Security of Large Networked Systems On the Security of Trustee-Based Social Authentications http://dx.doi.org/10.1109/TIFS.2014.2330311 ..... ........ N. Z. Gong and D. Wang Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior http://dx.doi.org/10.1109/TIFS.2014.2332820 .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... . M. Tsikerdekis and S. Zeadally 1251 1311 Steganography and Covert Communications Investigation on Cost Assignment in Spatial Image Steganography http://dx.doi.org/10.1109/TIFS.2014.2326954 ... ........ ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ... B. Li, S. Tan, M. Wang, and J. Huang 1264 EDICS-Editor's Information Classification Scheme http://dx.doi.org/10.1109/TIFS.2014.2338732 .. ......... ......... ........ ......... ......... . Information for Authors http://dx.doi.org/10.1109/TIFS.2014.2338731 ....... ......... ......... ........ ...... ... ......... ........ ......... ......... . 1333 1334 ANNOUNCEMENTS Call for Papers-IEEE Journal of Selected Topics in Signal Processing http://dx.doi.org/10.1109/TIFS.2014.2338771 ....... ......... ......... . www.signalprocessingsociety.org [15] SEPTEMBER 2014 1336http://dx.doi.org/10.1109/TIFS.2014.2330311 http://dx.doi.org/10.1109/TIFS.2014.2332820 http://dx.doi.org/10.1109/TIFS.2014.2326954 http://dx.doi.org/10.1109/TIFS.2014.2338732 http://dx.doi.org/10.1109/TIFS.2014.2338731 http://dx.doi.org/10.1109/TIFS.2014.2338771 http://www.signalprocessingsociety.org