A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder http://dx.doi.org/10.1109/TIFS.2013.2246515 .... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... X.-B. Liu, S. N. Koh, C.-C. Chui, and X.-W. Wu Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption http://dx.doi.org/10.1109/TIFS.2013.2248725 ........ .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... .... K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing http://dx.doi.org/10.1109/TIFS.2013.2247758 ... ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... ......... T. Halevi and N. Saxena JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques http://dx.doi.org/10.1109/TIFS.2013.2247399 .... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... ........ G. Gül and F. Kurugollu www.signalprocessingsociety.org [20] MAY 2013 542 553 563 578http://dx.doi.org/10.1109/TIFS.2013.2246515 http://dx.doi.org/10.1109/TIFS.2013.2248725 http://dx.doi.org/10.1109/TIFS.2013.2247758 http://dx.doi.org/10.1109/TIFS.2013.2247399 http://www.signalprocessingsociety.org