default search action
14. Information Hiding 2012: Berkeley, CA, USA
- Matthias Kirchner, Dipak Ghosal:
Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7692, Springer 2013, ISBN 978-3-642-36372-6
Multimedia Forensics and Counter-Forensics
- Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang:
Blind Median Filtering Detection Using Statistics in Difference Domain. 1-15 - Wei-Hong Chuang, Min Wu:
Robustness of Color Interpolation Identification against Anti-forensic Operations. 16-30
Steganalyis
- Jessica J. Fridrich, Jan Kodovský:
Steganalysis of LSB Replacement Using Parity-Aware Features. 31-45 - Rémi Cogranne, Cathel Zitzmann, Florent Retraint, Igor V. Nikiforov, Lionel Fillatre, Philippe Cornu:
Statistical Detection of LSB Matching Using Hypothesis Testing Theory. 46-62 - Yun Q. Shi, Patchara Sutthiwan, Licong Chen:
Textural Features for Steganalysis. 63-77 - Jan Kodovský, Jessica J. Fridrich:
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. 78-93
Data Hiding in Unusual Content
- Yi-Liu Chao, Daniel G. Aliaga:
Hiding a Second Appearance in a Physical Relief Surface. 94-109 - Ling Du, Xiaochun Cao, Muhua Zhang, Huazhu Fu:
Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data. 110-124
Steganography
- Pascal Schöttle, Rainer Böhme:
A Game-Theoretic Approach to Content-Adaptive Steganography. 125-141 - Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Key-Efficient Steganography. 142-159
Covert Channels
- Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
Secret Agent Radio: Covert Communication through Dirty Constellations. 160-175
Anonymity and Privacy
- Aggelos Kiayias, Katerina Samari:
Lower Bounds for Private Broadcast Encryption. 176-190 - George Danezis, Emilia Käsper:
The Dangers of Composing Anonymous Channels. 191-206
Watermarking
- Teddy Furon, Patrick Bas:
A New Measure of Watermarking Security Applied on QIM. 207-223 - Shijun Xiang:
Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. 224-239 - Peijia Zheng, Jiwu Huang:
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. 240-254
Fingerprinting
- Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity in the Combined Digit Model. 255-268 - Minoru Kuribayashi:
Bias Equalizer for Binary Probabilistic Fingerprinting Codes. 269-283
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.