Information Hiding | 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers | ISBN 9783540314813

Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

herausgegeben von Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser und Fernando Pérez-González
Mitwirkende
Herausgegeben vonMauro Barni
Herausgegeben vonJordi Herrera Joancomartí
Herausgegeben vonStefan Katzenbeisser
Herausgegeben vonFernando Pérez-González
Buchcover Information Hiding  | EAN 9783540314813 | ISBN 3-540-31481-4 | ISBN 978-3-540-31481-3

Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

herausgegeben von Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser und Fernando Pérez-González
Mitwirkende
Herausgegeben vonMauro Barni
Herausgegeben vonJordi Herrera Joancomartí
Herausgegeben vonStefan Katzenbeisser
Herausgegeben vonFernando Pérez-González

Inhaltsverzeichnis

  • Invited Talk.
  • On Joint Coding for Watermarking and Encryption.
  • Anonymity.
  • Compulsion Resistant Anonymous Communications.
  • Provable Anonymity for Networks of Mixes.
  • On Blending Attacks for Mixes with Memory.
  • Pervasive Random Beacon in the Internet for Covert Coordination.
  • Censorship Resistance Revisited.
  • Watermarking.
  • Optimal Embedding for Watermarking in Discrete Data Spaces.
  • A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images.
  • A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
  • Theory.
  • Efficient Steganography with Provable Security Guarantees.
  • Information-Theoretic Analysis of Security in Side-Informed Data Hiding.
  • Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
  • Watermark Attacks.
  • How to Combat Block Replacement Attacks?.
  • On the Intractability of Inverting Geometric Distortions in Watermarking Schemes.
  • Steganography.
  • Pre-processing for Adding Noise Steganography.
  • Efficient Wet Paper Codes.
  • Hiding in Unusual Content.
  • Translation-Based Steganography.
  • ID Modulation: Embedding Sensor Data in an RFID Timeseries.
  • Embedding Covert Channels into TCP/IP.
  • Steganalysis.
  • Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
  • Assessment of Steganalytic Methods Using Multiple Regression Models.
  • A General Framework for Structural Steganalysis of LSB Replacement.
  • New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
  • An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
  • Software Watermarking.
  • Self-validating Branch-Based Software Watermarking.
  • Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.
  • Dither Modulation Watermarking of Dynamic Memory Traces.
  • Fingerprinting.
  • A Family of Collusion 2-Secure Codes.
  • Best Security Index for Digital Fingerprinting.