Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers /

Corporate Author: SpringerLink (Online service)
Other Authors: Camenisch, Jan. (Editor, http://id.loc.gov/vocabulary/relators/edt), Collberg, Christian. (Editor, http://id.loc.gov/vocabulary/relators/edt), Johnson, Neil F. (Editor, http://id.loc.gov/vocabulary/relators/edt), Sallee, Phil. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Security and Cryptology ; 4437
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-74124-4
Table of Contents:
  • Hamiltonian Mechanics
  • Natural Watermarking: A Secure Spread Spectrum Technique for WOA
  • An Improved Asymmetric Watermarking System Using Matrix Embedding
  • A Cryptographic Method for Secure Watermark Detection
  • Steganographic Communication in Ordered Channels
  • Analyzing Network-Aware Active Wardens in IPv6
  • Video Watermarking by Using Geometic Warping Without Visible Artifacts
  • Video Watermarking by Using Geometric Warping Without Visible Artifacts
  • Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain
  • Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
  • Noisy Timing Channels with Binary Inputs and Outputs
  • A Computational Model for Watermark Robustness
  • Hiding Information Hiding
  • Reversible Watermarking of NURBS-Based CAD Models
  • A High-Capacity Data Hiding Method for Polygonal Meshes
  • Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television
  • Delayed and Controlled Failures in Tamper-Resistant Software
  • A Model for Self-Modifying Code
  • A Markov Process Based Approach to Effective Attacking JPEG Steganography
  • Batch Steganography and Pooled Steganalysis
  • On Steganographic Embedding Efficiency
  • Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks
  • Modified Matrix Encoding Technique for Minimal Distortion Steganography
  • Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting
  • A Collusion-Resistant Video Watermarking Scheme
  • An Elliptic Curve Backdoor Algorithm for RSASSA
  • A Subliminal-Free Variant of ECDSA.