


default search action
9. Information Hiding 2007: Saint Malo, France
- Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:

Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6
New Steganographic Schemes
- Giacomo Cancelli, Mauro Barni:

MPSteg-color: A New Steganographic Technique for Color Images. 1-15 - Kaushal Solanki, Anindya Sarkar, B. S. Manjunath:

YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. 16-31 - Keye Martin:

Steganographic Communication with Quantum Information. 32-49
Watermarking Schemess
- Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt:

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. 50-64 - Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang:

Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. 65-79
Computer Security
- Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan:

A Graph Game Model for Software Tamper Protection. 80-95 - Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan:

Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. 96-111 - Adam L. Young, Moti Yung:

Space-Efficient Kleptography Without Random Oracles. 112-129
Steganography and Code Theory
- Caroline Fontaine, Fabien Galand:

How Can Reed-Solomon Codes Improve Steganographic Schemes? 130-144 - Dagmar Schönfeld, Antje Winkler:

Reducing the Complexity of Syndrome Coding for Embedding. 145-158
Watermarking Security
- Luis Pérez-Freire, Fernando Pérez-González

:
Exploiting Security Holes in Lattice Data Hiding. 159-173 - Patrick Bas, Gwenaël J. Doërr

:
Practical Security Analysis of Dirty Paper Trellis Watermarking. 174-188 - Daniel Dönigus, Stefan Endler, Marc Fischlin, Andreas Hülsing

, Patrick Jäger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann:
Security of Invertible Media Authentication Schemes Revisited. 189-203
Steganalysis
- Andrew D. Ker:

A Fusion of Maximum Likelihood and Structural Steganalysis. 204-219 - Carmela Troncoso, Claudia Díaz, Orr Dunkelman, Bart Preneel:

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. 220-236
Watermarking and Re-synchronization
- Mathias Schlauweg, Dima Pröfrock, Erika Müller:

Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction. 237-251 - Konrad Hofbauer, Horst Hering:

Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio. 252-266 - Peizhong Lu, Dan Wang:

A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. 267-278
Fingerprinting
- Koji Nuida

, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. 279-293 - Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik

, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. 294-310
Forensics
- Micah K. Johnson, Hany Farid:

Exposing Digital Forgeries Through Specular Highlights on the Eye. 311-325 - Matthias Kirchner, Rainer Böhme:

Tamper Hiding: Defeating Image Forensics. 326-341 - Mo Chen, Jessica J. Fridrich, Jan Lukás, Miroslav Goljan:

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. 342-358
Steganalysis
- Christian Krätzer, Jana Dittmann:

Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. 359-377 - Kwangsoo Lee, Andreas Westfeld, Sangjin Lee:

Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. 378-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














