Abstract is missing.
- Multimedia systems securityBhavani M. Thuraisingham. 1-2 [doi]
- Statistically undetectable jpeg steganography: dead ends challenges, and opportunitiesJessica J. Fridrich, Tomás Pevný, Jan Kodovský. 3-14 [doi]
- On the capacity of stegosystemsPedro Comesaña, Fernando Pérez-González. 15-24 [doi]
- On covert collaborationArati Baliga, Joe Kilian. 25-34 [doi]
- Exposing digital forgeries in video by detecting duplicationWeihong Wang, Hany Farid. 35-42 [doi]
- Detecting filtered cloning in digital imagesBrandon Dybala, Brian Jennings, David Letscher. 43-50 [doi]
- A natural image model approach to splicing detectionYun Q. Shi, Chunhua Chen, Wen Chen. 51-62 [doi]
- Digital audio forensics: a first practical evaluation on microphone and environment classificationChristian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang. 63-74 [doi]
- Distributed keyless security for correlated data with applications in visual sensor networksWilliam Luh, Deepa Kundur. 75-86 [doi]
- Format-compliant jpeg2000 encryption with combined packet header and packet body protectionDominik Engel, Thomas Stütz, Andreas Uhl. 87-96 [doi]
- On efficient transparent jpeg2000 encryptionThomas Stütz, Andreas Uhl. 97-108 [doi]
- A secure multidimensional point inclusion protocolJuan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma. 109-120 [doi]
- Histogram-based image hashing scheme robust against geometric deformationsShijun Xiang, Hyoung Joong Kim, Jiwu Huang. 121-128 [doi]
- Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodingsMatthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan. 129-140 [doi]
- The ultimate steganalysis benchmark?Andrew D. Ker. 141-148 [doi]
- Steganalysis of GIM-based data hiding using kernel density estimationHafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli. 149-160 [doi]
- Towards digital video steganalysis using asymptotic memoryless detectionJulien S. Jainsky, Deepa Kundur, Don R. Halverson. 161-168 [doi]
- Geometric warping watermarking extended concerning geometric attacks and embedding artifactsDima Pröfrock, Mathias Schlauweg, Erika Müller. 169-174 [doi]
- Robust blind watermarking mechanism for point sampled geometryParag Agarwal, Balakrishnan Prabhakaran. 175-186 [doi]
- Nested object watermarking: from the rectangular con-straint to polygonal and private annotationsClaus Vielhauer, Maik Schott. 187-194 [doi]
- Expanding the class of watermark de-synchronization attacksMauro Barni, Angela D Angelo, Neri Merhav. 195-204 [doi]
- A new approach to countering ambiguity attacksHusrev T. Sencar, Qiming Li, Nasir D. Memon. 205-214 [doi]
- Attack vs. failure detection in event-driven wireless visual sensor networksAlexandra Czarlinska, Deepa Kundur. 215-220 [doi]
- A new pixel-wise mask for watermarkingCorina Nafornita. 221-228 [doi]
- Video watermark detection with controllable performance with and without knowledge of watermark locationManeli Noorkami, Russell M. Mersereau. 229-236 [doi]
- Practical performance analysis of secure modulations for woa spread-spectrum based image watermarkingBenjamin Mathon, Patrick Bas, François Cayre. 237-244 [doi]
- Progressive compression invariant semi-fragile watermarks for 3d meshesPuneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran. 245-250 [doi]