Skip to main content
  • Conference proceedings
  • © 2005

Information Hiding

6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3200)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2004.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware)

    1. An Implementation of, and Attacks on, Zero-Knowledge Watermarking

      • Scott Craver, Bede Liu, Wayne Wolf
      Pages 1-12
    2. On the Possibility of Non-invertible Watermarking Schemes

      • Qiming Li, Ee-Chien Chang
      Pages 13-24
  3. Session 2 - Steganalysis Session Chair: Mauro Barni (University of Siena)

    1. Exploiting Preserved Statistics for Steganalysis

      • Rainer Böhme, Andreas Westfeld
      Pages 82-96
    2. An Improved Sample Pairs Method for Detection of LSB Embedding

      • Peizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen
      Pages 116-127
  4. Session 3 - Forensic Applications Session Chair: Scott Craver (Princeton University)

    1. Statistical Tools for Digital Forensics

      • Alin C. Popescu, Hany Farid
      Pages 128-147
    2. Relative Generic Computational Forensic Techniques

      • Jennifer L. Wong, Miodrag Potkonjak
      Pages 148-163
  5. Session 4 - Steganography Session Chair: Andreas Westfeld (Dresden University of Technology)

    1. Syntax and Semantics-Preserving Application-Layer Protocol Steganography

      • Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin
      Pages 164-179
  6. Session 5 - Software Watermarking Session Chair: John McHugh (SEI/CERT)

    1. Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks

      • Christian Collberg, Andrew Huntwork, Edward Carter, Gregg Townsend
      Pages 192-207
    2. Threading Software Watermarks

      • Jasvir Nagra, Clark Thomborson
      Pages 208-223
    3. Soft IP Protection: Watermarking HDL Codes

      • Lin Yuan, Pushkin R. Pari, Gang Qu
      Pages 224-238
  7. Session 6 - Security and Privacy Session Chair: Ross Anderson (University of Cambridge)

    1. Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures

      • Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
      Pages 266-281

Other Volumes

  1. Information Hiding

About this book

It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We would like to thank all authors who submitted their work for consideration. Out of the 70 submisions received by the program committee, 25 papers were accepted for publication based on their novelty, originality, and scientific merit. We strived to achieve a balanced exposition of papers that would represent many different aspects of information hiding. All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content. This year, the workshop included a one-hour rump session that offered an opportunity to the delegates to share their work in progress and other brief but interesting contributions.

Editors and Affiliations

  • Department of Electrical and Computer Engineering, Binghamton University, BINGHAMTON

    Jessica Fridrich

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access