Omschrijving
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.
The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels. This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels. Hamiltonian Mechanics
Natural Watermarking: A Secure Spread Spectrum Technique for WOA
1
Patrick Bas and Fran s Cayre
An Improved Asymmetric Watermarking System Using Matrix Embedding
15
Scott Craver
A Cryptographic Method for Secure Watermark Detection
26
Michael Malkin and Ton Kalker
Steganographic Communication in Ordered Channels
42
R.C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu Rangan, and R. Sundaram
Analyzing Network-Aware Active Wardens in IPv6
58
Grzegorz Lewandowski, Norka B. Lucena, and Steve J. Chapin
Video Watermarking by Using Geometic Warping Without Visible Artifacts
Video Watermarking by Using Geometric Warping Without Visible Artifacts
78
Dima Pr frock, Mathias Schlauweg, and Erika M ller
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain
93
Shijun Xiang, Jiwu Huang, and Rui Yang
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
109
Richard Bergmair and Stefan Katzenbeisser
Noisy Timing Channels with Binary Inputs and Outputs
124
Keye Martin and Ira S. Moskowitz
A Computational Model for Watermark Robustness
145
Andr delsbach, Stefan Katzenbeisser, and Ahmad-Reza Sadeghi
Hiding Information Hiding
161
Adam Young and Moti Yung
Reversible Watermarking of NURBS-Based CAD Models
172
Wolfgang Funk
A High-Capacity Data Hiding Method for Polygonal Meshes
188
Hao-tian Wu and Yiu-ming Cheung
Steganography for Radio Amateurs A DSSS Based Approach for Slow Scan Television
201
Andreas Westfeld
Delayed and Controlled Failures in Tamper-Resistant Software
216
Gang Tan, Yuqun Chen, and Mariusz H. Jakubowski
A Model for Self-Modifying Code
232
Bertrand Anckaert, Matias Madou, and Koen De Bosschere
A Markov Process Based Approach to Effective Attacking JPEG Steganography
249
Yun Q. Shi, Chunhua Chen, and Wen Chen
Batch Steganography and Pooled Steganalysis
265
Andrew D. Ker
On Steganographic Embedding Efficiency
282
Jessica Fridrich, Petr Lisonek, and David Soukal
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks
297
Tri Van Le and Kaoru Kurosawa
Modified Matrix Encoding Technique for Minimal Distortion Steganography
314
Younhee Kim, Zoran Duric, and Dana Richards
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting
328
Jae-Min Seol and Seong-Whan Kim
A Collusion-Resistant Video Watermarking Scheme
343
Amir Houmansadr and Shahrokh Ghaemmaghami
An Elliptic Curve Backdoor Algorithm for RSASSA
355
Adam Young and Moti Yung
A Subliminal-Free Variant of ECDSA
375
Jens-Matthias Bohli, Maria Isabel Gonz z Vasco, and Rainer Steinwandt
Author Index
389