Information Hiding
11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Herausgegeben:Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
Information Hiding
11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Herausgegeben:Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
- Teddy Furon / François Cayre / Gwenaël DoërrG / Patrick Bas (eds.)Information Hiding42,99 €
- Jan Camenisch / Christian Collberg / Neil F. Johnson / Phil Sallee (eds.)Information Hiding42,99 €
- Digital-Forensics and Watermarking37,99 €
- Transactions on Data Hiding and Multimedia Security I42,99 €
- Yun Q. Shi (Volume ed.)Transactions on Data Hiding and Multimedia Security III42,99 €
- Fabien A. P. Petitcolas (ed.)Information Hiding42,99 €
- Digital Forensics and Watermarking37,99 €
-
-
-
- Produktdetails
- Lecture Notes in Computer Science 5806
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12760275, 978-3-642-04430-4
- 2009
- Seitenzahl: 288
- Erscheinungstermin: 23. September 2009
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 441g
- ISBN-13: 9783642044304
- ISBN-10: 3642044301
- Artikelnr.: 26986735
- Lecture Notes in Computer Science 5806
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12760275, 978-3-642-04430-4
- 2009
- Seitenzahl: 288
- Erscheinungstermin: 23. September 2009
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 441g
- ISBN-13: 9783642044304
- ISBN-10: 3642044301
- Artikelnr.: 26986735
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
An Epistemological Approach to Steganography.
Fisher Information Determines Capacity of ?
Secure Steganography.
Fast BCH Syndrome Coding for Steganography.
Steganalysis.
Embedding Ratio Estimating for Each Bit Plane of Image.
Estimating Steganographic Fisher Information in Real Images.
Watermarking.
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS
2.
A Phase Modulation Audio Watermarking Technique.
Forensic Tracking Watermarking against In
theater Piracy.
Self
recovery Fragile Watermarking Using Block
Neighborhood Tampering Characterization.
Perception
Based Audio Authentication Watermarking in the Time
Frequency Domain.
Fingerprinting.
An Improvement of Short 2
Secure Fingerprint Codes Strongly Avoiding False
Positive.
Estimating the Minimal Length of Tardos Code.
Hiding in Unusual Content, Novel Applications.
Roughness
Adaptive 3D Watermarking of Polygonal Meshes.
Hardware
Based Public
Key Cryptography with Public Physically Unclonable Functions.
SVD
Based Ghost Circuitry Detection.
Forensics.
Microphone Classification Using Fourier Coefficients.
Detect Digital Image Splicing with Visual Cues.
Feature
Based Camera Model Identification Works in Practice.
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
An Epistemological Approach to Steganography.
Fisher Information Determines Capacity of ?
Secure Steganography.
Fast BCH Syndrome Coding for Steganography.
Steganalysis.
Embedding Ratio Estimating for Each Bit Plane of Image.
Estimating Steganographic Fisher Information in Real Images.
Watermarking.
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS
2.
A Phase Modulation Audio Watermarking Technique.
Forensic Tracking Watermarking against In
theater Piracy.
Self
recovery Fragile Watermarking Using Block
Neighborhood Tampering Characterization.
Perception
Based Audio Authentication Watermarking in the Time
Frequency Domain.
Fingerprinting.
An Improvement of Short 2
Secure Fingerprint Codes Strongly Avoiding False
Positive.
Estimating the Minimal Length of Tardos Code.
Hiding in Unusual Content, Novel Applications.
Roughness
Adaptive 3D Watermarking of Polygonal Meshes.
Hardware
Based Public
Key Cryptography with Public Physically Unclonable Functions.
SVD
Based Ghost Circuitry Detection.
Forensics.
Microphone Classification Using Fourier Coefficients.
Detect Digital Image Splicing with Visual Cues.
Feature
Based Camera Model Identification Works in Practice.