Abstract is missing.
- How are PDF files published in the Scientific Community?Supriya Adhatarao, Cédric Lauradoux. 1-6 [doi]
- Iteratively Generated Adversarial Perturbation for Audio Stego Post-processingKaiyu Ying, Rangding Wang, Diqun Yan. 1-6 [doi]
- Data Augmentation for JPEG SteganalysisTomer Itzhaki, Yassine Yousfi, Jessica J. Fridrich. 1-6 [doi]
- Differential Anomaly Detection for Facial ImagesMathias Ibsen, Lázaro J. González Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch 0001. 1-6 [doi]
- Structural Watermarking to Deep Neural Networks via Network Channel PruningXiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang. 1-6 [doi]
- Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detectorElyes Khermaza, Iuliia Tkachenko, Justin Picard. 1-6 [doi]
- Assessment of Synthetically Generated Mated Samples from Single Fingerprint Samples InstancesSimon Kirchgasser, Christof Kauba, Andreas Uhl. 1-6 [doi]
- Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular RegionToshiki Itagaki, Yuki Funabiki, Toru Akishita. 1-6 [doi]
- 3D Print-Scan Resilient Localized Mesh WatermarkingYanmei Chen, Zehua Ma, Hang Zhou 0007, Weiming Zhang. 1-6 [doi]
- Spoofing Speaker Verification With Voice Style Transfer And Reconstruction LossThomas Thebaud, Gaël Le Lan, Anthony Larcher. 1-7 [doi]
- Quality of Service Guarantees for Physical Unclonable FunctionsOnur Günlü, Rafael F. Schaefer, H. Vincent Poor. 1-6 [doi]
- Source Attribution of Online News Images by Compression AnalysisMichael Albright, Nitesh Menon, Kristy Roschke, Arslan Basharat. 1-6 [doi]
- Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence ProvidersJelle Vos, Zekeriya Erkin, Christian Doerr. 1-6 [doi]
- Differentially Private Generative Adversarial Networks with Model InversionDongjie Chen, Sen-ching Samson Cheung, Chen-Nee Chuah, Sally Ozonoff. 1-6 [doi]
- Self-embedding watermarking method for G-code used in 3D printingZhenyu Li 0004, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors. 1-6 [doi]
- Mobile authentication of copy detection patterns: how critical is to know fakes?Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy. 1-6 [doi]
- CNN Steganalyzers Leverage Local Embedding ArtifactsYassine Yousfi, Jan Butora, Jessica J. Fridrich. 1-6 [doi]
- Apart from In-field Sensor Defects, are there Additional Age Traces Hidden in a Digital Image?Robert Jöchl, Andreas Uhl. 1-6 [doi]
- Scalable Fact-checking with Human-in-the-LoopJing Yang, Didier Augusto Vega-Oliveros, Tais Seibt, Anderson Rocha. 1-6 [doi]
- Impact of Super-Resolution and Human Identification in Drone SurveillanceAkshay Agarwal 0001, Nalini K. Ratha, Mayank Vatsa, Richa Singh 0001. 1-6 [doi]
- Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy. 1-6 [doi]
- Secure Collaborative Editing Using Secret SharingShashank Arora, Pradeep K. Atrey. 1-6 [doi]
- On the Recognition Performance of BioHashing on state-of-the-art Face Recognition modelsHatef Otroshi-Shahreza, Vedrana Krivokuca Hahn, Sébastien Marcel. 1-6 [doi]
- Multi Loss Fusion For Matching Smartphone Captured Contactless Finger ImagesBhavin Jawade, Akshay Agarwal 0001, Srirangaraj Setlur, Nalini K. Ratha. 1-6 [doi]
- Time Scaling Detection and Estimation in Audio RecordingsMichele Pilia, Sara Mandelli, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting DetectionAnselmo Ferreira, Changsheng Chen, Mauro Barni. 1-6 [doi]
- Unsupervised JPEG Domain Adaptation for Practical Digital Image ForensicsRony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas. 1-6 [doi]