Information Hiding

10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
Buch | Softcover
XI, 373 Seiten
2008 | 2008
Springer Berlin (Verlag)
978-3-540-88960-1 (ISBN)

Lese- und Medienproben

Information Hiding -
80,24 inkl. MwSt
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.

Anonymity and Privacy.- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes.- Hiding a Needle in a Haystack Using Negative Databases.- Information Leakage in Optimal Anonymized and Diversified Data.- Steganography I.- Perturbation Hiding and the Batch Steganography Problem.- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.- Forensics.- Detecting Re-projected Video.- Residual Information of Redacted Images Hidden in the Compression Artifacts.- Novel Technologies/Applications.- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.- Reversible Watermarking with Subliminal Channel.- Watermarking I.- Watermarking Security Incorporating Natural Scene Statistics.- Block-Chain Based Fragile Watermarking Scheme with Superior Localization.- Steganalysis.- Generic Adoption of Spatial Steganalysis to Transformed Domain.- Weighted Stego-Image Steganalysis for JPEG Covers.- Practical Insecurity for Effective Steganalysis.- Other hiding Domains I.- Authorship Proof for Textual Document.- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.- Steganography II.- A Data Mapping Method for Steganography and Its Application to Images.- Benchmarking for Steganography.- Other Hiding Domains II and Network Security.- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face.- A Supraliminal Channel in a Videoconferencing Application.- C-Mix: A Lightweight Anonymous Routing Approach.- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.

Erscheint lt. Verlag 23.10.2008
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XI, 373 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 593 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte anonymity • authentication • cryptography • data hiding • digital fingerprinting • digital forensics • Digital rights management • digital signature • digital watermarking • distortion optimization • Encryption • Fingerprinting • first-order statistics • fragile watermarking • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Hiding • privacy • privacy-preserving • secrecy • security • Security models • semantic content • side channel attacks • software watermarking • source code watermarking • steganalysis • Steganography • subliminal communication • traffic analysis • watermark attacks • Watermarking
ISBN-10 3-540-88960-4 / 3540889604
ISBN-13 978-3-540-88960-1 / 9783540889601
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich