Editorial Note: Forensics of Multimedia Covert Communication Editorial Note 04 February 2019 Pages: 7893 - 7893
Adaptive and dynamic multi-grouping scheme for absolute moment block truncation coding Zhaoyang XiangYu-Chen HuChuan Qin OriginalPaper 01 May 2018 Pages: 7895 - 7909
Local complexity based adaptive embedding mechanism for reversible data hiding in digital images Fang CaoBowen AnZhenjun Tang OriginalPaper 29 April 2018 Pages: 7911 - 7926
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering Wengui SuXiang WangQingqi Pei OriginalPaper 14 August 2018 Pages: 7927 - 7945
Scaling factor estimation on JPEG compressed images by cyclostationarity analysis Xianjin LiuWei LuYuileong Yeung OriginalPaper 20 July 2018 Pages: 7947 - 7964
A novel coverless information hiding method based on the average pixel value of the sub-images Liming ZouJiande SunBrij Bhooshan Gupta OriginalPaper 24 July 2018 Pages: 7965 - 7980
A novel quantum image steganography algorithm based on exploiting modification direction Zhiguo QuZhenwen ChengXiaojun Wang OriginalPaper 09 August 2018 Pages: 7981 - 8001
3D PEE mapping based reversible data hiding for color images Meng XuJian Li OriginalPaper 06 August 2018 Pages: 8003 - 8016
A novel steganalysis method with deep learning for different texture complexity images Shangping ZhongCunmin JiaPeng Dai OriginalPaper 01 September 2018 Pages: 8017 - 8039
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection Li LiWeiming ZhangNenghai Yu OriginalPaper 27 August 2018 Pages: 8041 - 8055
Fractional quaternion cosine transform and its application in color image copy-move forgery detection Beijing ChenMing YuLeida Li OriginalPaper 06 September 2018 Pages: 8057 - 8073
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization Han FangHang ZhouNenghai Yu OriginalPaper 04 September 2018 Pages: 8075 - 8089
An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech Yanzhen RenDengkai LiuLina Wang OriginalPaper 06 September 2018 Pages: 8091 - 8111
A new watermarking scheme for colour image using QR decomposition and ternary coding Qingtang SuYonghui LiuHongye Ning OriginalPaper 07 September 2018 Pages: 8113 - 8132
Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation Liu FengDaofu GongHaoyu Lu OriginalPaper 30 October 2018 Pages: 8133 - 8149
A subspace learning-based method for JPEG mismatched steganalysis Yiming XueLiran YangPing Zhong OriginalPaper 08 October 2018 Pages: 8151 - 8166
Two-dimensional histogram modification based reversible data hiding using motion vector for H.264 Dong LiYingNan ZhangYuJuan Sun OriginalPaper 03 October 2018 Pages: 8167 - 8181
Detection of double JPEG compression using modified DenseNet model Ximei ZengGuorui FengXinpeng Zhang OriginalPaper 08 October 2018 Pages: 8183 - 8196
A case study of a two-stage image segmentation algorithm Xiaolong LiWei Li OriginalPaper 18 October 2018 Pages: 8197 - 8206
An efficient XOR-based verifiable visual cryptographic scheme Xingxing JiaDaoshun WangZhenhua Chen OriginalPaper 23 October 2018 Pages: 8207 - 8223
Smoothing identification for digital image forensics Feng DingYuxi ShiYun-Qing Shi OriginalPaper 06 November 2018 Pages: 8225 - 8245
Source camera identification via low dimensional PRNU features Yihua ZhaoNing ZhengMing Xu OriginalPaper 31 October 2018 Pages: 8247 - 8269
Digital steganography model and embedding optimization strategy Hai-Tao SongGuang-Ming TangMing-Ming Jiang OriginalPaper 06 November 2018 Pages: 8271 - 8288
Improved reversible visible image watermarking based on HVS and ROI-selection Wenfa QiGuangyuan YangZongming Guo OriginalPaper 31 October 2018 Pages: 8289 - 8310
Adaptive image camouflage using human visual system model Heng YaoXiaokai LiuYing Tian OriginalPaper 01 November 2018 Pages: 8311 - 8334
Correction to: Adaptive image camouflage using human visual system model Heng YaoXiaokai LiuYing Tian Correction 28 November 2018 Pages: 8335 - 8335
