Steganography and Covert Communications Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value http://dx.doi.org/10.1109/TIFS.2014.2308633 ...... ......... ......... ........ ......... ......... ........ ......... K. Wang, H. Zhao, and H. Wang Effect of Image Downsampling on Steganographic Security http://dx.doi.org/10.1109/TIFS.2014.2309054 . ..... J. Kodovský and J. Fridrich Uniform Embedding for Efficient JPEG Steganography http://dx.doi.org/10.1109/TIFS.2014.2312817 ....... ..... L. Guo, J. Ni, and Y. Q. Shi 741 752 814 GMM With Feedback Improvement for the Task of Background Subtraction ...... ......... ....... .. ........ ......... ... R. H. Evangelio, M. Pätzold, I. Keller, and T. Sikora 863 Surveillance Adaptively Splitted http://dx.doi.org/10.1109/TIFS.2014.2313919 www.signalprocessingsociety.org [30] JULY 2014http://dx.doi.org/10.1109/TIFS.2014.2308633 http://dx.doi.org/10.1109/TIFS.2014.2309054 http://dx.doi.org/10.1109/TIFS.2014.2312817 http://dx.doi.org/10.1109/TIFS.2014.2313919 http://www.signalprocessingsociety.org