| 2005 | A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. Junhui He, Jiwu Huang, Guoping Qiu |
| 2005 | A New Inter-frame Collusion Attack and a Countermeasure. P. Vinod, Prabin Kumar Bora |
| 2005 | A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang |
| 2005 | A Survey of Watermarking Security. Teddy Furon |
| 2005 | An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. Seunglim Yong, Sang-Ho Lee |
| 2005 | Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks. Wei Sun, En-Hui Yang |
| 2005 | Collusion Secure Convolutional Spread Spectrum Fingerprinting. Yan Zhu, Dengguo Feng, Wei Zou |
| 2005 | Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. Gwenaël J. Doërr, Jean-Luc Dugelay |
| 2005 | Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence. Marcos de Castro Pacitti, Weiler Alves Finamore |
| 2005 | Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings Mauro Barni, Ingemar J. Cox, Ton Kalker, Hyoung Joong Kim |
| 2005 | Effectiveness of ST-DM Watermarking Against Intra-video Collusion. Roberto Caldelli, Alessandro Piva, Mauro Barni, Andrea Carboni |
| 2005 | Evaluation of Feature Extraction Techniques for Robust Watermarking. Hae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh |
| 2005 | Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau |
| 2005 | Improved QIM Strategies for Gaussian Watermarking. Pierre Moulin, Ying Wang |
| 2005 | Information Transmission and Steganography. Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel |
| 2005 | Look Up Table(LUT) Method for Halftone Image Watermarking. In-Gook Chun |
| 2005 | Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng |
| 2005 | New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes. Félix Balado |
| 2005 | New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. Sergio Vicente Denser Pamboukian, Hae Yong Kim |
| 2005 | On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints. Mark T. Hogan, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre |
| 2005 | On the Existence of Perfect Stegosystems. Valery I. Korzhik, Guillermo Morales-Luna, Moon Ho Lee |
| 2005 | Oracle Attacks and Covert Channels. Ilaria Venturini |
| 2005 | Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach. Patrizio Campisi, Alessandro Neri |
| 2005 | Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques. Marcos de Castro Pacitti, Weiler Alves Finamore |
| 2005 | Performance Study on Multimedia Fingerprinting Employing Traceability Codes. Shan He, Min Wu |
| 2005 | Practical Data-Hiding: Additive Attacks Performance Analysis. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun |
| 2005 | Regular Simplex Fingerprints and Their Optimality Properties. Negar Kiyavash, Pierre Moulin |
| 2005 | Robust Detection of Transform Domain Additive Watermarks. Xingliang Huang, Bo Zhang |
| 2005 | Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. Amir Houman Sadr, Shahrokh Ghaemmaghami |
| 2005 | Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. Angela S. L. Wong, Matthew Sorell, Robert Clarke |
| 2005 | Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. Patrick Bas, Jarmo Hurri |
| 2005 | Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. Balaji Venkatachalam |
| 2005 | The Return of the Sensitivity Attack. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González |
| 2005 | Towards Multi-class Blind Steganalyzer for JPEG Images. Tomás Pevný, Jessica J. Fridrich |
| 2005 | Trellis-Coded Rational Dither Modulation for Digital Watermarking. Andrea Abrardo, Mauro Barni, Fernando Pérez-González, Carlos Mosquera |
| 2005 | ViWiD : Visible Watermarking Based Defense Against Phishing. Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru |
| 2005 | Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis. Min-Su Kim, Sébastien Valette, Ho-Youl Jung, Rémy Prost |