Advertisement

Information Hiding

13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers

  • Tomáš Filler
  • Tomáš Pevný
  • Scott Craver
  • Andrew Ker

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)

Table of contents

  1. Front Matter
  2. Fingerprinting

    1. Dion Boesten, Boris Škorić
      Pages 1-13
    2. Peter Meerwald, Teddy Furon
      Pages 28-42
    3. Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox
      Pages 43-58
  3. Special Session on BOSS Contest

    1. Patrick Bas, Tomáš Filler, Tomáš Pevný
      Pages 59-70
    2. Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 85-101
    3. Jessica Fridrich, Jan Kodovský, Vojtěch Holub, Miroslav Goljan
      Pages 102-117
  4. Anonymity and Privacy

    1. Gergely Ács, Claude Castelluccia
      Pages 118-132
    2. George Danezis, Markulf Kohlweiss, Alfredo Rial
      Pages 148-162
  5. Steganography and Steganalysis

    1. Cathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor Nikiforov, Lionel Fillatre, Philippe Cornu
      Pages 163-177
    2. Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor Nikiforov, Philippe Cornu
      Pages 178-192
    3. Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng
      Pages 193-207
  6. Watermarking

    1. Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël Doërr
      Pages 223-237
    2. Jutta Hämmerle-Uhl, Karl Raab, Andreas Uhl
      Pages 238-254
    3. Weiming Zhang, Biao Chen, Nenghai Yu
      Pages 255-269
  7. Digital Rights Management and Digital Forensics

    1. Sebastian Schrittwieser, Stefan Katzenbeisser
      Pages 270-284
    2. ShiYue Lai, Rainer Böhme
      Pages 285-298
  8. Data Hiding in Unusual Content

    1. Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov
      Pages 299-313
    2. Amir Houmansadr, Nikita Borisov
      Pages 314-328
    3. Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, Abdelrahman Desoky
      Pages 329-341
  9. Back Matter

About these proceedings

Introduction

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011.

Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Keywords

Covert and subliminal channels data hiding multimedia forensics reverse engineering software protection

Editors and affiliations

  • Tomáš Filler
    • 1
  • Tomáš Pevný
    • 2
  • Scott Craver
    • 3
  • Andrew Ker
    • 4
  1. 1.Digimarc CorporationBeavertonUSA
  2. 2.Faculty of Electrical Engineering, Department of CyberneticsCzech Technical UniversityPrague 2Czech Republic
  3. 3.Department of Electrical and Computer Engineering, T. J. Watson SchoolSUNY BinghamtonBinghamtonUSA
  4. 4.Department of Computer ScienceUniversity of OxfordOxfordUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-24178-9
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-24177-2
  • Online ISBN 978-3-642-24178-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site