Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers

ISBN: 978-3-540-29039-1 (Print) 978-3-540-31481-3 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talk

    1. No Access

      Book Chapter

      Pages 1-10

      On Joint Coding for Watermarking and Encryption

  3. Anonymity

    1. No Access

      Book Chapter

      Pages 11-25

      Compulsion Resistant Anonymous Communications

    2. No Access

      Book Chapter

      Pages 26-38

      Provable Anonymity for Networks of Mixes

    3. No Access

      Book Chapter

      Pages 39-52

      On Blending Attacks for Mixes with Memory

    4. No Access

      Book Chapter

      Pages 53-61

      Pervasive Random Beacon in the Internet for Covert Coordination

    5. No Access

      Book Chapter

      Pages 62-76

      Censorship Resistance Revisited

  4. Watermarking

    1. No Access

      Book Chapter

      Pages 77-90

      Optimal Embedding for Watermarking in Discrete Data Spaces

    2. No Access

      Book Chapter

      Pages 91-105

      A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images

    3. No Access

      Book Chapter

      Pages 106-117

      A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers

  5. Theory

    1. No Access

      Book Chapter

      Pages 118-130

      Efficient Steganography with Provable Security Guarantees

    2. No Access

      Book Chapter

      Pages 131-145

      Information-Theoretic Analysis of Security in Side-Informed Data Hiding

    3. No Access

      Book Chapter

      Pages 146-160

      Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

  6. Watermark Attacks

    1. No Access

      Book Chapter

      Pages 161-175

      How to Combat Block Replacement Attacks?

    2. No Access

      Book Chapter

      Pages 176-188

      On the Intractability of Inverting Geometric Distortions in Watermarking Schemes

  7. Steganography

    1. No Access

      Book Chapter

      Pages 189-203

      Pre-processing for Adding Noise Steganography

    2. No Access

      Book Chapter

      Pages 204-218

      Efficient Wet Paper Codes

  8. Hiding in Unusual Content

    1. No Access

      Book Chapter

      Pages 219-233

      Translation-Based Steganography

    2. No Access

      Book Chapter

      Pages 234-246

      ID Modulation: Embedding Sensor Data in an RFID Timeseries

    3. No Access

      Book Chapter

      Pages 247-261

      Embedding Covert Channels into TCP/IP

  9. Steganalysis

    1. No Access

      Book Chapter

      Pages 262-277

      Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions

previous Page of 2