


default search action
10. Information Hiding 2008: Santa Barbara, CA, USA
- Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow:

Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5284, Springer 2008, ISBN 978-3-540-88960-1
Anonymity and Privacy
- Takashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako:

A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. 1-14 - Fernando Esponda:

Hiding a Needle in a Haystack Using Negative Databases. 15-29 - Chengfang Fang, Ee-Chien Chang:

Information Leakage in Optimal Anonymized and Diversified Data. 30-44
Steganography I
- Andrew D. Ker:

Perturbation Hiding and the Batch Steganography Problem. 45-59 - Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. 60-71
Forensics
- Weihong Wang, Hany Farid:

Detecting Re-projected Video. 72-86 - Nicholas Zhong-Yang Ho, Ee-Chien Chang:

Residual Information of Redacted Images Hidden in the Compression Artifacts. 87-101
Novel Technologies/Applications
- Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak:

Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. 102-117 - Xianfeng Zhao

, Ning Li:
Reversible Watermarking with Subliminal Channel. 118-131
Watermarking I
- Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:

Watermarking Security Incorporating Natural Scene Statistics. 132-146 - Hongjie He, Jiashu Zhang, Heng-Ming Tai:

Block-Chain Based Fragile Watermarking Scheme with Superior Localization. 147-160
Steganalysis
- Andreas Westfeld:

Generic Adoption of Spatial Steganalysis to Transformed Domain. 161-177 - Rainer Böhme:

Weighted Stego-Image Steganalysis for JPEG Covers. 178-194 - Johann Barbier, Stéphanie Alt:

Practical Insecurity for Effective Steganalysis. 195-208
Other hiding Domains I
- Jiang Wu, Douglas R. Stinson:

Authorship Proof for Textual Document. 209-223 - Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, Xinxin Zhao:

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. 224-235
Steganography II
- Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung:

A Data Mapping Method for Steganography and Its Application to Images. 236-250 - Tomás Pevný

, Jessica J. Fridrich:
Benchmarking for Steganography. 251-267
Other Hiding Domains
- Csaba Salamon, Jonathan R. Corney, James M. Ritchie:

Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face. 268-282 - Scott Craver, Enping Li, Jun Yu, Idris M. Atakli:

A Supraliminal Channel in a Videoconferencing Application. 283-293
Network Security
- Vinayak Kandiah, Dijiang Huang

, Harsh Kapoor:
C-Mix: A Lightweight Anonymous Routing Approach. 294-308
Watermarking II
- Xianfeng Zhao

, Bingbing Xia, Yi Deng:
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. 309-324 - Benjamin Mathon

, Patrick Bas, François Cayre, Fernando Pérez-González:
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. 325-340
Fingerprinting
- Teddy Furon, Arnaud Guyader, Frédéric Cérou:

On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. 341-356 - Minoru Kuribayashi

, Masakatu Morii:
Iterative Detection Method for CDMA-Based Fingerprinting Scheme. 357-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














