Information Hiding

6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers

  • Jessica Fridrich
Conference proceedings IH 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3200)

Table of contents

  1. Front Matter
  2. Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware)

  3. Session 2 - Steganalysis Session Chair: Mauro Barni (University of Siena)

  4. Session 3 - Forensic Applications Session Chair: Scott Craver (Princeton University)

    1. Alin C. Popescu, Hany Farid
      Pages 128-147
    2. Jennifer L. Wong, Miodrag Potkonjak
      Pages 148-163
  5. Session 4 - Steganography Session Chair: Andreas Westfeld (Dresden University of Technology)

    1. Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin
      Pages 164-179
  6. Session 5 - Software Watermarking Session Chair: John McHugh (SEI/CERT)

    1. Christian Collberg, Andrew Huntwork, Edward Carter, Gregg Townsend
      Pages 192-207
    2. Jasvir Nagra, Clark Thomborson
      Pages 208-223
    3. Lin Yuan, Pushkin R. Pari, Gang Qu
      Pages 224-238
  7. Session 6 - Security and Privacy Session Chair: Ross Anderson (University of Cambridge)

  8. Session 7 - Anonymity Session Chair: Andreas Pfitzmann (Dresden University of Technology)

    1. George Danezis, Andrei Serjantov
      Pages 293-308
    2. Dogan Kesdogan, Lexi Pimenidis
      Pages 326-339
  9. Session 8 - Data Hiding in Unusual Content Session Chair: Christian Collberg (University of Arizona)

    1. Lin Yuan, Gang Qu
      Pages 340-354
    2. Steven J. Murdoch, Piotr Zieliński
      Pages 355-369
  10. Back Matter

About these proceedings


It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We would like to thank all authors who submitted their work for consideration. Out of the 70 submisions received by the program committee, 25 papers were accepted for publication based on their novelty, originality, and scientific merit. We strived to achieve a balanced exposition of papers that would represent many different aspects of information hiding. All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content. This year, the workshop included a one-hour rump session that offered an opportunity to the delegates to share their work in progress and other brief but interesting contributions.


Code Information Session anonymity anonymity protocols digital fingerprinting digital watermarking image watermarking information hiding optimization privacy security source code watermarking steganography zero-knowledge watermarking

Editors and affiliations

  • Jessica Fridrich
    • 1
  1. 1.Department of Electrical and Computer EngineeringBinghamton UniversityBINGHAMTON

Bibliographic information