Skip to main content
  • Conference proceedings
  • © 2005

Information Hiding

7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3727)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Invited Talk

  3. Anonymity

    1. Compulsion Resistant Anonymous Communications

      • George Danezis, Jolyon Clulow
      Pages 11-25
    2. Provable Anonymity for Networks of Mixes

      • Marek Klonowski, Mirosław Kutyłowski
      Pages 26-38
    3. On Blending Attacks for Mixes with Memory

      • Luke O’Connor
      Pages 39-52
    4. Pervasive Random Beacon in the Internet for Covert Coordination

      • Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan
      Pages 53-61
    5. Censorship Resistance Revisited

      • Ginger Perng, Michael K. Reiter, Chenxi Wang
      Pages 62-76
  4. Theory

    1. Efficient Steganography with Provable Security Guarantees

      • Aggelos Kiayias, Yona Raekow, Alexander Russell
      Pages 118-130
    2. Information-Theoretic Analysis of Security in Side-Informed Data Hiding

      • Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González
      Pages 131-145
    3. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

      • Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
      Pages 146-160
  5. Watermark Attacks

    1. How to Combat Block Replacement Attacks?

      • Gwenaël Doërr, Jean-Luc Dugelay
      Pages 161-175
  6. Steganography

    1. Pre-processing for Adding Noise Steganography

      • Elke Franz, Antje Schneidewind
      Pages 189-203
    2. Efficient Wet Paper Codes

      • Jessica Fridrich, Miroslav Goljan, David Soukal
      Pages 204-218
  7. Hiding in Unusual Content

    1. Translation-Based Steganography

      • Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail Atallah
      Pages 219-233
    2. ID Modulation: Embedding Sensor Data in an RFID Timeseries

      • Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Philipose, Kishore Sundara-Rajan, Alexander Mamishev
      Pages 234-246
    3. Embedding Covert Channels into TCP/IP

      • Steven J. Murdoch, Stephen Lewis
      Pages 247-261

Other Volumes

  1. Information Hiding

Editors and Affiliations

  • Dipartimento di Ingegneria dell’Informazione, Università degli Studi di Siena, Italy

    Mauro Barni

  • Universitat Oberta de Catalunya, Barcelona, Spain

    Jordi Herrera-Joancomartí

  • Philips Research Europe, Information and System Security, Eindhoven, The Netherlands

    Stefan Katzenbeisser

  • Departamento de Teoría de la Señal y Comunicaciones ETSI Telecom., Universidad de Vigo, Vigo,  

    Fernando Pérez-González

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access