Information Hiding

12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers

  • Rainer Böhme
  • Philip W. L. Fong
  • Reihaneh Safavi-Naini

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6387)

Table of contents

  1. Front Matter
  2. Mehrdad Majzoobi, Ahmed Elnably, Farinaz Koushanfar
    Pages 1-16
  3. Farinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani
    Pages 17-32
  4. Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson
    Pages 33-47
  5. Boris Škorić
    Pages 48-50
  6. Seung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee
    Pages 51-65
  7. Christian Riess, Elli Angelopoulou
    Pages 66-80
  8. Minoru Kuribayashi
    Pages 103-117
  9. Jennifer Davidson, Jaikishan Jalan
    Pages 118-132
  10. Valentin Schwamberger, Pham Hai Dang Le, Bernhard Schölkopf, Matthias O. Franz
    Pages 133-144
  11. Tomáš Pevný, Tomáš Filler, Patrick Bas
    Pages 161-177
  12. Anindya Sarkar, Kaushal Solanki, B. S. Manjunath
    Pages 178-192
  13. Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
    Pages 193-207
  14. Peng Meng, Liusheng Hang, Zhili Chen, Yuchong Hu, Wei Yang
    Pages 208-220
  15. Nayantara Mallesh, Matthew Wright
    Pages 221-234
  16. Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang
    Pages 235-248

About these proceedings

Introduction

IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28–30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This conference series aims to bring together a number of closely related research areas, including digital watermarking, steganography and s- ganalysis, anonymity and privacy, covert and subliminal channels, ?ngerpri- ing and embedding codes, multimedia forensics and counter-forensics, as well as theoretical aspects of information hiding and detection. Since its inception, the conference series has been a premier forum for publishing research in these areas. This volume contains the revised versions of 18 accepted papers (incor- rating the comments from members of the Program Committee), and extended abstracts of two (out of three) invited talks. The conference received 39 anonymous submissions for full papers. The task of selecting 18 of them for presentation was not easy. Each submission was reviewed by at least three members of the Program Committee or external - viewers reporting to a member of the Program Committee. In the case of - authorship by a Program Committee member, ?ve reviews were sought. There is no need to say that no member of the Program Committee reviewed his or her own work. Each paper was carefully discussed until consensus was reached.

Keywords

algorithms anonymity calculus counter forensics data hiding digital rights management documen document security fingerprinting information hiding privacy security metrics statistics steganography watermarking

Editors and affiliations

  • Rainer Böhme
    • 1
  • Philip W. L. Fong
    • 2
  • Reihaneh Safavi-Naini
    • 2
  1. 1.International Computer Science InstituteBerkeleyUSA
  2. 2.Department of Computer ScienceUniversity of CalgaryCalgaryCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-16435-4
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-16434-7
  • Online ISBN 978-3-642-16435-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book