A New Method for EEG-Based Concealed Information Test http://dx.doi.org/10.1109/TIFS.2013.2244884 . ......... ........ ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ....... D. Wang, D. Miao, and G. Blohm 520 Information Theoretic Security Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing http://dx.doi.org/10.1109/TIFS.2013.2247758 ... ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... ......... T. Halevi and N. Saxena 563 Security of Large Networked Systems Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems http://dx.doi.org/10.1109/TIFS.2012.2237395 ... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ...... K. Bu, X. Liu, J. Luo, B. Xiao, and G. Wei 429 Steganography and Covert Communications An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection http://dx.doi.org/10.1109/TIFS.2013.2238232 .... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... .... R. Cogranne and F. Retraint A Timing Channel Spyware for the CSMA/CA Protocol http://dx.doi.org/10.1109/TIFS.2013.2238930 ..... ......... ........ ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ . N. Kiyavash, F. Koushanfar, T. P. Coleman, and M. Rodrigues Watermarking and Data Hiding JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques http://dx.doi.org/10.1109/TIFS.2013.2247399 .... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... ........ G. Gül and F. Kurugollu www.signalprocessingsociety.org [22] MAY 2013 464 477 578http://dx.doi.org/10.1109/TIFS.2013.2244884 http://dx.doi.org/10.1109/TIFS.2013.2247758 http://dx.doi.org/10.1109/TIFS.2012.2237395 http://dx.doi.org/10.1109/TIFS.2013.2238232 http://dx.doi.org/10.1109/TIFS.2013.2238930 http://dx.doi.org/10.1109/TIFS.2013.2247399 http://www.signalprocessingsociety.org