Information Hiding

9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers

Editors:

ISBN: 978-3-540-77369-6 (Print) 978-3-540-77370-2 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. New Steganographic Schemes

    1. No Access

      Book Chapter

      Pages 1-15

      MPSteg-color: A New Steganographic Technique for Color Images

    2. No Access

      Book Chapter

      Pages 16-31

      YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis

    3. No Access

      Book Chapter

      Pages 32-49

      Steganographic Communication with Quantum Information

  3. Watermarking Schemess

    1. No Access

      Book Chapter

      Pages 50-64

      Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation

    2. No Access

      Book Chapter

      Pages 65-79

      Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization

  4. Computer Security

    1. No Access

      Book Chapter

      Pages 80-95

      A Graph Game Model for Software Tamper Protection

    2. No Access

      Book Chapter

      Pages 96-111

      Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection

    3. No Access

      Book Chapter

      Pages 112-129

      Space-Efficient Kleptography Without Random Oracles

  5. Steganography and Code Theory

    1. No Access

      Book Chapter

      Pages 130-144

      How Can Reed-Solomon Codes Improve Steganographic Schemes?

    2. No Access

      Book Chapter

      Pages 145-158

      Reducing the Complexity of Syndrome Coding for Embedding

  6. Watermarking Security

    1. No Access

      Book Chapter

      Pages 159-173

      Exploiting Security Holes in Lattice Data Hiding

    2. No Access

      Book Chapter

      Pages 174-188

      Practical Security Analysis of Dirty Paper Trellis Watermarking

    3. No Access

      Book Chapter

      Pages 189-203

      Security of Invertible Media Authentication Schemes Revisited

  7. Steganalysis

    1. No Access

      Book Chapter

      Pages 204-219

      A Fusion of Maximum Likelihood and Structural Steganalysis

    2. No Access

      Book Chapter

      Pages 220-236

      Traffic Analysis Attacks on a Continuously-Observable Steganographic File System

  8. Watermarking and Re-synchronization

    1. No Access

      Book Chapter

      Pages 237-251

      Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction

    2. No Access

      Book Chapter

      Pages 252-266

      Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio

    3. No Access

      Book Chapter

      Pages 267-278

      A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization

  9. Fingerprinting

    1. No Access

      Book Chapter

      Pages 279-293

      Optimization of Tardos’s Fingerprinting Codes in a Viewpoint of Memory Amount

    2. No Access

      Book Chapter

      Pages 294-310

      Combining Tardos Fingerprinting Codes and Fingercasting

previous Page of 2