarkingAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins. 79-90 [doi]
- Watermarking of MPEG-2 video in compressed domain using VLC mappingBijan G. Mobasseri, Michael P. Marcinak. 91-94 [doi]
- Approaching optimal value expansion for reversible watermarkingBian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun. 95-102 [doi]
- Robust non-interactive zero-knowledge watermarking scheme against cheating proverChia-Mu Yu, Chun-Shien Lu. 103-110 [doi]
- A secure biometric authentication scheme based on robust hashingYagiz Sutcu, Husrev T. Sencar, Nasir D. Memon. 111-116 [doi]
- A fragile watermarking scheme for 3D meshesHao-Tian Wu, Yiu-ming Cheung. 117-124 [doi]
- Challenges in multimedia security: an industry perspectiveNeerja Raman. 125-126 [doi]
- Building efficient and effective multimedia fingerprints via joint coding and embeddingShan He, Min Wu. 127-136 [doi]
- Composite signature based watermarking for fingerprint authenticationFarid Ahmed, Ira S. Moskowitz. 137-142 [doi]
- Watermill: an optimized fingerprinting system for highly constrained dataCamélia Constantin, David Gross-Amblard, Meryem Guerrouani. 143-155 [doi]