| 2015 | 3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure. Jong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee |
| 2015 | A Negative Number Vulnerability for Histogram-based Face Recognition Systems. Alireza Farrokh Baroughi, Scott Craver, Mohammed Faizan Mohsin |
| 2015 | Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression Topography. Robert Fischer, Claus Vielhauer |
| 2015 | Effect of Imprecise Knowledge of the Selection Channel on Steganalysis. Vahid Sedighi, Jessica J. Fridrich |
| 2015 | End-to-Display Encryption: A Pixel-Domain Encryption with Security Benefit. Sebastian Matthias Burg, Dustin Peterson, Oliver Bringmann |
| 2015 | Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation. Bei-Bei Liu, Xingjie Wei, Jeff Yan |
| 2015 | Flicker Forensics for Pirate Device Identification. Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr |
| 2015 | ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties. Christian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer |
| 2015 | Implications of Cyber Warfare. David Aucsmith |
| 2015 | Improving Steganographic Security by Synchronizing the Selection Channel. Tomás Denemark, Jessica J. Fridrich |
| 2015 | IoT Privacy: Can We Regain Control? Richard Chow |
| 2015 | LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP. Yao Shen, Liusheng Huang, Fei Wang, Xiaorong Lu, Wei Yang, Lu Li |
| 2015 | On Characterizing and Measuring Out-of-Band Covert Channels. Brent C. Carrara, Carlisle M. Adams |
| 2015 | On Elliptic Curve Based Untraceable RFID Authentication Protocols. Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo |
| 2015 | Optimal Sequential Fingerprinting: Wald vs. Tardos. Thijs Laarhoven |
| 2015 | Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015 Adnan M. Alattar, Jessica J. Fridrich, Ned M. Smith, Pedro Comesaña Alfaro |
| 2015 | SATTVA: SpArsiTy inspired classificaTion of malware VAriants. Lakshmanan Nataraj, S. Karthikeyan, B. S. Manjunath |
| 2015 | Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang |
| 2015 | Thumbnail-Preserving Encryption for JPEG. Charles V. Wright, Wu-chi Feng, Feng Liu |
| 2015 | Touch-based Static Authentication Using a Virtual Grid. William F. Bond, Ahmed Awad E. A. |
| 2015 | Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models. Marcel Schäfer, Sebastian Mair, Waldemar Berchtold, Martin Steinebach |
| 2015 | Video Steganography Based on Optimized Motion Estimation Perturbation. Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu |
| 2015 | Visual Honey Encryption: Application to Steganography. Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee |