Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers

  • Mauro Barni
  • Jordi Herrera-Joancomartí
  • Stefan Katzenbeisser
  • Fernando Pérez-González
Conference proceedings IH 2005

DOI: 10.1007/11558859

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3727)

Table of contents (29 papers)

  1. Front Matter
  2. Invited Talk

  3. Anonymity

    1. Compulsion Resistant Anonymous Communications
      George Danezis, Jolyon Clulow
      Pages 11-25
    2. Provable Anonymity for Networks of Mixes
      Marek Klonowski, Mirosław Kutyłowski
      Pages 26-38
    3. On Blending Attacks for Mixes with Memory
      Luke O’Connor
      Pages 39-52
    4. Pervasive Random Beacon in the Internet for Covert Coordination
      Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan
      Pages 53-61
    5. Censorship Resistance Revisited
      Ginger Perng, Michael K. Reiter, Chenxi Wang
      Pages 62-76
  4. Watermarking

  5. Theory

    1. Efficient Steganography with Provable Security Guarantees
      Aggelos Kiayias, Yona Raekow, Alexander Russell
      Pages 118-130
    2. Information-Theoretic Analysis of Security in Side-Informed Data Hiding
      Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González
      Pages 131-145
    3. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
      Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
      Pages 146-160
  6. Watermark Attacks

    1. How to Combat Block Replacement Attacks?
      Gwenaël Doërr, Jean-Luc Dugelay
      Pages 161-175
  7. Steganography

    1. Pre-processing for Adding Noise Steganography
      Elke Franz, Antje Schneidewind
      Pages 189-203
    2. Efficient Wet Paper Codes
      Jessica Fridrich, Miroslav Goljan, David Soukal
      Pages 204-218
  8. Hiding in Unusual Content

    1. Translation-Based Steganography
      Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail Atallah
      Pages 219-233
    2. ID Modulation: Embedding Sensor Data in an RFID Timeseries
      Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander Mamishev
      Pages 234-246
    3. Embedding Covert Channels into TCP/IP
      Steven J. Murdoch, Stephen Lewis
      Pages 247-261

About these proceedings


Information Internet Performance Radio-Frequency Identification (RFID) TCP/IP anonymity communication digital fingerprinting digital watermarking encryption privacy security software watermarking steganalysis steganography

Editors and affiliations

  • Mauro Barni
    • 1
  • Jordi Herrera-Joancomartí
    • 2
  • Stefan Katzenbeisser
    • 3
  • Fernando Pérez-González
    • 4
  1. 1.Dipartimento di Ingegneria dell’InformazioneUniversità degli Studi di SienaItaly
  2. 2.Universitat Oberta de CatalunyaBarcelonaSpain
  3. 3.Philips Research Europe, Information and System SecurityEindhovenThe Netherlands
  4. 4.Departamento de Teoría de la Señal y Comunicaciones ETSI Telecom.Universidad de VigoVigo 

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-29039-1
  • Online ISBN 978-3-540-31481-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349