Information Hiding

9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers

  • Teddy Furon
  • François Cayre
  • Gwenaël Doërr
  • Patrick Bas
Conference proceedings IH 2007

DOI: 10.1007/978-3-540-77370-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4567)

Table of contents

  1. Front Matter
  2. New Steganographic Schemes

    1. Giacomo Cancelli, Mauro Barni
      Pages 1-15
    2. Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
      Pages 16-31
  3. Watermarking Schemess

    1. Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt
      Pages 50-64
    2. Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang
      Pages 65-79
  4. Computer Security

    1. Nenad Dedić, Mariusz Jakubowski, Ramarathnam Venkatesan
      Pages 80-95
    2. Mariusz Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan
      Pages 96-111
    3. Adam L. Young, Moti M. Yung
      Pages 112-129
  5. Steganography and Code Theory

    1. Caroline Fontaine, Fabien Galand
      Pages 130-144
    2. Dagmar Schönfeld, Antje Winkler
      Pages 145-158
  6. Watermarking Security

    1. Luis Pérez-Freire, Fernando Pérez-González
      Pages 159-173
    2. Patrick Bas, Gwenaël Doërr
      Pages 174-188
    3. Daniel Dönigus, Stefan Endler, Marc Fischlin, Andreas Hülsing, Patrick Jäger, Anja Lehmann et al.
      Pages 189-203
  7. Steganalysis

    1. Carmela Troncoso, Claudia Diaz, Orr Dunkelman, Bart Preneel
      Pages 220-236
  8. Watermarking and Re-synchronization

  9. Fingerprinting

    1. Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
      Pages 279-293

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Keywords

Code Information Oracle authentication communication cryptography data hiding digital fingerprinting elliptic curve encryption information hiding optimization privacy secrecy security

Editors and affiliations

  • Teddy Furon
    • 1
  • François Cayre
    • 2
  • Gwenaël Doërr
    • 3
  • Patrick Bas
    • 4
  1. 1.Bretagne Atlantique Research CentreINRIA RennesRennes cedexFrance
  2. 2.Gipsa-lab Grenoble, CNRSSt. Martin d’Hères CedexFrance
  3. 3.University College LondonMartleshamUK
  4. 4.Gipsa-lab Grenoble, CNRSSaint Martin d’Hères cedexFrance

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77369-6
  • Online ISBN 978-3-540-77370-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349