Skip to main content
  • Conference proceedings
  • © 2008

Information Hiding

10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5284)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Anonymity and Privacy

    1. Information Leakage in Optimal Anonymized and Diversified Data

      • Chengfang Fang, Ee-Chien Chang
      Pages 30-44
  3. Steganography I

  4. Forensics

    1. Detecting Re-projected Video

      • Weihong Wang, Hany Farid
      Pages 72-86
    2. Residual Information of Redacted Images Hidden in the Compression Artifacts

      • Nicholas Zhong-Yang Ho, Ee-Chien Chang
      Pages 87-101
  5. Novel Technologies/Applications

    1. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach

      • Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak
      Pages 102-117
    2. Reversible Watermarking with Subliminal Channel

      • Xianfeng Zhao, Ning Li
      Pages 118-131
  6. Watermarking I

    1. Watermarking Security Incorporating Natural Scene Statistics

      • Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim
      Pages 132-146
    2. Block-Chain Based Fragile Watermarking Scheme with Superior Localization

      • Hong-Jie He, Jia-Shu Zhang, Heng-Ming Tai
      Pages 147-160
  7. Steganalysis

    1. Practical Insecurity for Effective Steganalysis

      • Johann Barbier, Stéphanie Alt
      Pages 195-208
  8. Other hiding Domains I

    1. Authorship Proof for Textual Document

      • J. Wu, D. R. Stinson
      Pages 209-223
    2. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words

      • Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng et al.
      Pages 224-235
  9. Steganography II

    1. A Data Mapping Method for Steganography and Its Application to Images

      • Hao-tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung
      Pages 236-250
    2. Benchmarking for Steganography

      • Tomáš Pevný, Jessica Fridrich
      Pages 251-267
  10. Other Hiding Domains II and Network Security

    1. Other Hiding Domains

      1. Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face
        • Csaba Salamon, Jonathan Corney, James Ritchie
        Pages 268-282

Other Volumes

  1. Information Hiding

About this book

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding’s po- tion as the top forum of our community.

Editors and Affiliations

  • Mayachitra Inc., Santa Barbara, USA

    Kaushal Solanki, Kenneth Sullivan

  • Department of Electrical and Computer Engineering, University of California, Santa Barbara, USA

    Upamanyu Madhow

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access