
×
Information Hiding
7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
herausgegeben von Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser und Fernando Pérez-GonzálezInhaltsverzeichnis
- Invited Talk.
- On Joint Coding for Watermarking and Encryption.
- Anonymity.
- Compulsion Resistant Anonymous Communications.
- Provable Anonymity for Networks of Mixes.
- On Blending Attacks for Mixes with Memory.
- Pervasive Random Beacon in the Internet for Covert Coordination.
- Censorship Resistance Revisited.
- Watermarking.
- Optimal Embedding for Watermarking in Discrete Data Spaces.
- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images.
- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
- Theory.
- Efficient Steganography with Provable Security Guarantees.
- Information-Theoretic Analysis of Security in Side-Informed Data Hiding.
- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
- Watermark Attacks.
- How to Combat Block Replacement Attacks?.
- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes.
- Steganography.
- Pre-processing for Adding Noise Steganography.
- Efficient Wet Paper Codes.
- Hiding in Unusual Content.
- Translation-Based Steganography.
- ID Modulation: Embedding Sensor Data in an RFID Timeseries.
- Embedding Covert Channels into TCP/IP.
- Steganalysis.
- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
- Assessment of Steganalytic Methods Using Multiple Regression Models.
- A General Framework for Structural Steganalysis of LSB Replacement.
- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
- Software Watermarking.
- Self-validating Branch-Based Software Watermarking.
- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.
- Dither Modulation Watermarking of Dynamic Memory Traces.
- Fingerprinting.
- A Family of Collusion 2-Secure Codes.
- Best Security Index for Digital Fingerprinting.