default search action
6. Information Hiding 2004: Toronto, Canada
- Jessica J. Fridrich:
Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3200, Springer 2004, ISBN 3-540-24207-4
Digital Media Watermarking
- Scott Craver, Bede Liu, Wayne H. Wolf:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking. 1-12 - Qiming Li, Ee-Chien Chang:
On the Possibility of Non-invertible Watermarking Schemes. 13-24 - Dariusz Bogumil:
Reversing Global and Local Geometrical Distortions in Image Watermarking. 25-37 - Wei Sun, En-Hui Yang:
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems. 38-51 - Andrea Abrardo, Mauro Barni:
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking. 52-66
Steganalysis
- Jessica J. Fridrich:
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. 67-81 - Rainer Böhme, Andreas Westfeld:
Exploiting Preserved Statistics for Steganalysis. 82-96 - Andrew D. Ker:
Improved Detection of LSB Steganography in Grayscale Images. 97-115 - Peizhong Lu, Xiangyang Luo, Qingyang Tang, Shen Li:
An Improved Sample Pairs Method for Detection of LSB Embedding. 116-127
Forensic Applications
- Alin C. Popescu, Hany Farid:
Statistical Tools for Digital Forensics. 128-147 - Jennifer L. Wong, Miodrag Potkonjak:
Relative Generic Computational Forensic Techniques. 148-163
Steganography
- Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin:
Syntax and Semantics-Preserving Application-Layer Protocol Steganography. 164-179 - Igor A. Bolshakov:
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy. 180-191
Software Watermarking
- Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend:
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. 192-207 - Jasvir Nagra, Clark D. Thomborson:
Threading Software Watermarks. 208-223 - Lin Yuan, Pushkin R. Pari, Gang Qu:
Soft IP Protection: Watermarking HDL Codes. 224-238
Security and Privacy
- Markus G. Kuhn:
An Asymmetric Security Mechanism for Navigation Signals. 239-252 - Jae-Gwi Choi, Ji-Hwan Park, Ki-Ryong Kwon:
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme. 253-265 - Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. 266-281 - Hirofumi Muratani:
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. 282-292
Anonymity
- George Danezis, Andrei Serjantov:
Statistical Disclosure or Intersection Attacks on Anonymity Systems. 293-308 - Claudia Díaz, Bart Preneel:
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. 309-325 - Dogan Kesdogan, Lexi Pimenidis:
The Hitting Set Attack on Anonymity Protocols. 326-339
Data Hiding in Unusual Content
- Lin Yuan, Gang Qu:
Information Hiding in Finite State Machine. 340-354 - Steven J. Murdoch, Piotr Zielinski:
Covert Channels for Collusion in Online Computer Games. 355-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.