Abstract is missing.
- Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital CinemaRony Darazi, Pilar Callau Uson, Benoît Macq. 1-5 [doi]
- A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detectionAntonis Mairgiotis, Nikolaos Galatsanos. 6-10 [doi]
- QIM-DM watermarking optimization based on inter-frequency contrast masking in the DCT domainFederica Battisti, Marco Carli, Alessandro Neri. 11-15 [doi]
- A system for forensic analysis of large image setsSteven J. Simske, Margaret Sturgill, Paul Everest, George Guillory. 16-20 [doi]
- On resampling detection in re-compressed imagesMatthias Kirchner, Thomas Gloe. 21-25 [doi]
- Forensic characterization of RF devicesAravind K. Mikkilineni, Deen King-Smith, Saul B. Gelfand, Edward J. Delp. 26-30 [doi]
- Retention of micro-fragments in cluster slack - A first modelJohan Garcia, Thijs Holleboom. 31-35 [doi]
- A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizesJosé Moreira, Marcel Fernandez, Miguel Soriano. 36-40 [doi]
- Tardos fingerprinting codes in the combined digit modelBoris Skoric, Stefan Katzenbeisser 0001, Hans Georg Schaathun, Mehmet Utku Celik. 41-45 [doi]
- Blind decoder for binary probabilistic traitor tracing codesLuis Pérez-Freire, Teddy Furon. 46-50 [doi]
- Capacity-achieving fingerprint decodingYen-Wei Huang, Pierre Moulin. 51-55 [doi]
- Worst case attacks against binary probabilistic traitor tracing codesTeddy Furon, Luis Pérez-Freire. 56-60 [doi]
- Heart sounds quality analysis for automatic cardiac biometry applicationsFrancesco Beritelli, Andrea Spadaccini. 61-65 [doi]
- Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio testTakao Murakami, Kenta Takahashi. 66-70 [doi]
- Leveraging reliable bits: ECC design considerations for practical secure biometric systemsYige Wang, Shantanu Rane, Anthony Vetro. 71-75 [doi]
- Fast identification algorithms for forensic applicationsFokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak. 76-80 [doi]
- On the security of non-invertible fingerprint template transformsAbhishek Nagar, Anil K. Jain. 81-85 [doi]
- Privacy enhancement of common randomness based authentication: Key rate maximized caseSviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof. 86-90 [doi]
- Efficient privacy-preserving classification of ECG signalsMauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Vladimir Kolesnikov. 91-95 [doi]
- Privacy-preserving user clustering in a social networkZekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk. 96-100 [doi]
- Extracting social networks from seized smartphones and web dataFabio Dellutri, Luigi Laura, Vittorio Ottaviani, Giuseppe F. Italiano. 101-105 [doi]
- Efficient implementation of anonymous credentials on Java Card smart cardsMichaël Sterckx, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede. 106-110 [doi]
- Modeling content fingerprints using markov random fieldsAvinash L. Varna, Min Wu 0001. 111-115 [doi]
- Modeling and analysis of ordinal ranking in content fingerprintingWei-Hong Chuang, Avinash L. Varna, Min Wu 0001. 116-120 [doi]
- Towards automated image hashing based on the Fast Johnson-Lindenstrauss Transform (FJLT)Mehrdad Fatourechi, Xudong Lv, Z. Jane Wang, Rabab K. Ward. 121-125 [doi]
- Security of robust audio hashesStefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski. 126-130 [doi]
- Wet ZZW construction for steganographyTomás Filler, Jessica J. Fridrich. 131-135 [doi]
- Using forms for information hiding and coding in electrophotographic documentsMaria V. Ortiz Segovia, George T.-C. Chiu, Jan P. Allebach. 136-140 [doi]
- Secure semi-fragilewatermarking for image authenticationChuhong Fei, Raymond H. Kwong, Deepa Kundur. 141-145 [doi]
- An extended analysis of discrete fourier tranform - rational dither modulation for non-white hostsMichele Scagliola, Fernando Pérez-González, Pietro Guccione. 146-150 [doi]
- Printer-scanner identification via analysis of structured security deterrentsMatthew Gaubatz, Steven J. Simske. 151-155 [doi]
- Camera response function signature for digital forensics - Part I: Theory and data selectionTian-Tsong Ng, Mao-Pei Tsui. 156-160 [doi]
- Camera response function signature for digital forensics - Part II: Signature extractionTian-Tsong Ng. 161-165 [doi]
- Source scanner identification for scanned documentsNitin Khanna, Edward J. Delp. 166-170 [doi]
- Source cell phone camera identification based on singular value decompositionGökhan Gül, Ismail Avcibas. 171-175 [doi]
- Processing in the encrypted domain using a composite signal representation: Pros and consTiziano Bianchi, Thijs Veugen, Alessandro Piva, Mauro Barni. 176-180 [doi]
- BitStalker: Accurately and efficiently monitoring bittorrent trafficKevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker. 181-185 [doi]
- RFID key establishment against active adversariesJulien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji. 186-190 [doi]
- Practical DPA attacks on MDPLElke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede. 191-195 [doi]