Skip to main content
  • Conference proceedings
  • © 2007

Information Hiding

8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4437)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Hamiltonian Mechanics

    1. Natural Watermarking: A Secure Spread Spectrum Technique for WOA

      • Patrick Bas, François Cayre
      Pages 1-14
    2. A Cryptographic Method for Secure Watermark Detection

      • Michael Malkin, Ton Kalker
      Pages 26-41
    3. Steganographic Communication in Ordered Channels

      • R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu Rangan, R. Sundaram
      Pages 42-57
    4. Analyzing Network-Aware Active Wardens in IPv6

      • Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin
      Pages 58-77
  3. Video Watermarking by Using Geometic Warping Without Visible Artifacts

    1. Video Watermarking by Using Geometric Warping Without Visible Artifacts

      • Dima Pröfrock, Mathias Schlauweg, Erika Müller
      Pages 78-92
    2. Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens

      • Richard Bergmair, Stefan Katzenbeisser
      Pages 109-123
    3. Noisy Timing Channels with Binary Inputs and Outputs

      • Keye Martin, Ira S. Moskowitz
      Pages 124-144
    4. A Computational Model for Watermark Robustness

      • André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
      Pages 145-160
    5. Hiding Information Hiding

      • Adam Young, Moti Yung
      Pages 161-171
    6. A High-Capacity Data Hiding Method for Polygonal Meshes

      • Hao-tian Wu, Yiu-ming Cheung
      Pages 188-200
    7. Delayed and Controlled Failures in Tamper-Resistant Software

      • Gang Tan, Yuqun Chen, Mariusz H. Jakubowski
      Pages 216-231
    8. A Model for Self-Modifying Code

      • Bertrand Anckaert, Matias Madou, Koen De Bosschere
      Pages 232-248
    9. A Markov Process Based Approach to Effective Attacking JPEG Steganography

      • Yun Q. Shi, Chunhua Chen, Wen Chen
      Pages 249-264
    10. Batch Steganography and Pooled Steganalysis

      • Andrew D. Ker
      Pages 265-281
    11. On Steganographic Embedding Efficiency

      • Jessica Fridrich, Petr LisonÄ›k, David Soukal
      Pages 282-296

Other Volumes

  1. Information Hiding

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access