An edition of Information Hiding (2013)

Information Hiding

14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
December 25, 2021 | History
An edition of Information Hiding (2013)

Information Hiding

14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012.The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.

Publish Date
Language
English
Pages
285

Buy this book

Previews available in: English

Edition Availability
Cover of: Information Hiding
Information Hiding: 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
2013, Springer Berlin Heidelberg, Imprint: Springer
electronic resource : in English
Cover of: Information Hiding

Add another edition?

Book Details


Table of Contents

Multimedia Forensics and Counter-Forensics
Blind Median Filtering Detection Using Statistics in Difference Domain
Robustness of Color Interpolation Identification against Anti-forensic Operations
Steganalyis
Steganalysis of LSB Replacement Using Parity-Aware Features
Statistical Detection of LSB Matching Using Hypothesis Testing Theory
Textural Features for Steganalysis
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts
Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface
Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data
Steganography A Game-Theoretic Approach to Content-Adaptive Steganography
Key-Efficient Steganography
Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations
Anonymity and Privacy Lower Bounds for Private Broadcast Encryption
The Dangers of Composing Anonymous Channels
Watermarking A New Measure of Watermarking Security Applied on QIM
Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking
Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model
Bias Equalizer for Binary Probabilistic Fingerprinting Codes.

Edition Notes

Published in
Berlin, Heidelberg
Series
Lecture Notes in Computer Science -- 7692

Classifications

Dewey Decimal Class
005.82
Library of Congress
QA76.9.A25, QA75.5-76.95

The Physical Object

Format
[electronic resource] :
Pagination
X, 285 p. 100 illus.
Number of pages
285

ID Numbers

Open Library
OL27045427M
Internet Archive
informationhidin00chen
ISBN 13
9783642363733

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
December 25, 2021 Edited by ImportBot import existing book
August 24, 2020 Edited by ImportBot import existing book
July 1, 2019 Created by MARC Bot Imported from Internet Archive item record