Information Hiding

14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-36372-6 (Print) 978-3-642-36373-3 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. Multimedia Forensics and Counter-Forensics

    1. No Access

      Book Chapter

      Pages 1-15

      Blind Median Filtering Detection Using Statistics in Difference Domain

    2. No Access

      Book Chapter

      Pages 16-30

      Robustness of Color Interpolation Identification against Anti-forensic Operations

  3. Steganalyis

    1. No Access

      Book Chapter

      Pages 31-45

      Steganalysis of LSB Replacement Using Parity-Aware Features

    2. No Access

      Book Chapter

      Pages 46-62

      Statistical Detection of LSB Matching Using Hypothesis Testing Theory

    3. No Access

      Book Chapter

      Pages 63-77

      Textural Features for Steganalysis

    4. No Access

      Book Chapter

      Pages 78-93

      JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

  4. Data Hiding in Unusual Content

    1. No Access

      Book Chapter

      Pages 94-109

      Hiding a Second Appearance in a Physical Relief Surface

    2. No Access

      Book Chapter

      Pages 110-124

      Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data

  5. Steganography

    1. No Access

      Book Chapter

      Pages 125-141

      A Game-Theoretic Approach to Content-Adaptive Steganography

    2. No Access

      Book Chapter

      Pages 142-159

      Key-Efficient Steganography

  6. Covert Channels

    1. No Access

      Book Chapter

      Pages 160-175

      Secret Agent Radio: Covert Communication through Dirty Constellations

  7. Anonymity and Privacy

    1. No Access

      Book Chapter

      Pages 176-190

      Lower Bounds for Private Broadcast Encryption

    2. No Access

      Book Chapter

      Pages 191-206

      The Dangers of Composing Anonymous Channels

  8. Watermarking

    1. No Access

      Book Chapter

      Pages 207-223

      A New Measure of Watermarking Security Applied on QIM

    2. No Access

      Book Chapter

      Pages 224-239

      Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking

    3. No Access

      Book Chapter

      Pages 240-254

      Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking

  9. Fingerprinting

    1. No Access

      Book Chapter

      Pages 255-268

      Asymptotic Fingerprinting Capacity in the Combined Digit Model

    2. No Access

      Book Chapter

      Pages 269-283

      Bias Equalizer for Binary Probabilistic Fingerprinting Codes

  10. Back Matter

    Pages -