Your clicks reveal your secrets: a novel user-device linking method through network and visual data Naixuan GuoJunzhou LuoXinwen Fu OriginalPaper 30 October 2018 Pages: 8337 - 8362
Robust median filtering detection based on the difference of frequency residuals Wenjie LiRongrong NiYao Zhao OriginalPaper 13 November 2018 Pages: 8363 - 8381
Replay attack detection based on distortion by loudspeaker for voice authentication Yanzhen RenZhong FangChangwen Chen OriginalPaper 07 November 2018 Pages: 8383 - 8396
Ensemble classifier based source camera identification using fusion features Bo WangKun ZhongMing Li OriginalPaper 06 November 2018 Pages: 8397 - 8422
High capacity and multilevel information hiding algorithm based on pu partition modes for HEVC videos Yiyuan YangZhaohong LiZhenzhen Zhang OriginalPaper 26 November 2018 Pages: 8423 - 8446
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search Xiaokang LiuHui TianJing Lu OriginalPaper 19 November 2018 Pages: 8447 - 8461
Contourlet-DCT based multiple robust watermarkings for medical images Xiaoqi WuJingbing LiJixin Ma OriginalPaper 05 December 2018 Pages: 8463 - 8480
JPEG steganalysis with combined dense connected CNNs and SCA-GFR Jianhua YangXiangui KangYun-Qing Shi OriginalPaper 13 December 2018 Pages: 8481 - 8495
Violent scene detection algorithm based on kernel extreme learning machine and three-dimensional histograms of gradient orientation Jing YuWei SongJian-jun Hou OriginalPaper Open access 07 December 2018 Pages: 8497 - 8512
An improved entropy-based approach to steganalysis of compressed speech ChuanPeng GuoWei YangLiusheng Huang BriefCommunication 19 December 2018 Pages: 8513 - 8534
Robust H.264/AVC video watermarking without intra distortion drift Yue LiHong-Xia Wang BriefCommunication 15 December 2018 Pages: 8535 - 8557
Invisible steganography via generative adversarial networks Ru ZhangShiqi DongJianyi Liu BriefCommunication Open access 07 December 2018 Pages: 8559 - 8575
Detecting double JPEG compression and its related anti-forensic operations with CNN Bin LiHaoxin ZhangShunquan Tan BriefCommunication 11 January 2019 Pages: 8577 - 8601
Survey of robust and imperceptible watermarking Namita AgarwalAmit Kumar SinghPradeep Kumar Singh BriefCommunication 08 January 2019 Pages: 8603 - 8633
An end-to-end generative network for environmental sound-based covert communication Yuewei DaiWeiwei LiuJiangtao Zhai OriginalPaper 29 August 2018 Pages: 8635 - 8653
Designing adaptive JPEG steganography based on the statistical properties in spatial domain Ge LiuFangjun HuangZhonghua Li OriginalPaper 20 October 2018 Pages: 8655 - 8665
Editorial Note: Sparse Representation and Image Processing Editorial Note 04 February 2019 Pages: 8667 - 8667
Image segmentation method based on improved fuzzy Chan-Vese model He JianweiPei Jiali OriginalPaper 26 May 2018 Pages: 8669 - 8681
RETRACTED ARTICLE: Enhanced artificial bee Colony algorithm and its application in multi-threshold image feature retrieval Hong LiWeibin Li OriginalPaper 27 May 2018 Pages: 8683 - 8698
Wireless resource management mechanism with green communication for multimedia streaming Yong Jiang OriginalPaper 12 June 2018 Pages: 8699 - 8710
Collaborative recommendation algorithm based on probabilistic matrix factorization in probabilistic latent semantic analysis Li HuangWenan TanYong Sun OriginalPaper 28 June 2018 Pages: 8711 - 8722
Multimedia flow segmentation access mechanism with adaptive cooperative uplink and downlink Qing ZhangDilong Xu OriginalPaper 22 July 2018 Pages: 8723 - 8735
A novel rapid point-cloud surface reconstruction algorithm for laser imaging radar Wendong Wang OriginalPaper 04 July 2018 Pages: 8737 - 8749
A multi-scale target detection method for optical remote sensing images Yanqing FengLunwen WangMengbo Zhang OriginalPaper 06 July 2018 Pages: 8751 - 8766