Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The NoiseContent Trade-off High-Fidelity Face Manipulation With Extreme Poses and Expressions Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication VD-GAN: A Unified Framework for Joint Prototype and Representation Learning From Contaminated Single Sample per Person Direct Anonymous Attestation With Optimal TPM Signing Efficiency Optimal Adversarial Policies in the Multiplicative Learning System With a MaliciousExpert EDICS Information for Authors www.signalprocessingsociety.org [12] MARCH 2021 2202-2217 2218-2231 2232-2245 2246-2259 2260-2275 2276-2287https://dx.doi.org/10.1109/TIFS.2021.3050063 https://dx.doi.org/10.1109/TIFS.2021.3050063 https://dx.doi.org/10.1109/TIFS.2021.3050065 https://dx.doi.org/10.1109/TIFS.2021.3050070 https://dx.doi.org/10.1109/TIFS.2021.3050070 https://dx.doi.org/10.1109/TIFS.2021.3050055 https://dx.doi.org/10.1109/TIFS.2021.3050055 https://dx.doi.org/10.1109/TIFS.2021.3051801 https://dx.doi.org/10.1109/TIFS.2021.3052360 https://dx.doi.org/10.1109/TIFS.2021.3052360 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org