


Остановите войну!
for scientists:


default search action
10. Information Hiding 2008: Santa Barbara, CA, USA
- Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow:
Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5284, Springer 2008, ISBN 978-3-540-88960-1
Anonymity and Privacy
- Takashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako:
A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. 1-14 - Fernando Esponda:
Hiding a Needle in a Haystack Using Negative Databases. 15-29 - Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. 30-44
Steganography I
- Andrew D. Ker:
Perturbation Hiding and the Batch Steganography Problem. 45-59 - Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. 60-71
Forensics
- Weihong Wang, Hany Farid:
Detecting Re-projected Video. 72-86 - Nicholas Zhong-Yang Ho, Ee-Chien Chang:
Residual Information of Redacted Images Hidden in the Compression Artifacts. 87-101
Novel Technologies/Applications
- Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak:
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. 102-117 - Xianfeng Zhao
, Ning Li:
Reversible Watermarking with Subliminal Channel. 118-131
Watermarking I
- Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:
Watermarking Security Incorporating Natural Scene Statistics. 132-146 - Hongjie He, Jiashu Zhang, Heng-Ming Tai:
Block-Chain Based Fragile Watermarking Scheme with Superior Localization. 147-160
Steganalysis
- Andreas Westfeld:
Generic Adoption of Spatial Steganalysis to Transformed Domain. 161-177 - Rainer Böhme:
Weighted Stego-Image Steganalysis for JPEG Covers. 178-194 - Johann Barbier, Stéphanie Alt:
Practical Insecurity for Effective Steganalysis. 195-208
Other hiding Domains I
- Jiang Wu, Douglas R. Stinson:
Authorship Proof for Textual Document. 209-223 - Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, Xinxin Zhao:
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. 224-235
Steganography II
- Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung:
A Data Mapping Method for Steganography and Its Application to Images. 236-250 - Tomás Pevný
, Jessica J. Fridrich:
Benchmarking for Steganography. 251-267
Other Hiding Domains
- Csaba Salamon, Jonathan R. Corney, James M. Ritchie:
Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face. 268-282 - Scott Craver, Enping Li, Jun Yu, Idris M. Atakli:
A Supraliminal Channel in a Videoconferencing Application. 283-293
Network Security
- Vinayak Kandiah, Dijiang Huang
, Harsh Kapoor:
C-Mix: A Lightweight Anonymous Routing Approach. 294-308
Watermarking II
- Xianfeng Zhao
, Bingbing Xia, Yi Deng:
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. 309-324 - Benjamin Mathon
, Patrick Bas, François Cayre, Fernando Pérez-González:
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. 325-340
Fingerprinting
- Teddy Furon, Arnaud Guyader, Frédéric Cérou:
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. 341-356 - Minoru Kuribayashi
, Masakatu Morii:
Iterative Detection Method for CDMA-Based Fingerprinting Scheme. 357-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.