Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

Author:   Kaushal Solanki ,  Kenneth Sullivan ,  Upamanyu Madhow
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2008 ed.
Volume:   5284
ISBN:  

9783540889601


Pages:   373
Publication Date:   23 October 2008
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers


Add your own review!

Overview

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding’s po- tion as the top forum of our community.

Full Product Details

Author:   Kaushal Solanki ,  Kenneth Sullivan ,  Upamanyu Madhow
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2008 ed.
Volume:   5284
Dimensions:   Width: 15.50cm , Height: 2.00cm , Length: 23.50cm
Weight:   0.593kg
ISBN:  

9783540889601


ISBN 10:   3540889604
Pages:   373
Publication Date:   23 October 2008
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Anonymity and Privacy.- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes.- Hiding a Needle in a Haystack Using Negative Databases.- Information Leakage in Optimal Anonymized and Diversified Data.- Steganography I.- Perturbation Hiding and the Batch Steganography Problem.- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.- Forensics.- Detecting Re-projected Video.- Residual Information of Redacted Images Hidden in the Compression Artifacts.- Novel Technologies/Applications.- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.- Reversible Watermarking with Subliminal Channel.- Watermarking I.- Watermarking Security Incorporating Natural Scene Statistics.- Block-Chain Based Fragile Watermarking Scheme with Superior Localization.- Steganalysis.- Generic Adoption of Spatial Steganalysis to Transformed Domain.- Weighted Stego-Image Steganalysis for JPEG Covers.- Practical Insecurity for Effective Steganalysis.- Other hiding Domains I.- Authorship Proof for Textual Document.- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.- Steganography II.- A Data Mapping Method for Steganography and Its Application to Images.- Benchmarking for Steganography.- Other Hiding Domains II and Network Security.- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face.- A Supraliminal Channel in a Videoconferencing Application.- C-Mix: A Lightweight Anonymous Routing Approach.- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List