Information Hiding

8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers

  • Editors
  • Jan L. Camenisch
  • Christian S. Collberg
  • Neil F. Johnson
  • Phil Sallee
Conference proceedings IH 2006

DOI: 10.1007/978-3-540-74124-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4437)

Table of contents (25 papers)

  1. Front Matter
  2. Hamiltonian Mechanics

    1. A Cryptographic Method for Secure Watermark Detection
      Michael Malkin, Ton Kalker
      Pages 26-41
    2. Steganographic Communication in Ordered Channels
      R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu Rangan, R. Sundaram
      Pages 42-57
    3. Analyzing Network-Aware Active Wardens in IPv6
      Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin
      Pages 58-77
  3. Video Watermarking by Using Geometic Warping Without Visible Artifacts

    1. Video Watermarking by Using Geometric Warping Without Visible Artifacts
      Dima Pröfrock, Mathias Schlauweg, Erika Müller
      Pages 78-92
    2. Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
      Richard Bergmair, Stefan Katzenbeisser
      Pages 109-123
    3. Noisy Timing Channels with Binary Inputs and Outputs
      Keye Martin, Ira S. Moskowitz
      Pages 124-144
    4. A Computational Model for Watermark Robustness
      André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
      Pages 145-160
    5. Hiding Information Hiding
      Adam Young, Moti Yung
      Pages 161-171
    6. A High-Capacity Data Hiding Method for Polygonal Meshes
      Hao-tian Wu, Yiu-ming Cheung
      Pages 188-200
    7. Delayed and Controlled Failures in Tamper-Resistant Software
      Gang Tan, Yuqun Chen, Mariusz H. Jakubowski
      Pages 216-231
    8. A Model for Self-Modifying Code
      Bertrand Anckaert, Matias Madou, Koen De Bosschere
      Pages 232-248
    9. A Markov Process Based Approach to Effective Attacking JPEG Steganography
      Yun Q. Shi, Chunhua Chen, Wen Chen
      Pages 249-264
    10. Batch Steganography and Pooled Steganalysis
      Andrew D. Ker
      Pages 265-281
    11. On Steganographic Embedding Efficiency
      Jessica Fridrich, Petr Lisoněk, David Soukal
      Pages 282-296

About these proceedings


Code IPv6 Information RSA algorithms anonymity anonymity protocols communication cryptography digital fingerprinting digital forensics digital signature digital watermarking encryption fingerprinting

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74123-7
  • Online ISBN 978-3-540-74124-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349