Information Hiding
11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Herausgegeben:Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
Information Hiding
11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Herausgegeben:Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
- Digital-Forensics and Watermarking37,99 €
- Digital Forensics and Watermarking37,99 €
- Teddy Furon / François Cayre / Gwenaël DoërrG / Patrick Bas (eds.)Information Hiding40,99 €
- Jan Camenisch / Christian Collberg / Neil F. Johnson / Phil Sallee (eds.)Information Hiding40,99 €
- Transactions on Data Hiding and Multimedia Security I40,99 €
- Yun Q. Shi (Volume ed.)Transactions on Data Hiding and Multimedia Security III40,99 €
- Fabien A. P. Petitcolas (ed.)Information Hiding40,99 €
-
-
-
- Produktdetails
- Lecture Notes in Computer Science 5806
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12760275, 978-3-642-04430-4
- 2009
- Seitenzahl: 288
- Erscheinungstermin: 23. September 2009
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 441g
- ISBN-13: 9783642044304
- ISBN-10: 3642044301
- Artikelnr.: 26986735
- Lecture Notes in Computer Science 5806
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12760275, 978-3-642-04430-4
- 2009
- Seitenzahl: 288
- Erscheinungstermin: 23. September 2009
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 441g
- ISBN-13: 9783642044304
- ISBN-10: 3642044301
- Artikelnr.: 26986735
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
An Epistemological Approach to Steganography.
Fisher Information Determines Capacity of ?
Secure Steganography.
Fast BCH Syndrome Coding for Steganography.
Steganalysis.
Embedding Ratio Estimating for Each Bit Plane of Image.
Estimating Steganographic Fisher Information in Real Images.
Watermarking.
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS
2.
A Phase Modulation Audio Watermarking Technique.
Forensic Tracking Watermarking against In
theater Piracy.
Self
recovery Fragile Watermarking Using Block
Neighborhood Tampering Characterization.
Perception
Based Audio Authentication Watermarking in the Time
Frequency Domain.
Fingerprinting.
An Improvement of Short 2
Secure Fingerprint Codes Strongly Avoiding False
Positive.
Estimating the Minimal Length of Tardos Code.
Hiding in Unusual Content, Novel Applications.
Roughness
Adaptive 3D Watermarking of Polygonal Meshes.
Hardware
Based Public
Key Cryptography with Public Physically Unclonable Functions.
SVD
Based Ghost Circuitry Detection.
Forensics.
Microphone Classification Using Fourier Coefficients.
Detect Digital Image Splicing with Visual Cues.
Feature
Based Camera Model Identification Works in Practice.
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
An Epistemological Approach to Steganography.
Fisher Information Determines Capacity of ?
Secure Steganography.
Fast BCH Syndrome Coding for Steganography.
Steganalysis.
Embedding Ratio Estimating for Each Bit Plane of Image.
Estimating Steganographic Fisher Information in Real Images.
Watermarking.
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS
2.
A Phase Modulation Audio Watermarking Technique.
Forensic Tracking Watermarking against In
theater Piracy.
Self
recovery Fragile Watermarking Using Block
Neighborhood Tampering Characterization.
Perception
Based Audio Authentication Watermarking in the Time
Frequency Domain.
Fingerprinting.
An Improvement of Short 2
Secure Fingerprint Codes Strongly Avoiding False
Positive.
Estimating the Minimal Length of Tardos Code.
Hiding in Unusual Content, Novel Applications.
Roughness
Adaptive 3D Watermarking of Polygonal Meshes.
Hardware
Based Public
Key Cryptography with Public Physically Unclonable Functions.
SVD
Based Ghost Circuitry Detection.
Forensics.
Microphone Classification Using Fourier Coefficients.
Detect Digital Image Splicing with Visual Cues.
Feature
Based Camera Model Identification Works in Practice.