Abstract is missing.
- Biometrics in electronic travel documentsAri Juels. 1-2 [doi]
- Estimating vignetting function from a single image for image authenticationSiwei Lyu. 3-12 [doi]
- Linear row and column predictors for the analysis of resized imagesMatthias Kirchner. 13-18 [doi]
- Color laser printer forensics with noise texture analysisJung-Ho Choi, Heung-Kyu Lee, Hae-Yeoun Lee, Young-Ho Suh. 19-24 [doi]
- Anti-forensics of contrast enhancement in digital imagesGang Cao, Yao Zhao, Rongrong Ni, Huawei Tian. 25-34 [doi]
- Towards event ordering in digital forensicsChris P. Levett, Arshad Jhumka, Sarabjot Singh Anand. 35-42 [doi]
- FLD-based detection of re-compressed speech signalsXiaoying Feng, Gwenaël J. Doërr. 43-48 [doi]
- Screenshot identification using combing artifact from interlaced videoJi Won Lee, Min-Jeong Lee, Tae-Woo Oh, Seung-Jin Ryu, Heung-Kyu Lee. 49-54 [doi]
- Negative databases for biometric dataJulien Bringer, Hervé Chabanne. 55-62 [doi]
- Identification and secret-key generation in biometric systems with protected templatesFrans M. J. Willems, Tanya Ignatenko. 63-66 [doi]
- Reverse-engineer methods on a biometric hash algorithm for dynamic handwritingKarl Kümmel, Claus Vielhauer. 67-72 [doi]
- Binary spectral minutiae representation with multi-sample fusion for fingerprint recognitionHaiyun Xu, Raymond N. J. Veldhuis. 73-80 [doi]
- Multi-factor biometrics for authentication: a false sense of securityHisham Al-Assam, Harin Sellahewa, Sabah Jassim. 81-88 [doi]
- The impact of ARTMAP to appearance-based face verificationAndrey Makrushin, Claus Vielhauer, Jana Dittmann. 89-94 [doi]
- Face recognition with DAISY descriptorsCarmelo Velardo, Jean-Luc Dugelay. 95-100 [doi]
- Palm vein biometrics based on infrared imaging and complex matched filteringModris Greitans, Mihails Pudzs, Rihards Fuksis. 101-106 [doi]
- Modelling watermark communication protocols using the CASPER modelling languageChristian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann. 107-116 [doi]
- Robust detection of audio watermarks after acoustic path transmissionMichael Arnold, Peter G. Baum, Xiao-Ming Chen. 117-126 [doi]
- Video watermarking using motion compensated 2D+t+2D filteringDeepayan Bhowmik, Charith Abhayaratne. 127-136 [doi]
- A highly adaptable capacity and invisibility 3D watermarking based on four-points setsXifeng Gao, Caiming Zhang, Yu Wei, Weitao Li. 137-146 [doi]
- Reversible watermarking via histogram shifting and least square optimizationMichele Muzzarelli, Marco Carli, Giulia Boato, Karen Egiazarian. 147-152 [doi]
- Towards robust and secure watermarkingFuchun Xie, Teddy Furon, Caroline Fontaine. 153-160 [doi]
- Reversible watermarking for image integrity verification in hierarchical PACSMarco Fontani, Alessia De Rosa, Roberto Caldelli, Francesco Filippini, Alessandro Piva, Matteo Consalvo, Vito Cappellini. 161-168 [doi]
- Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair searchMarcel Schäfer, Waldemar Berchtold, Sascha Zmudzinski, Martin Steinebach. 169-174 [doi]
- Watermark detection on quantized transform coefficients using product bernoulli distributionsPeter Meerwald, Andreas Uhl. 175-180 [doi]
- Fully featured secure biometric smart card device for fingerprint-based authentication and identificationLionel Beaugé, Andrzej Drygajlo. 181-186 [doi]
- Quantitative steganalysis of LSB embedding in JPEG domainJan Kodovský, Jessica J. Fridrich. 187-198 [doi]
- Steganography using Gibbs random fieldsTomás Filler, Jessica J. Fridrich. 199-212 [doi]
- The square root law does not require a linear keyAndrew D. Ker. 213-224 [doi]
- Simple algorithmic modifications for improving blind steganalysis performanceValentin Schwamberger, Matthias O. Franz. 225-230 [doi]
- Privacy-preserving fingercode authenticationMauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Scotti, Alessandro Piva. 231-240 [doi]
- eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometricsPierluigi Failla, Yagiz Sutcu, Mauro Barni. 241-246 [doi]
- Subjective and objective quality assessment of transparently encrypted JPEG2000 imagesThomas Stütz, Vinod Pankajakshan, Florent Autrusseau, Andreas Uhl, Heinz Hofbauer. 247-252 [doi]