Information Hiding

10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

  • Kaushal Solanki
  • Kenneth Sullivan
  • Upamanyu Madhow
Conference proceedings IH 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5284)

Table of contents

  1. Front Matter
  2. Anonymity and Privacy

  3. Steganography I

  4. Forensics

    1. Weihong Wang, Hany Farid
      Pages 72-86
    2. Nicholas Zhong-Yang Ho, Ee-Chien Chang
      Pages 87-101
  5. Novel Technologies/Applications

    1. Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak
      Pages 102-117
    2. Xianfeng Zhao, Ning Li
      Pages 118-131
  6. Watermarking I

    1. Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim
      Pages 132-146
    2. Hong-Jie He, Jia-Shu Zhang, Heng-Ming Tai
      Pages 147-160
  7. Steganalysis

    1. Johann Barbier, Stéphanie Alt
      Pages 195-208
  8. Other hiding Domains I

    1. J. Wu, D. R. Stinson
      Pages 209-223
    2. Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng et al.
      Pages 224-235
  9. Steganography II

    1. Hao-tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung
      Pages 236-250
    2. Tomáš Pevný, Jessica Fridrich
      Pages 251-267
  10. Other Hiding Domains II and Network Security

    1. Other Hiding Domains

      1. Csaba Salamon, Jonathan Corney, James Ritchie
        Pages 268-282

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information Hiding, IH 2008, held in Santa Barbara, CA, USA, in May 2008.

The 25 revised full papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on anonymity and privacy, steganography, forensics, novel technologies and applications, watermarking, steganalysis, other hiding domains, network security, and fingerprinting.

Keywords

anonymity authentication cryptography data hiding digital fingerprinting digital forensics digital rights management digital signature distortion optimization encryption fingerprinting first-order statistics fragile watermarking privacy security

Editors and affiliations

  • Kaushal Solanki
    • 1
  • Kenneth Sullivan
    • 1
  • Upamanyu Madhow
    • 2
  1. 1.Mayachitra Inc.Santa BarbaraUSA
  2. 2.Department of Electrical and Computer EngineeringUniversity of CaliforniaSanta BarbaraUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-88961-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88960-1
  • Online ISBN 978-3-540-88961-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book