| 2014 | A universal image forensic strategy based on steganalytic model. Xiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang |
| 2014 | ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '14, Salzburg, Austria, June 11-13, 2014 Andreas Unterweger, Andreas Uhl, Stefan Katzenbeisser, Roland Kwitt, Alessandro Piva |
| 2014 | Adaptive steganalysis against WOW embedding algorithm. Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang |
| 2014 | Application of Grubbs' test for outliers to the detection of watermarks. Matthieu Urvoy, Florent Autrusseau |
| 2014 | Architecture-driven smart grid security management. Markus Kammerstetter, Lucie Langer, Florian Skopik, Wolfgang Kastner |
| 2014 | Audio source authentication and splicing detection using acoustic environmental signature. Hong Zhao, Yifan Chen, Rui Wang, Hafiz Malik |
| 2014 | Automatic location of frame deletion point for digital video forensics. Chunhui Feng, Zhengquan Xu, Wenting Zhang, Yanyan Xu |
| 2014 | Biometrics based observer free transferable E-cash. Kamlesh Tiwari, Phalguni Gupta |
| 2014 | Capacities and capacity-achieving decoders for various fingerprinting games. Thijs Laarhoven |
| 2014 | Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters. Tong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint |
| 2014 | Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial features. Robert Fischer, Claus Vielhauer |
| 2014 | Distributional differential privacy for large-scale smart metering. Márk Jelasity, Kenneth P. Birman |
| 2014 | FastPass: automated border control as challenging combination of various security technologies. Markus Clabian |
| 2014 | From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection. Mario Hildebrandt, Jana Dittmann |
| 2014 | GSHADE: faster privacy-preserving distance computation and biometric identification. Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, Michael Zohner |
| 2014 | Gradient based prediction for reversible watermarking by difference expansion. Ioan-Catalin Dragoi, Dinu Coltuc, Ion Caciula |
| 2014 | Image security tools for JPEG standards. Peter Schelkens |
| 2014 | Influence of data granularity on nonintrusive appliance load monitoring. Günther Eibl, Dominik Engel |
| 2014 | Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT". Matthias Schneider, Thomas Schneider |
| 2014 | On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks. Erwin Quiring, Pascal Schöttle |
| 2014 | Predictable rain?: steganalysis of public-key steganography using wet paper codes. Matthias Carnein, Pascal Schöttle, Rainer Böhme |
| 2014 | Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study. Ramachandra Raghavendra, Christoph Busch |
| 2014 | Slice groups for post-compression region of interest encryption in SVC. Andreas Unterweger, Andreas Uhl |
| 2014 | Steganographic key leakage through payload metadata. Tomás Pevný, Andrew D. Ker |
| 2014 | Video steganalysis based on subtractive probability of optimal matching feature. Yanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu |
| 2014 | Video steganography with perturbed macroblock partition. Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu |
| 2014 | What's the PointiSA? Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson |