


default search action
7. Information Hiding 2005: Barcelona, Spain
- Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González:

Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3727, Springer 2005, ISBN 3-540-29039-7
Invited Talk
- Neri Merhav:

On Joint Coding for Watermarking and Encryption. 1-10
Anonymity
- George Danezis, Jolyon Clulow:

Compulsion Resistant Anonymous Communications. 11-25 - Marek Klonowski, Miroslaw Kutylowski:

Provable Anonymity for Networks of Mixes. 26-38 - Luke O'Connor:

On Blending Attacks for Mixes with Memory. 39-52 - Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan:

Pervasive Random Beacon in the Internet for Covert Coordination. 53-61 - Ginger Perng, Michael K. Reiter, Chenxi Wang:

Censorship Resistance Revisited. 62-76
Watermarking
- Stéphane Bounkong, Borémi Toch, David Saad

:
Optimal Embedding for Watermarking in Discrete Data Spaces. 77-90 - Vincent Martin, Marie Chabert, Bernard Lacaze:

A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images. 91-105 - Patrick Bas:

A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers. 106-117
Theory
- Aggelos Kiayias, Yona Raekow, Alexander Russell

:
Efficient Steganography with Provable Security Guarantees. 118-130 - Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González:

Information-Theoretic Analysis of Security in Side-Informed Data Hiding. 131-145 - Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. 146-160
Watermark Attacks
- Gwenaël J. Doërr

, Jean-Luc Dugelay:
How to Combat Block Replacement Attacks?. 161-175 - Maciej Liskiewicz, Ulrich Wölfel:

On the Intractability of Inverting Geometric Distortions in Watermarking Schemes. 176-188
Steganography
- Elke Franz, Antje Schneidewind:

Pre-processing for Adding Noise Steganography. 189-203 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:

Efficient Wet Paper Codes. 204-218
Hiding in Unusual Content
- Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah:

Translation-Based Steganography. 219-233 - Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander V. Mamishev:

ID Modulation: Embedding Sensor Data in an RFID Timeseries. 234-246 - Steven J. Murdoch, Stephen Lewis:

Embedding Covert Channels into TCP/IP. 247-261
Steganalysis
- Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen:

Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. 262-277 - Rainer Böhme:

Assessment of Steganalytic Methods Using Multiple Regression Models. 278-295 - Andrew D. Ker:

A General Framework for Structural Steganalysis of LSB Replacement. 296-311 - Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:

New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. 312-326 - Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner:

An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. 327-341
Software Watermarking
- Ginger Myles, Hongxia Jin:

Self-validating Branch-Based Software Watermarking. 342-356 - Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan Kailas

:
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance. 357-371 - Alan J. Larkin, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre:

Dither Modulation Watermarking of Dynamic Memory Traces. 372-386
Fingerprinting
- Kozo Banno, Shingo Orihara, Takaaki Mizuki, Takao Nishizeki:

Best Security Index for Digital Fingerprinting. 398-412

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














