This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005.
The 28 revised full papers presented together with an invited talk were
carefully selected from 90 papers submitted. The papers are organized in topical sections on anonymity, watermarking, theory, watermark attacks, steganography, hiding in unusual content, steganalysis, software watermarking, and fingerprinting.
Author(s): Neri Merhav (auth.), Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González (eds.)
Series: Lecture Notes in Computer Science 3727 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 420
Tags: Data Encryption; Management of Computing and Information Systems; Computers and Society; Information Systems Applications (incl.Internet); Multimedia Information Systems; Computer Communication Networks
Front Matter....Pages -
On Joint Coding for Watermarking and Encryption....Pages 1-10
Compulsion Resistant Anonymous Communications....Pages 11-25
Provable Anonymity for Networks of Mixes....Pages 26-38
On Blending Attacks for Mixes with Memory....Pages 39-52
Pervasive Random Beacon in the Internet for Covert Coordination....Pages 53-61
Censorship Resistance Revisited....Pages 62-76
Optimal Embedding for Watermarking in Discrete Data Spaces....Pages 77-90
A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images....Pages 91-105
A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers....Pages 106-117
Efficient Steganography with Provable Security Guarantees....Pages 118-130
Information-Theoretic Analysis of Security in Side-Informed Data Hiding....Pages 131-145
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis....Pages 146-160
How to Combat Block Replacement Attacks?....Pages 161-175
On the Intractability of Inverting Geometric Distortions in Watermarking Schemes....Pages 176-188
Pre-processing for Adding Noise Steganography....Pages 189-203
Efficient Wet Paper Codes....Pages 204-218
Translation-Based Steganography....Pages 219-233
ID Modulation: Embedding Sensor Data in an RFID Timeseries....Pages 234-246
Embedding Covert Channels into TCP/IP....Pages 247-261
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions....Pages 262-277
Assessment of Steganalytic Methods Using Multiple Regression Models....Pages 278-295
A General Framework for Structural Steganalysis of LSB Replacement....Pages 296-311
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography....Pages 312-326
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography....Pages 327-341
Self-validating Branch-Based Software Watermarking....Pages 342-356
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance....Pages 357-371
Dither Modulation Watermarking of Dynamic Memory Traces....Pages 372-386
A Family of Collusion 2-Secure Codes....Pages 387-397
Best Security Index for Digital Fingerprinting....Pages 398-412
Back Matter....Pages -