Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.

The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Author(s): Heather Crawford, John Aycock (auth.), Stefan Katzenbeisser, Ahmad-Reza Sadeghi (eds.)
Series: Lecture Notes in Computer Science 5806 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 277
Tags: Data Encryption; Data Storage Representation; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Systems and Data Security; Legal Aspects of Computing

Front Matter....Pages -
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles....Pages 1-14
An Epistemological Approach to Steganography....Pages 15-30
Fisher Information Determines Capacity of ε -Secure Steganography....Pages 31-47
Fast BCH Syndrome Coding for Steganography....Pages 48-58
Embedding Ratio Estimating for Each Bit Plane of Image....Pages 59-72
Estimating Steganographic Fisher Information in Real Images....Pages 73-88
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2....Pages 89-101
A Phase Modulation Audio Watermarking Technique....Pages 102-116
Forensic Tracking Watermarking against In-theater Piracy....Pages 117-131
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization....Pages 132-145
Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain....Pages 146-160
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive....Pages 161-175
Estimating the Minimal Length of Tardos Code....Pages 176-190
Roughness-Adaptive 3D Watermarking of Polygonal Meshes....Pages 191-205
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions....Pages 206-220
SVD-Based Ghost Circuitry Detection....Pages 221-234
Microphone Classification Using Fourier Coefficients....Pages 235-246
Detect Digital Image Splicing with Visual Cues....Pages 247-261
Feature-Based Camera Model Identification Works in Practice....Pages 262-276
Back Matter....Pages -