default search action
13. Information Hiding 2011: Prague, Czech Republic
- Tomás Filler, Tomás Pevný, Scott Craver, Andrew D. Ker:
Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6958, Springer 2011, ISBN 978-3-642-24177-2
Fingerprinting
- Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity for Non-binary Alphabets. 1-13 - Antonino Simone, Boris Skoric:
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes. 14-27 - Peter Meerwald, Teddy Furon:
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm. 28-42 - Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme Based on Tardos Codes. 43-58
Special Session on BOSS Contest
- Patrick Bas, Tomás Filler, Tomás Pevný:
"Break Our Steganographic System": The Ins and Outs of Organizing BOSS. 59-70 - Gokhan Gul, Fatih Kurugollu:
A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO). 71-84 - Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan:
Breaking HUGO - The Process Discovery. 85-101 - Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan:
Steganalysis of Content-Adaptive Steganography in Spatial Domain. 102-117
Anonymity and Privacy
- Gergely Ács, Claude Castelluccia:
I Have a DREAM! (DiffeRentially privatE smArt Metering). 118-132 - Sami Zhioua:
Anonymity Attacks on Mix Systems: A Formal Analysis. 133-147 - George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. 148-162
Steganography and Steganalysis
- Cathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor V. Nikiforov, Lionel Fillatre, Philippe Cornu:
Statistical Decision Methods in Hidden Information Detection. 163-177 - Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor V. Nikiforov, Philippe Cornu:
A Cover Image Model For Reliable Steganalysis. 178-192 - Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Video Steganography with Perturbed Motion Estimation. 193-207
Watermarking
- Patrick Bas:
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching. 208-222 - Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël J. Doërr:
Improving Tonality Measures for Audio Watermarking. 223-237 - Jutta Hämmerle-Uhl, Karl Raab, Andreas Uhl:
Watermarking as a Means to Enhance Biometric Systems: A Critical Survey. 238-254 - Weiming Zhang, Biao Chen, Nenghai Yu:
Capacity-Approaching Codes for Reversible Data Hiding. 255-269
Digital Rights Management and Digital Forensics
- Sebastian Schrittwieser, Stefan Katzenbeisser:
Code Obfuscation against Static and Dynamic Reverse Engineering. 270-284 - Shiyue Lai, Rainer Böhme:
Countering Counter-Forensics: The Case of JPEG Compression. 285-298
Data Hiding in Unusual Content
- Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: A Covert Social Network Botnet. 299-313 - Amir Houmansadr, Nikita Borisov:
CoCo: Coding-Based Covert Timing Channels for Network Flows. 314-328 - Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, Abdelrahman Desoky:
LinL: Lost in n-best List. 329-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.