Information hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised selected papers / Matthias Kirchner, Dipak Ghosal (eds.).

By: (14th : IH (Conference) (14th : 2012 : Berkeley, Calif.)
Contributor(s): Kirchner, Matthias (Computer scientist) | Ghosal, Dipak
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 7692.; LNCS sublibrary: Publisher: Berlin ; New York : Springer, ©2013Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642363733; 3642363733; 3642363725; 9783642363726Other title: IH 2012Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Data protection -- Congresses | Computer Security | Computer security | Data encryption (Computer science) | Data protection | Engineering & Applied Sciences | Computer Science | Computer science | Data encryption (Computer science) | Computer software | Multimedia systems | Computer graphics | Computer vision | Information Systems | Algorithm Analysis and Problem Complexity | Multimedia Information Systems | Management of Computing and Information Systems | computerwetenschappen | computer sciences | informatiesystemen | beeldverwerking | image processing | machine vision | algoritmen | algorithms | computeranalyse | computer analysis | massamedia | mass media | computergrafie | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Congress. | Electronic books. | Conference papers and proceedings. | Computer software. Additional physical formats: Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | I3 2012Other classification: 54.62 Online resources: Click here to access online
Contents:
Multimedia Forensics and Counter-Forensics -- Blind Median Filtering Detection Using Statistics in Difference Domain / Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang -- Robustness of Color Interpolation Identification against Anti-forensic Operations / Wei-Hong Chuang, Min Wu -- Steganalyis -- Steganalysis of LSB Replacement Using Parity-Aware Features / Jessica Fridrich, Jan Kodovský -- Statistical Detection of LSB Matching Using Hypothesis Testing Theory / Rémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor Nikiforov, Lionel Fillatre -- Textural Features for Steganalysis / Yun Q. Shi, Patchara Sutthiwan, Licong Chen -- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts / Jan Kodovský, Jessica Fridrich -- Data Hiding in Unusual Content -- Hiding a Second Appearance in a Physical Relief Surface / Yi-Liu Chao, Daniel G. Aliaga -- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data / Ling Du, Xiaochun Cao, Muhua Zhang, Huazhu Fu -- Steganography -- A Game-Theoretic Approach to Content-Adaptive Steganography / Pascal Schöttle, Rainer Böhme -- Key-Efficient Steganography / Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar -- Covert Channels -- Secret Agent Radio: Covert Communication through Dirty Constellations / Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas Sicker -- Anonymity and Privacy -- Lower Bounds for Private Broadcast Encryption / Aggelos Kiayias, Katerina Samari -- The Dangers of Composing Anonymous Channels / George Danezis, Emilia Käsper -- Watermarking -- A New Measure of Watermarking Security Applied on QIM / Teddy Furon, Patrick Bas -- Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking / Shijun Xiang -- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking / Peijia Zheng, Jiwu Huang -- Fingerprinting -- Asymptotic Fingerprinting Capacity in the Combined Digit Model / Dion Boesten, Boris Škorić -- Bias Equalizer for Binary Probabilistic Fingerprinting Codes / Minoru Kuribayashi.
Summary: This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Multimedia Forensics and Counter-Forensics -- Blind Median Filtering Detection Using Statistics in Difference Domain / Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang -- Robustness of Color Interpolation Identification against Anti-forensic Operations / Wei-Hong Chuang, Min Wu -- Steganalyis -- Steganalysis of LSB Replacement Using Parity-Aware Features / Jessica Fridrich, Jan Kodovský -- Statistical Detection of LSB Matching Using Hypothesis Testing Theory / Rémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor Nikiforov, Lionel Fillatre -- Textural Features for Steganalysis / Yun Q. Shi, Patchara Sutthiwan, Licong Chen -- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts / Jan Kodovský, Jessica Fridrich -- Data Hiding in Unusual Content -- Hiding a Second Appearance in a Physical Relief Surface / Yi-Liu Chao, Daniel G. Aliaga -- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data / Ling Du, Xiaochun Cao, Muhua Zhang, Huazhu Fu -- Steganography -- A Game-Theoretic Approach to Content-Adaptive Steganography / Pascal Schöttle, Rainer Böhme -- Key-Efficient Steganography / Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar -- Covert Channels -- Secret Agent Radio: Covert Communication through Dirty Constellations / Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas Sicker -- Anonymity and Privacy -- Lower Bounds for Private Broadcast Encryption / Aggelos Kiayias, Katerina Samari -- The Dangers of Composing Anonymous Channels / George Danezis, Emilia Käsper -- Watermarking -- A New Measure of Watermarking Security Applied on QIM / Teddy Furon, Patrick Bas -- Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking / Shijun Xiang -- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking / Peijia Zheng, Jiwu Huang -- Fingerprinting -- Asymptotic Fingerprinting Capacity in the Combined Digit Model / Dion Boesten, Boris Škorić -- Bias Equalizer for Binary Probabilistic Fingerprinting Codes / Minoru Kuribayashi.

This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.

Includes author index.

There are no comments for this item.

to post a comment.

Powered by Koha