Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification ...... ......... ......... ........ ......... ......... N. L. Beebe, L. A. Maddox, L. Liu, and M. Sun Blind Verification of Digital Image Originality: A Statistical Approach http://dx.doi.org/10.1109/TIFS.2013.2276000 ...... ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ..... B. Mahdian, R. Nedbal, and S. Saic http://dx.doi.org/10.1109/TIFS.2013.2274728 1519 1531 Information Theoretic Security Unicasting on the Secrecy Graph http://dx.doi.org/10.1109/TIFS.2013.2274954 ...... ......... ........ ....... S. Vuppala and G. T. F. de Abreu Capacity Results and Super-Activation for Wiretap Channels With Active Wiretappers http://dx.doi.org/10.1109/TIFS.2013.2276049 ...... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... .... H. Boche and R. F. Schaefer 1482 Watermarking and Data Hiding On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding http://dx.doi.org/10.1109/TIFS.2013.2274041 . ... H. Cao and A. C. Kot 1508 www.signalprocessingsociety.org [30] NOVEMBER 2013 1469http://dx.doi.org/10.1109/TIFS.2013.2274728 http://dx.doi.org/10.1109/TIFS.2013.2276000 http://dx.doi.org/10.1109/TIFS.2013.2274954 http://dx.doi.org/10.1109/TIFS.2013.2276049 http://dx.doi.org/10.1109/TIFS.2013.2274041 http://www.signalprocessingsociety.org