| 2013 | A simple tracing algorithm for binary fingerprinting code under averaging attack. Minoru Kuribayashi |
| 2013 | ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '13, Montpellier, France, June 17-19, 2013 William Puech, Marc Chaumont, Jana Dittmann, Patrizio Campisi |
| 2013 | An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking. Serdar Pehlivanoglu |
| 2013 | Bayesian inference to evaluate information leakage in complex scenarios. Carmela Troncoso |
| 2013 | Context embedding for raster-scan rhombus based reversible watermarking. Dinu Coltuc, Ioan-Catalin Dragoi |
| 2013 | Detection and classification of double compressed MP3 audio tracks. Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo, Alessandro Piva |
| 2013 | Digital image steganography using universal distortion. Vojtech Holub, Jessica J. Fridrich |
| 2013 | Discrete distributions in the tardos scheme, revisited. Thijs Laarhoven, Benne de Weger |
| 2013 | Distortion function designing for JPEG steganography with uncompressed side-image. Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi |
| 2013 | Document authentication using graphical codes: impacts of the channel model. Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas |
| 2013 | Embedding change rate estimation based on ensemble learning. Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu |
| 2013 | Exposing digital audio forgeries in time domain by using singularity analysis with wavelets. Jiaorong Chen, Shijun Xiang, Weiping Liu, Hongbin Huang |
| 2013 | First investigation of latent fingerprints long-term aging using chromatic white light sensors. Ronny Merkel, Karen Otte, Robert Clausing, Jana Dittmann, Claus Vielhauer, Anja Bräutigam |
| 2013 | Forensic identification of GSM mobile phones. Jakob Hasse, Thomas Gloe, Martin Beck |
| 2013 | JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics. Wei Fan, Kai Wang, François Cayre, Zhang Xiong |
| 2013 | Joint watermarking and progressive geometric compression of 3D meshes. Ines Bouzidi, Azza Ouled Zaid, Meha Hachani, William Puech |
| 2013 | Leakage detection and tracing for databases. Waldemar Berchtold, Marcel Schäfer, Martin Steinebach |
| 2013 | Moving steganography and steganalysis from the laboratory into the real world. Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný |
| 2013 | Natural language watermarking for german texts. Oren Halvani, Martin Steinebach, Patrick Wolf, Ralf Zimmermann |
| 2013 | Non-invertible and revocable iris templates using key-dependent wavelet transforms. Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl |
| 2013 | On optimal detection for matrix multiplicative data hiding. Babak Moussakhani, Mohammad Ali Sedaghat, John T. Flåm, Tor A. Ramstad |
| 2013 | On the intertwining of information hiding and multimedia security: a personal perspective. Anthony T. S. Ho |
| 2013 | Optimal suspicion functions for tardos traitor tracing schemes. Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen |
| 2013 | Optimizing acoustic features for source cell-phone recognition using speech signals. Cemal Hanilçi, Figen Ertas |
| 2013 | Privacy and security challenges in the smart grid user domain. Dominik Engel |
| 2013 | Region of interest signalling for encrypted JPEG images. Dominik Engel, Andreas Uhl, Andreas Unterweger |
| 2013 | SIFT keypoint removal and injection for countering matching-based image forensics. Irene Amerini, Mauro Barni, Roberto Caldelli, Andrea Costanzo |
| 2013 | Secure and efficient approximate nearest neighbors search. Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer |
| 2013 | Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching. Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl |
| 2013 | Watermarking road maps against crop and merge attacks. Kai Jiang, Kenny Q. Zhu, Yan Huang, Xiaobin Ma |
| 2013 | XOR-based meaningful visual secret sharing by generalized random grids. Xiaotian Wu, Duanhao Ou, Lu Dai, Wei Sun |