|
|
|||
|
||||
Overviewth It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding’s po- tion as the top forum of our community. Full Product DetailsAuthor: Kaushal Solanki , Kenneth Sullivan , Upamanyu MadhowPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2008 ed. Volume: 5284 Dimensions: Width: 15.50cm , Height: 2.00cm , Length: 23.50cm Weight: 0.593kg ISBN: 9783540889601ISBN 10: 3540889604 Pages: 373 Publication Date: 23 October 2008 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsAnonymity and Privacy.- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes.- Hiding a Needle in a Haystack Using Negative Databases.- Information Leakage in Optimal Anonymized and Diversified Data.- Steganography I.- Perturbation Hiding and the Batch Steganography Problem.- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.- Forensics.- Detecting Re-projected Video.- Residual Information of Redacted Images Hidden in the Compression Artifacts.- Novel Technologies/Applications.- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.- Reversible Watermarking with Subliminal Channel.- Watermarking I.- Watermarking Security Incorporating Natural Scene Statistics.- Block-Chain Based Fragile Watermarking Scheme with Superior Localization.- Steganalysis.- Generic Adoption of Spatial Steganalysis to Transformed Domain.- Weighted Stego-Image Steganalysis for JPEG Covers.- Practical Insecurity for Effective Steganalysis.- Other hiding Domains I.- Authorship Proof for Textual Document.- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.- Steganography II.- A Data Mapping Method for Steganography and Its Application to Images.- Benchmarking for Steganography.- Other Hiding Domains II and Network Security.- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face.- A Supraliminal Channel in a Videoconferencing Application.- C-Mix: A Lightweight Anonymous Routing Approach.- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |