default search action
9. Information Hiding 2007: Saint Malo, France
- Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6
New Steganographic Schemes
- Giacomo Cancelli, Mauro Barni:
MPSteg-color: A New Steganographic Technique for Color Images. 1-15 - Kaushal Solanki, Anindya Sarkar, B. S. Manjunath:
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. 16-31 - Keye Martin:
Steganographic Communication with Quantum Information. 32-49
Watermarking Schemess
- Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt:
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. 50-64 - Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang:
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. 65-79
Computer Security
- Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection. 80-95 - Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. 96-111 - Adam L. Young, Moti Yung:
Space-Efficient Kleptography Without Random Oracles. 112-129
Steganography and Code Theory
- Caroline Fontaine, Fabien Galand:
How Can Reed-Solomon Codes Improve Steganographic Schemes? 130-144 - Dagmar Schönfeld, Antje Winkler:
Reducing the Complexity of Syndrome Coding for Embedding. 145-158
Watermarking Security
- Luis Pérez-Freire, Fernando Pérez-González:
Exploiting Security Holes in Lattice Data Hiding. 159-173 - Patrick Bas, Gwenaël J. Doërr:
Practical Security Analysis of Dirty Paper Trellis Watermarking. 174-188 - Daniel Dönigus, Stefan Endler, Marc Fischlin, Andreas Hülsing, Patrick Jäger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann:
Security of Invertible Media Authentication Schemes Revisited. 189-203
Steganalysis
- Andrew D. Ker:
A Fusion of Maximum Likelihood and Structural Steganalysis. 204-219 - Carmela Troncoso, Claudia Díaz, Orr Dunkelman, Bart Preneel:
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. 220-236
Watermarking and Re-synchronization
- Mathias Schlauweg, Dima Pröfrock, Erika Müller:
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction. 237-251 - Konrad Hofbauer, Horst Hering:
Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio. 252-266 - Peizhong Lu, Dan Wang:
A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. 267-278
Fingerprinting
- Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. 279-293 - Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. 294-310
Forensics
- Micah K. Johnson, Hany Farid:
Exposing Digital Forgeries Through Specular Highlights on the Eye. 311-325 - Matthias Kirchner, Rainer Böhme:
Tamper Hiding: Defeating Image Forensics. 326-341 - Mo Chen, Jessica J. Fridrich, Jan Lukás, Miroslav Goljan:
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. 342-358
Steganalysis
- Christian Krätzer, Jana Dittmann:
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. 359-377 - Kwangsoo Lee, Andreas Westfeld, Sangjin Lee:
Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. 378-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.