| 2017 | A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram. Masaaki Fujiyoshi, Hitoshi Kiya |
| 2017 | A Hybrid Feature Model for Seam Carving Detection. Jingyu Ye, Yun-Qing Shi |
| 2017 | A Novel Image Classification Method with CNN-XGBoost Model. Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li |
| 2017 | A Novel Visual Cryptography Scheme with Different Importance of Shadows. Peng Li, Zuquan Liu |
| 2017 | A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou |
| 2017 | A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages. Iman Sedeeq, Frans Coenen, Alexei Lisitsa |
| 2017 | A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. Yanzhen Ren, Qiaochu Xiong, Lina Wang |
| 2017 | Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding. Weiqi Luo, Yue Zhang, Haodong Li |
| 2017 | Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou |
| 2017 | Block-Based Convolutional Neural Network for Image Forgery Detection. Jianghong Zhou, Jiangqun Ni, Yuan Rao |
| 2017 | CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing. Lukasz Wandzik, Raul Vicente-Garcia, Gerald Kaeding, Xi Chen |
| 2017 | Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model. Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu |
| 2017 | Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification. Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla |
| 2017 | Detection of Face Morphing Attacks by Deep Learning. Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert |
| 2017 | Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim |
| 2017 | Face Morphing Detection: An Approach Based on Image Degradation Analysis. Tom Neubert |
| 2017 | HEVC Double Compression Detection Based on SN-PUPM Feature. Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong |
| 2017 | Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement. Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi |
| 2017 | Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. Bingwen Feng, Jian Weng, Wei Lu |
| 2017 | Improved Reversible Visible Watermarking Based on Adaptive Block Partition. Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo |
| 2017 | Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems. Akira Nishimura |
| 2017 | Information Hiding Using CAVLC: Misconceptions and a Detection Strategy. Weike You, Yun Cao, Xianfeng Zhao |
| 2017 | On the Statistical Properties of Syndrome Trellis Coding. Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme |
| 2017 | Recaptured Image Forensics Based on Quality Aware and Histogram Feature. Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao |
| 2017 | Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants. Chenchen Cui, Rongrong Ni, Yao Zhao |
| 2017 | Steganalysis Based on Awareness of Selection-Channel and Deep Learning. Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi |
| 2017 | Temporal Integration Based Visual Cryptography Scheme and Its Application. Wen Wang, Feng Liu, Teng Guo, YaWei Ren |
| 2017 | Topological Data Analysis for Image Tampering Detection. Aras Asaad, Sabah Jassim |
| 2017 | Towards Automated Forensic Pen Ink Verification by Spectral Analysis. Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer |
| 2017 | Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks. Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer |
| 2017 | Website Fingerprinting Attack on Psiphon and Its Forensic Analysis. Tekachew Gobena Ejeta, Hyoung Joong Kim |