Login / Signup
Information Hiding
1996
2002
2006
2013
1996
2013
Keyphrases
Publications
volume 7692, 2013
Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
Information Hiding
7692 (2013)
2012
Yi-Liu Chao
,
Daniel G. Aliaga
Hiding a Second Appearance in a Physical Relief Surface.
Information Hiding
(2012)
Wei-Hong Chuang
,
Min Wu
Robustness of Color Interpolation Identification against Anti-forensic Operations.
Information Hiding
(2012)
Aggelos Kiayias
,
Katerina Samari
Lower Bounds for Private Broadcast Encryption.
Information Hiding
(2012)
Aveek Dutta
,
Dola Saha
,
Dirk Grunwald
,
Douglas C. Sicker
Secret Agent Radio: Covert Communication through Dirty Constellations.
Information Hiding
(2012)
Yun Q. Shi
,
Patchara Sutthiwan
,
Licong Chen
Textural Features for Steganalysis.
Information Hiding
(2012)
George Danezis
,
Emilia Käsper
The Dangers of Composing Anonymous Channels.
Information Hiding
(2012)
Rémi Cogranne
,
Cathel Zitzmann
,
Florent Retraint
,
Igor V. Nikiforov
,
Lionel Fillatre
,
Philippe Cornu
Statistical Detection of LSB Matching Using Hypothesis Testing Theory.
Information Hiding
(2012)
Peijia Zheng
,
Jiwu Huang
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking.
Information Hiding
(2012)
Dion Boesten
,
Boris Skoric
Asymptotic Fingerprinting Capacity in the Combined Digit Model.
Information Hiding
(2012)
Pascal Schöttle
,
Rainer Böhme
A Game-Theoretic Approach to Content-Adaptive Steganography.
Information Hiding
(2012)
Chenglong Chen
,
Jiangqun Ni
,
Rongbin Huang
,
Jiwu Huang
Blind Median Filtering Detection Using Statistics in Difference Domain.
Information Hiding
(2012)
Shijun Xiang
Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking.
Information Hiding
(2012)
Aggelos Kiayias
,
Alexander Russell
,
Narasimha Shashidhar
Key-Efficient Steganography.
Information Hiding
(2012)
Jan Kodovský
,
Jessica J. Fridrich
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts.
Information Hiding
(2012)
Ling Du
,
Xiaochun Cao
,
Muhua Zhang
,
Huazhu Fu
Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data.
Information Hiding
(2012)
Jessica J. Fridrich
,
Jan Kodovský
Steganalysis of LSB Replacement Using Parity-Aware Features.
Information Hiding
(2012)
Teddy Furon
,
Patrick Bas
A New Measure of Watermarking Security Applied on QIM.
Information Hiding
(2012)
Minoru Kuribayashi
Bias Equalizer for Binary Probabilistic Fingerprinting Codes.
Information Hiding
(2012)
2011
Ana Charpentier
,
Caroline Fontaine
,
Teddy Furon
,
Ingemar J. Cox
An Asymmetric Fingerprinting Scheme Based on Tardos Codes.
Information Hiding
(2011)
Gergely Ács
,
Claude Castelluccia
I Have a DREAM! (DiffeRentially privatE smArt Metering).
Information Hiding
(2011)
Shishir Nagaraja
,
Amir Houmansadr
,
Pratch Piyawongwisal
,
Vijit Singh
,
Pragya Agarwal
,
Nikita Borisov
Stegobot: A Covert Social Network Botnet.
Information Hiding
(2011)
Jessica J. Fridrich
,
Jan Kodovský
,
Vojtech Holub
,
Miroslav Goljan
Steganalysis of Content-Adaptive Steganography in Spatial Domain.
Information Hiding
(2011)
Rémi Cogranne
,
Cathel Zitzmann
,
Lionel Fillatre
,
Florent Retraint
,
Igor V. Nikiforov
,
Philippe Cornu
A Cover Image Model For Reliable Steganalysis.
Information Hiding
(2011)
Cathel Zitzmann
,
Rémi Cogranne
,
Florent Retraint
,
Igor V. Nikiforov
,
Lionel Fillatre
,
Philippe Cornu
Statistical Decision Methods in Hidden Information Detection.
Information Hiding
(2011)
Jutta Hämmerle-Uhl
,
Karl Raab
,
Andreas Uhl
Watermarking as a Means to Enhance Biometric Systems: A Critical Survey.
Information Hiding
(2011)
Patrick Bas
,
Tomás Filler
,
Tomás Pevný
"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Information Hiding
(2011)
Sebastian Schrittwieser
,
Stefan Katzenbeisser
Code Obfuscation against Static and Dynamic Reverse Engineering.
Information Hiding
(2011)
Michael Arnold
,
Xiao-Ming Chen
,
Peter G. Baum
,
Gwenaël J. Doërr
Improving Tonality Measures for Audio Watermarking.
Information Hiding
(2011)
Peng Meng
,
Yun-Qing Shi
,
Liusheng Huang
,
Zhili Chen
,
Wei Yang
,
Abdelrahman Desoky
LinL: Lost in n-best List.
Information Hiding
(2011)
Dion Boesten
,
Boris Skoric
Asymptotic Fingerprinting Capacity for Non-binary Alphabets.
Information Hiding
(2011)
Gokhan Gul
,
Fatih Kurugollu
A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO).
Information Hiding
(2011)
Sami Zhioua
Anonymity Attacks on Mix Systems: A Formal Analysis.
Information Hiding
(2011)
Shiyue Lai
,
Rainer Böhme
Countering Counter-Forensics: The Case of JPEG Compression.
Information Hiding
(2011)
Weiming Zhang
,
Biao Chen
,
Nenghai Yu
Capacity-Approaching Codes for Reversible Data Hiding.
Information Hiding
(2011)
Jessica J. Fridrich
,
Jan Kodovský
,
Vojtech Holub
,
Miroslav Goljan
Breaking HUGO - The Process Discovery.
Information Hiding
(2011)
Antonino Simone
,
Boris Skoric
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes.
Information Hiding
(2011)
Patrick Bas
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching.
Information Hiding
(2011)
George Danezis
,
Markulf Kohlweiss
,
Alfredo Rial
Differentially Private Billing with Rebates.
Information Hiding
(2011)
Peter Meerwald
,
Teddy Furon
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm.
Information Hiding
(2011)
Yun Cao
,
Xianfeng Zhao
,
Dengguo Feng
,
Rennong Sheng
Video Steganography with Perturbed Motion Estimation.
Information Hiding
(2011)
Amir Houmansadr
,
Nikita Borisov
CoCo: Coding-Based Covert Timing Channels for Network Flows.
Information Hiding
(2011)
volume 6958, 2011
Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers
Information Hiding
6958 (2011)
2010
Farinaz Koushanfar
,
Azalia Mirhoseini
,
Yousra Alkabani
A Unified Submodular Framework for Multimodal IC Trojan Detection.
Information Hiding
(2010)
Jian Cao
,
Jiwu Huang
,
Jiangqun Ni
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Information Hiding
(2010)
Tomás Pevný
,
Tomás Filler
,
Patrick Bas
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Information Hiding
(2010)
Boris Skoric
Security with Noisy Data - (Extended Abstract of Invited Talk).
Information Hiding
(2010)
Jennifer L. Davidson
,
Jaikishan Jalan
Steganalysis Using Partially Ordered Markov Models.
Information Hiding
(2010)
Andrew D. Ker
The Square Root Law in Stegosystems with Imperfect Information.
Information Hiding
(2010)
volume 6387, 2010
Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers
Information Hiding
6387 (2010)