This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.
The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.
Author(s): Giacomo Cancelli, Mauro Barni (auth.), Teddy Furon, François Cayre, Gwenaël Doërr, Patrick Bas (eds.)
Series: Lecture Notes in Computer Science 4567 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 396
Tags: Data Encryption; Management of Computing and Information Systems; Computers and Society; Information Systems Applications (incl.Internet); Systems and Data Security; Computer Communication Networks
Front Matter....Pages -
MPSteg-color: A New Steganographic Technique for Color Images....Pages 1-15
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis....Pages 16-31
Steganographic Communication with Quantum Information....Pages 32-49
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation....Pages 50-64
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization....Pages 65-79
A Graph Game Model for Software Tamper Protection....Pages 80-95
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection....Pages 96-111
Space-Efficient Kleptography Without Random Oracles....Pages 112-129
How Can Reed-Solomon Codes Improve Steganographic Schemes?....Pages 130-144
Reducing the Complexity of Syndrome Coding for Embedding....Pages 145-158
Exploiting Security Holes in Lattice Data Hiding....Pages 159-173
Practical Security Analysis of Dirty Paper Trellis Watermarking....Pages 174-188
Security of Invertible Media Authentication Schemes Revisited....Pages 189-203
A Fusion of Maximum Likelihood and Structural Steganalysis....Pages 204-219
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System....Pages 220-236
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction....Pages 237-251
Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio....Pages 252-266
A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization....Pages 267-278
Optimization of Tardos’s Fingerprinting Codes in a Viewpoint of Memory Amount....Pages 279-293
Combining Tardos Fingerprinting Codes and Fingercasting....Pages 294-310
Exposing Digital Forgeries Through Specular Highlights on the Eye....Pages 311-325
Tamper Hiding: Defeating Image Forensics....Pages 326-341
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries....Pages 342-358
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification....Pages 359-377
Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding....Pages 378-391
Back Matter....Pages -