Skip to main content
  • Conference proceedings
  • © 2010

Information Hiding

12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6387)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. FPGA Time-Bounded Unclonable Authentication

    • Mehrdad Majzoobi, Ahmed Elnably, Farinaz Koushanfar
    Pages 1-16
  3. A Unified Submodular Framework for Multimodal IC Trojan Detection

    • Farinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani
    Pages 17-32
  4. A Secure and Robust Approach to Software Tamper Resistance

    • Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson
    Pages 33-47
  5. Security with Noisy Data

    • Boris Škorić
    Pages 48-50
  6. Detection of Copy-Rotate-Move Forgery Using Zernike Moments

    • Seung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee
    Pages 51-65
  7. Scene Illumination as an Indicator of Image Manipulation

    • Christian Riess, Elli Angelopoulou
    Pages 66-80
  8. Tardos’s Fingerprinting Code over AWGN Channel

    • Minoru Kuribayashi
    Pages 103-117
  9. Steganalysis Using Partially Ordered Markov Models

    • Jennifer Davidson, Jaikishan Jalan
    Pages 118-132
  10. The Influence of the Image Basis on Modeling and Steganalysis Performance

    • Valentin Schwamberger, Pham Hai Dang Le, Bernhard Schölkopf, Matthias O. Franz
    Pages 133-144
  11. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

    • Tomáš Pevný, Tomáš Filler, Patrick Bas
    Pages 161-177
  12. Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability

    • Anindya Sarkar, Kaushal Solanki, B. S. Manjunath
    Pages 178-192
  13. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic

    • Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
    Pages 193-207
  14. STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography

    • Peng Meng, Liusheng Hang, Zhili Chen, Yuchong Hu, Wei Yang
    Pages 208-220
  15. The Reverse Statistical Disclosure Attack

    • Nayantara Mallesh, Matthew Wright
    Pages 221-234
  16. Security Analysis of ISS Watermarking Using Natural Scene Statistics

    • Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang
    Pages 235-248

Other Volumes

  1. Information Hiding

About this book

IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28–30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This conference series aims to bring together a number of closely related research areas, including digital watermarking, steganography and s- ganalysis, anonymity and privacy, covert and subliminal channels, ?ngerpri- ing and embedding codes, multimedia forensics and counter-forensics, as well as theoretical aspects of information hiding and detection. Since its inception, the conference series has been a premier forum for publishing research in these areas. This volume contains the revised versions of 18 accepted papers (incor- rating the comments from members of the Program Committee), and extended abstracts of two (out of three) invited talks. The conference received 39 anonymous submissions for full papers. The task of selecting 18 of them for presentation was not easy. Each submission was reviewed by at least three members of the Program Committee or external - viewers reporting to a member of the Program Committee. In the case of - authorship by a Program Committee member, ?ve reviews were sought. There is no need to say that no member of the Program Committee reviewed his or her own work. Each paper was carefully discussed until consensus was reached.

Editors and Affiliations

  • International Computer Science Institute, Berkeley, USA

    Rainer Böhme

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Philip W. L. Fong, Reihaneh Safavi-Naini

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access