Solanki / Sullivan / Madhow | Information Hiding | Buch | 978-3-540-88960-1 | sack.de

Buch, Englisch, Band 5284, 373 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g

Reihe: Lecture Notes in Computer Science

Solanki / Sullivan / Madhow

Information Hiding

Buch, Englisch, Band 5284, 373 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-88960-1
Verlag: Springer-Verlag GmbH


th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding’s po- tion as the top forum of our community.
Solanki / Sullivan / Madhow Information Hiding jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Anonymity and Privacy.- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes.- Hiding a Needle in a Haystack Using Negative Databases.- Information Leakage in Optimal Anonymized and Diversified Data.- Steganography I.- Perturbation Hiding and the Batch Steganography Problem.- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.- Forensics.- Detecting Re-projected Video.- Residual Information of Redacted Images Hidden in the Compression Artifacts.- Novel Technologies/Applications.- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.- Reversible Watermarking with Subliminal Channel.- Watermarking I.- Watermarking Security Incorporating Natural Scene Statistics.- Block-Chain Based Fragile Watermarking Scheme with Superior Localization.- Steganalysis.- Generic Adoption of Spatial Steganalysis to Transformed Domain.- Weighted Stego-Image Steganalysis for JPEG Covers.- Practical Insecurity for Effective Steganalysis.- Other hiding Domains I.- Authorship Proof for Textual Document.- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.- Steganography II.- A Data Mapping Method for Steganography and Its Application to Images.- Benchmarking for Steganography.- Other Hiding Domains II and Network Security.- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face.- A Supraliminal Channel in a Videoconferencing Application.- C-Mix: A Lightweight Anonymous Routing Approach.- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.