Skip to main content

Information Hiding

10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

  • Conference proceedings
  • © 2008

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5284)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: IH 2008.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (25 papers)

  1. Anonymity and Privacy

  2. Steganography I

  3. Forensics

  4. Novel Technologies/Applications

  5. Watermarking I

  6. Steganalysis

  7. Other hiding Domains I

  8. Steganography II

  9. Other Hiding Domains II and Network Security

    1. Other Hiding Domains

Other volumes

  1. Information Hiding

Keywords

About this book

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding’s po- tion as the top forum of our community.

Editors and Affiliations

  • Mayachitra Inc., Santa Barbara, USA

    Kaushal Solanki, Kenneth Sullivan

  • Department of Electrical and Computer Engineering, University of California, Santa Barbara, USA

    Upamanyu Madhow

Bibliographic Information

Publish with us