Abstract is missing.
- Two key estimation techniques for the broken arrows watermarking schemePatrick Bas, Andreas Westfeld. 1-8 [doi]
- An efficient buyer-seller watermarking protocol based on composite signal representationMina Deng, Tiziano Bianchi, Alessandro Piva, Bart Preneel. 9-18 [doi]
- Reversible data hiding using additive prediction-error expansionMing Chen 0008, Zhenyong Chen, Xiao Zeng, Zhang Xiong. 19-24 [doi]
- Additive spread-spectrum watermark detection in demosaicked imagesPeter Meerwald, Andreas Uhl. 25-32 [doi]
- Optimization of natural watermarking using transportation theoryBenjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. 33-38 [doi]
- Exposing digital forgeries in video by detecting double quantizationWeihong Wang, Hany Farid. 39-48 [doi]
- Unweighted fusion in microphone forensics using a decision tree and linear logistic regression modelsChristian Kraetzer, Maik Schott, Jana Dittmann. 49-56 [doi]
- Mp3 bit rate quality detection through frequency spectrum analysisBrian D'Alessandro, Yun Q. Shi. 57-62 [doi]
- Calibration revisitedJan Kodovský, Jessica J. Fridrich. 63-74 [doi]
- Steganalysis by subtractive pixel adjacency matrixTomás Pevný, Patrick Bas, Jessica J. Fridrich. 75-84 [doi]
- The square root law requires a linear keyAndrew D. Ker. 85-92 [doi]
- Performance study and improvement on ECC-based binary anti-collusion forensic code for multimediaW. Sabrina Lin, Shan He 0002, Jeffrey Bloom. 93-98 [doi]
- EM decoding of tardos traitor tracing codesTeddy Furon, Luis Pérez-Freire. 99-106 [doi]
- Detection of seam carving and localization of seam insertions in digital imagesAnindya Sarkar, Lakshmanan Nataraj, B. S. Manjunath. 107-116 [doi]
- Defeating fake-quality MP3Rui Yang, Yun-Qing Shi, Jiwu Huang. 117-124 [doi]
- A pixel-based digital photo authentication framework via demosaicking inter-pixel correlationNa Fan, Cheng Jin, Yizhen Huang. 125-130 [doi]
- Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome codingVasiliy Sachnev, Hyoung Joong Kim, Rongyue Zhang. 131-140 [doi]
- Improved embedding based on a set of cover imagesElke Franz, Stefan Rönisch, Robert Bartel. 141-150 [doi]
- A supraliminal channel in a wireless phone applicationEnping Li, Scott Craver. 151-154 [doi]
- Entropy codec based on evolutionary MHT and its application in video encryptionYun Cao, Xianfeng Zhao, Dengguo Feng. 155-160 [doi]
- Selective encryption of the MC EZBC bitstream for DRM scenariosHeinz Hofbauer, Andreas Uhl. 161-170 [doi]
- BLINK: pixel-domain encryption for secure document managementIdris M. Atakli, Yu Chen, Qing Wu, Scott Craver. 171-176 [doi]