Skip to main content
  • Conference proceedings
  • © 2009

Information Hiding

11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5806)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Steganography

    1. Fisher Information Determines Capacity of ε-Secure Steganography

      • Tomáš Filler, Jessica Fridrich
      Pages 31-47
    2. Fast BCH Syndrome Coding for Steganography

      • Rongyue Zhang, Vasiliy Sachnev, Hyoung Joong Kim
      Pages 48-58
  3. Steganalysis

    1. Embedding Ratio Estimating for Each Bit Plane of Image

      • Chunfang Yang, Xiangyang Luo, Fenlin Liu
      Pages 59-72
  4. Watermarking

    1. A Phase Modulation Audio Watermarking Technique

      • Michael Arnold, Peter G. Baum, Walter Voeßing
      Pages 102-116
    2. Forensic Tracking Watermarking against In-theater Piracy

      • Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
      Pages 117-131
    3. Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization

      • Hong-Jie He, Jia-Shu Zhang, Heng-Ming Tai
      Pages 132-145
    4. Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain

      • Sascha Zmudzinski, Martin Steinebach
      Pages 146-160
  5. Fingerprinting

    1. Estimating the Minimal Length of Tardos Code

      • Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou
      Pages 176-190
  6. Hiding in Unusual Content, Novel Applications

    1. Roughness-Adaptive 3D Watermarking of Polygonal Meshes

      • Kwangtaek Kim, Mauro Barni, Hong Z. Tan
      Pages 191-205
    2. SVD-Based Ghost Circuitry Detection

      • Michael Nelson, Ani Nahapetian, Farinaz Koushanfar, Miodrag Potkonjak
      Pages 221-234
  7. Forensics

    1. Microphone Classification Using Fourier Coefficients

      • Robert Buchholz, Christian Kraetzer, Jana Dittmann
      Pages 235-246
    2. Detect Digital Image Splicing with Visual Cues

      • Zhenhua Qu, Guoping Qiu, Jiwu Huang
      Pages 247-261
    3. Feature-Based Camera Model Identification Works in Practice

      • Thomas Gloe, Karsten Borowka, Antje Winkler
      Pages 262-276

Other Volumes

  1. Information Hiding

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Editors and Affiliations

  • Security Engineering Group, Technische Universität Darmstadt, Darmstadt, Germany

    Stefan Katzenbeisser

  • Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany

    Ahmad-Reza Sadeghi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access