This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005.
Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations.
This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012.
For a more exact treatment of the concept of steganographic security, the reader is referred to [1–3]. The ability to detect ... [4] give a theoretical analysis of the maximal safe bit-rate for LSB embedding in the spatial domain.
This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background.
This book demonstrates a working knowledge of watermarking’s pros and cons, and the legal implications of watermarking and copyright issues on the Internet.
Portable acoustic caption decoder using IH techniques for enhancing lives of the people who are deaf or hard-of-hearing - System configuration and ... Techniques and applications of digital watermarking and content protection.
Chin-Chen Chang1,3, Chia-Chen Lin2, and Yi-Hui Chen3 1 Department of Information Engineering and Computer Science ... Data hiding is widely used for concealing secrets in images so that senders can securely transfer these secrets to the ...
The bestselling first edition of "Disappearing Cryptography" was known as the best introduction to information hiding.