Information Hiding

13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers

  • Tomáš Filler
  • Tomáš Pevný
  • Scott Craver
  • Andrew Ker

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)

Table of contents

  1. Front Matter
  2. Fingerprinting

    1. Dion Boesten, Boris Škorić
      Pages 1-13
    2. Peter Meerwald, Teddy Furon
      Pages 28-42
    3. Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox
      Pages 43-58
  3. Special Session on BOSS Contest

    1. Patrick Bas, Tomáš Filler, Tomáš Pevný
      Pages 59-70
    2. Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 85-101
    3. Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 102-117
  4. Anonymity and Privacy

    1. Gergely Ács, Claude Castelluccia
      Pages 118-132
    2. George Danezis, Markulf Kohlweiss, Alfredo Rial
      Pages 148-162
  5. Steganography and Steganalysis

    1. Cathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu
      Pages 163-177
    2. Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor Nikiforov, Philippe Cornu
      Pages 178-192
    3. Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng
      Pages 193-207
  6. Watermarking

    1. Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël Doërr
      Pages 223-237
    2. Jutta Hämmerle-Uhl, Karl Raab, Andreas Uhl
      Pages 238-254
    3. Weiming Zhang, Biao Chen, Nenghai Yu
      Pages 255-269
  7. Digital Rights Management and Digital Forensics

    1. Sebastian Schrittwieser, Stefan Katzenbeisser
      Pages 270-284

About these proceedings

Introduction

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011.

Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Keywords

Covert and subliminal channels data hiding multimedia forensics reverse engineering software protection

Editors and affiliations

  • Tomáš Filler
    • 1
  • Tomáš Pevný
    • 2
  • Scott Craver
    • 3
  • Andrew Ker
    • 4
  1. 1.Digimarc CorporationBeavertonUSA
  2. 2.Faculty of Electrical Engineering, Department of CyberneticsCzech Technical UniversityPrague 2Czech Republic
  3. 3.Department of Electrical and Computer Engineering, T. J. Watson SchoolSUNY BinghamtonBinghamtonUSA
  4. 4.Department of Computer ScienceUniversity of OxfordOxfordUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-24178-9
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-24177-2
  • Online ISBN 978-3-642-24178-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book