Abstract is missing.
- Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopyMario Hildebrandt, Stefan Kiltz, Ina Grossmann, Claus Vielhauer. 1-8 [doi]
- Seam carving estimation using forensic hashWenjun Lu, Min Wu 0001. 9-14 [doi]
- Exposing image forgery with blind noise estimationXunyu Pan, Xing Zhang, Siwei Lyu. 15-20 [doi]
- CFA pattern identification of digital cameras using intermediate value countingChang-Hee Choi, Jung-Ho Choi, Heung-Kyu Lee. 21-26 [doi]
- Latent fingerprint detection using a spectral texture featureTobias Kiertscher, Robert Fischer 0001, Claus Vielhauer. 27-32 [doi]
- Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcirclesMario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer. 33-40 [doi]
- Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensorRonny Merkel, Anja Bräutigam, Christian Kraetzer, Jana Dittmann, Claus Vielhauer. 41-50 [doi]
- Using global knowledge of users' typing traits to attack keystroke biometrics templatesAbdul Serwadda, Vir V. Phoha, Ankunda R. Kiremire. 51-60 [doi]
- Comparative study on fusion strategies for biometric handwritingTobias Scheidat, Claus Vielhauer, Robert Fischer 0001. 61-68 [doi]
- On dangers of overtraining steganography to incomplete cover modelJan Kodovsky, Jessica J. Fridrich, Vojtech Holub. 69-76 [doi]
- Steganalysis of DCT-embedding based adaptive steganography and YASSQingzhong Liu. 77-86 [doi]
- A square-root law for active wardensEnping Li, Scott Craver. 87-92 [doi]
- Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenarioChristian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann. 93-102 [doi]
- Processing encrypted floating point signalsMartin Franz, Stefan Katzenbeisser 0001. 103-108 [doi]
- Multi-biometrics based crypto-biometric session key generation and sharing protocolSanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi. 109-114 [doi]
- Contextualizing security for digital long-term preservationKun Qian 0001, Maik Schott, Christian Kraetzer, Matthias L. Hemmje. 115-120 [doi]
- Building multimedia security applications in the MPEG reconfigurable video coding (RVC) frameworkJunaid Jameel Ahmad, Shujun Li, Ihab Amer, Marco Mattavelli. 121-130 [doi]