Abstract is missing.
- MesoNet: a Compact Facial Video Forgery Detection NetworkDarius Afchar, Vincent Nozick, Junichi Yamagishi, Isao Echizen. 1-7 [doi]
- A Randomized Kernel-Based Secret Image Sharing Scheme - Supplementary -Ravi Tej Akella, Raviteja Rekula, Vinod Pankajakshan. 1-2 [doi]
- One-factor Cancellable Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV) HashingMing Jie Lee, Zhe Jin, Andrew Beng Jin Teoh. 1-7 [doi]
- Performance Evaluation of Secure Communication Systems on Turing MachinesHolger Boche, Rafael F. Schaefer, H. Vincent Poor. 1-7 [doi]
- Countering the Pooled Triangle Test for PRNU-based camera identificationMauro Barni, Mariko Nakano-Miyatake, Hector Santoyo-Garcia, Benedetta Tondi. 1-8 [doi]
- The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap ChannelAhmed S. Mansour, Rafael F. Schaefer, Holger Boche. 1-7 [doi]
- Gender Effect on Face Recognition for a Large Longitudinal DatabaseCaroline Werther, Morgan Ferguson, Kevin Park, Troy Kling, Cuixian Chen, Yishi Wang. 1-7 [doi]
- Exposing Image Resizing utilizing Welch Power Spectral Density Analysis for Double Compressed JPEG ImagesSidhant Sahu, Manish Okade. 1-6 [doi]
- A Novel Approach For Data Packing: Using Trapdoor KnapsackMajid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk. 1-6 [doi]
- Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis CodesChristy Kin-Cleaves, Andrew D. Ker. 1-7 [doi]
- Exploitation of redundancy for pattern estimation of copy-sensitive two level QR codeIuliia Tkachenko, Christophe Destruel. 1-6 [doi]
- Age Estimation via Fusion of Depthwise Separable Convolutional Neural NetworksKuan-Hsien Liu, Hsin-Hua Liu, Pak Ki Chan, Tsung-Jung Liu, Soo-Chang Pei. 1-8 [doi]
- Reversible Contrast Mapping based Reversible Data Hiding in Encrypted ImagesYingqiang Qiu, Hangxing Wang, Zichi Wang, Zhenxing Qian, Gui Feng, Xinpeng Zhang. 1-7 [doi]
- Enhanced Geometric Reflection Models for Paper Surface Based AuthenticationRunze Liu, Chau-Wai Wong, Min Wu 0001. 1-7 [doi]
- A Multi-Task Learning CNN for Image SteganalysisXiangyu Yu, Huabin Tan, Hui Liang, Chang-Tsun Li, Guangjun Liao. 1-7 [doi]
- JPEG Implementation Forensics Based on Eigen-AlgorithmsNicolò Bonettini, Luca Bondi, Paolo Bestagini, Stefano Tubaro. 1-7 [doi]
- A Randomized Kernel-Based Secret Image Sharing SchemeRavi Tej Akella, Raviteja Rekula, Vinod Pankajakshan. 1-7 [doi]
- Are Deep Neural Networks good for blind image watermarking?Vedran Vukotic, Vivien Chappelier, Teddy Furon. 1-7 [doi]
- Community-based anomaly detectionMartin Kopp, Martin Grill, Jan Kohout. 1-6 [doi]
- Emotional Bots: Content-based Spammer Detection on Social MediaPanagiotis Andriotis, Atsuhiro Takasu. 1-8 [doi]
- Reversible Data Hiding in Encrypted Images with Two-MSB PredictionYi Puyang, Zhaoxia Yin, Zhenxing Qian. 1-7 [doi]
- Revealing the processing history of pitch-shifted voice using CNNsLihua Wang, Huixin Liang, Xiaodan Lin, Xiangui Kang. 1-7 [doi]
- Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systemsFuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen. 1-9 [doi]
- Finger-vein Recognition using Deep Fully Convolutional Neural Semantic Segmentation Networks: The Impact of Training DataEhsaneddin Jalilian, Andreas Uhl. 1-8 [doi]
- In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye BlinkingYuezun Li, Ming-Ching Chang, Siwei Lyu. 1-7 [doi]
- Error Analysis of Forensic ENF MatchingGuang Hua. 1-7 [doi]
- Latent Feature Disclosure under Perfect Sample PrivacyBorzoo Rassouli, Fernando Rosas, Deniz Gündüz. 1-7 [doi]
- EPE-based Huge-Capacity Reversible Data Hiding in Encrypted ImagesPauline Puteaux, William Puech. 1-7 [doi]
- Privacy-Preserving Distributed Deep Learning with Privacy TransformationsSen-Ching S. Cheung, Muhammad Usman Rafique, Wai-tian Tan. 1-7 [doi]
- Generalized Joint Sparse Representation for Multimodal Biometric Fusion of Heterogeneous FeaturesRudi Primorac, Roberto Togneri, Mohammed Bennamoun, Ferdous Sohel. 1-6 [doi]
- Database Binning and Retrieval in Multi-Fingerprint Identification SystemsPawel Drozdowski, D. Fischer, Christian Rathgeb, C. Schiel, Christoph Busch. 1-7 [doi]
- Protect Your Deep Neural Networks from PiracyMingliang Chen, Min Wu. 1-7 [doi]
- Fingerprint Presentation Attack Detection Using A Novel Multi-Spectral Capture Device and Patch-Based Convolutional Neural NetworksMohamed E. Hussein, Leonidas Spinoulas, Fei Xiong, Wael Abd-Almageed. 1-8 [doi]
- Camera Attribution Forensic Analyzer in the Encrypted DomainAlberto Pedrouzo-Ulloa, Miguel Masciopinto, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González. 1-7 [doi]
- An Inception-Based Data-Driven Ensemble Approach to Camera Model IdentificationAnselmo Ferreira, Han Chen, Bin Li, Jiwu Huang. 1-7 [doi]
- Adaptive Channel Estimation in Side Channel AttacksShan Jin, Riccardo Bettati. 1-7 [doi]