Tardos's Fingerprinting Code over AWGN Channel
M. Kuribayashi
Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability
A. Sarkar, K. Solanki and B. S. Manjunath
Security Analysis of ISS Watermarking Using Natural Scene Statistics
D. Zhang, J. Ni, Q. Zeng, D. Lee and J. Huang
STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography
P. Meng, L. Hang, Z. Chen, Y. Hu and W. Yang
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic
Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz and S. Katzenbeisser
A Secure and Robust Approach to Software Tamper Resistance
S. Ghosh, J. D. Hiser and J. W. Davidson
Detection of Copy-Rotate-Move Forgery using Zernike Moments
S. Ryu, M. Lee and H. Lee
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-off Between Security and Robustness
J. Cao , J. Huang and J. Ni
The Square Root Law in Stegosystems with Imperfect Information
A. D. Ker
Short Collusion-Secure Fingerprint Codes against Three Pirates
K. Nuida
Provably Secure Spread-spectrum Watermarking Schemes in the Known Message Attack Framework
J. Cao and J. Huang
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography
T. Pevny, T. Filler and P. Bas
A Unified Submodular Framework for Multimodal IC Trojan Detection
F. Koushanfar, A. Mirhoseini and Y. Alkabani
Scene Illumination as an Indicator of Image Manipulation
C. Reiss and E. Angelopoulou
Steganalysis using Partially Ordered Markov Models
J. Davidson and J. Jalan
The Influence of the Image Basis on Modeling and Steganalysis Performance
V. Schwamberger, P. H. D. Le, B. Schölkopf and M. O. Franz
FPGA Time-bounded Unclonable Authentication
M. Majzoobi, A. Elnably and F. Koushanfar
The Reverse Statistical Disclosure Attack
N. Mallesh and M. Wright