Skip to main content
  • Conference proceedings
  • © 2011

Information Hiding

13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers

  • Fast-track conference proceedings

  • State-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6958)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2011.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (23 papers)

  1. Front Matter

  2. Fingerprinting

    1. Asymptotic Fingerprinting Capacity for Non-binary Alphabets

      • Dion Boesten, Boris Škorić
      Pages 1-13
    2. Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithm

      • Peter Meerwald, Teddy Furon
      Pages 28-42
    3. An Asymmetric Fingerprinting Scheme Based on Tardos Codes

      • Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox
      Pages 43-58
  3. Special Session on BOSS Contest

    1. ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS

      • Patrick Bas, Tomáš Filler, Tomáš Pevný
      Pages 59-70
    2. Breaking HUGO – The Process Discovery

      • Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 85-101
    3. Steganalysis of Content-Adaptive Steganography in Spatial Domain

      • Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 102-117
  4. Anonymity and Privacy

    1. I Have a DREAM! (DiffeRentially privatE smArt Metering)

      • Gergely Ács, Claude Castelluccia
      Pages 118-132
    2. Differentially Private Billing with Rebates

      • George Danezis, Markulf Kohlweiss, Alfredo Rial
      Pages 148-162
  5. Steganography and Steganalysis

    1. Statistical Decision Methods in Hidden Information Detection

      • Cathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu
      Pages 163-177
    2. A Cover Image Model For Reliable Steganalysis

      • Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor Nikiforov, Philippe Cornu
      Pages 178-192
    3. Video Steganography with Perturbed Motion Estimation

      • Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng
      Pages 193-207
  6. Watermarking

    1. Improving Tonality Measures for Audio Watermarking

      • Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël Doërr
      Pages 223-237
    2. Watermarking as a Means to Enhance Biometric Systems: A Critical Survey

      • Jutta Hämmerle-Uhl, Karl Raab, Andreas Uhl
      Pages 238-254
    3. Capacity-Approaching Codes for Reversible Data Hiding

      • Weiming Zhang, Biao Chen, Nenghai Yu
      Pages 255-269
  7. Digital Rights Management and Digital Forensics

    1. Code Obfuscation against Static and Dynamic Reverse Engineering

      • Sebastian Schrittwieser, Stefan Katzenbeisser
      Pages 270-284

Other Volumes

  1. Information Hiding

About this book

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011.

Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Keywords

  • Covert and subliminal channels
  • data hiding
  • multimedia forensics
  • reverse engineering
  • software protection
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Digimarc Corporation, Beaverton, USA

    Tomáš Filler

  • Faculty of Electrical Engineering, Department of Cybernetics, Czech Technical University, Prague 2, Czech Republic

    Tomáš Pevný

  • Department of Electrical and Computer Engineering, T. J. Watson School, SUNY Binghamton, Binghamton, USA

    Scott Craver

  • Department of Computer Science, University of Oxford, Oxford, UK

    Andrew Ker

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions