default search action
7. Information Hiding 2005: Barcelona, Spain
- Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González:
Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3727, Springer 2005, ISBN 3-540-29039-7
Invited Talk
- Neri Merhav:
On Joint Coding for Watermarking and Encryption. 1-10
Anonymity
- George Danezis, Jolyon Clulow:
Compulsion Resistant Anonymous Communications. 11-25 - Marek Klonowski, Miroslaw Kutylowski:
Provable Anonymity for Networks of Mixes. 26-38 - Luke O'Connor:
On Blending Attacks for Mixes with Memory. 39-52 - Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan:
Pervasive Random Beacon in the Internet for Covert Coordination. 53-61 - Ginger Perng, Michael K. Reiter, Chenxi Wang:
Censorship Resistance Revisited. 62-76
Watermarking
- Stéphane Bounkong, Borémi Toch, David Saad:
Optimal Embedding for Watermarking in Discrete Data Spaces. 77-90 - Vincent Martin, Marie Chabert, Bernard Lacaze:
A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images. 91-105 - Patrick Bas:
A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers. 106-117
Theory
- Aggelos Kiayias, Yona Raekow, Alexander Russell:
Efficient Steganography with Provable Security Guarantees. 118-130 - Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González:
Information-Theoretic Analysis of Security in Side-Informed Data Hiding. 131-145 - Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. 146-160
Watermark Attacks
- Gwenaël J. Doërr, Jean-Luc Dugelay:
How to Combat Block Replacement Attacks?. 161-175 - Maciej Liskiewicz, Ulrich Wölfel:
On the Intractability of Inverting Geometric Distortions in Watermarking Schemes. 176-188
Steganography
- Elke Franz, Antje Schneidewind:
Pre-processing for Adding Noise Steganography. 189-203 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Efficient Wet Paper Codes. 204-218
Hiding in Unusual Content
- Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah:
Translation-Based Steganography. 219-233 - Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander V. Mamishev:
ID Modulation: Embedding Sensor Data in an RFID Timeseries. 234-246 - Steven J. Murdoch, Stephen Lewis:
Embedding Covert Channels into TCP/IP. 247-261
Steganalysis
- Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen:
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. 262-277 - Rainer Böhme:
Assessment of Steganalytic Methods Using Multiple Regression Models. 278-295 - Andrew D. Ker:
A General Framework for Structural Steganalysis of LSB Replacement. 296-311 - Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. 312-326 - Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner:
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. 327-341
Software Watermarking
- Ginger Myles, Hongxia Jin:
Self-validating Branch-Based Software Watermarking. 342-356 - Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan Kailas:
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance. 357-371 - Alan J. Larkin, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre:
Dither Modulation Watermarking of Dynamic Memory Traces. 372-386
Fingerprinting
- Kozo Banno, Shingo Orihara, Takaaki Mizuki, Takao Nishizeki:
Best Security Index for Digital Fingerprinting. 398-412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.