Skip to main content
  • Conference proceedings
  • © 2005

Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3727)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (29 papers)

  1. Front Matter

  2. Invited Talk

  3. Anonymity

    1. Compulsion Resistant Anonymous Communications

      • George Danezis, Jolyon Clulow
      Pages 11-25
    2. Provable Anonymity for Networks of Mixes

      • Marek Klonowski, Mirosław Kutyłowski
      Pages 26-38
    3. On Blending Attacks for Mixes with Memory

      • Luke O’Connor
      Pages 39-52
    4. Pervasive Random Beacon in the Internet for Covert Coordination

      • Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan
      Pages 53-61
    5. Censorship Resistance Revisited

      • Ginger Perng, Michael K. Reiter, Chenxi Wang
      Pages 62-76
  4. Theory

    1. Efficient Steganography with Provable Security Guarantees

      • Aggelos Kiayias, Yona Raekow, Alexander Russell
      Pages 118-130
    2. Information-Theoretic Analysis of Security in Side-Informed Data Hiding

      • Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González
      Pages 131-145
    3. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

      • Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
      Pages 146-160
  5. Watermark Attacks

    1. How to Combat Block Replacement Attacks?

      • Gwenaël Doërr, Jean-Luc Dugelay
      Pages 161-175
  6. Steganography

    1. Pre-processing for Adding Noise Steganography

      • Elke Franz, Antje Schneidewind
      Pages 189-203
    2. Efficient Wet Paper Codes

      • Jessica Fridrich, Miroslav Goljan, David Soukal
      Pages 204-218
  7. Hiding in Unusual Content

    1. Translation-Based Steganography

      • Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail Atallah
      Pages 219-233
    2. ID Modulation: Embedding Sensor Data in an RFID Timeseries

      • Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander Mamishev
      Pages 234-246
    3. Embedding Covert Channels into TCP/IP

      • Steven J. Murdoch, Stephen Lewis
      Pages 247-261

Other Volumes

  1. Information Hiding

Keywords

  • Information
  • Internet
  • Performance
  • Radio-Frequency Identification (RFID)
  • TCP/IP
  • anonymity
  • communication
  • digital fingerprinting
  • digital watermarking
  • encryption
  • privacy
  • security
  • software watermarking
  • steganalysis
  • steganography

Editors and Affiliations

  • Dipartimento di Ingegneria dell’Informazione, Università degli Studi di Siena, Italy

    Mauro Barni

  • Universitat Oberta de Catalunya, Barcelona, Spain

    Jordi Herrera-Joancomartí

  • Philips Research Europe, Information and System Security, Eindhoven, The Netherlands

    Stefan Katzenbeisser

  • Departamento de Teoría de la Señal y Comunicaciones ETSI Telecom., Universidad de Vigo, Vigo,  

    Fernando Pérez-González

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access