Search Results
Information Hiding: First International Workshop, Cambridge, ...
books.google.com › books
books.google.com › books
Ross Anderson, Ross Anderson, PH. · 1996
Found inside – Page 295
A drawback to this approach is that lossy data compression algorithms tend to remove most imperceivable artifacts , including At the Information Hiding Workshop held in Cambridge , England , the adjectives cover , embedded , and steyo ...Information Hiding: Steganography and Watermarking-Attacks ...
books.google.com › books
books.google.com › books
Found inside – Page 11
The analysis of techniques for information hiding in images covers both steganography and digital watermarking. The analysis involves investigating available tools and techniques for hiding information, classifying these techniques, ...Information Hiding: 7th International Workshop, IH 2005, ... - Page 245
books.google.com › books
books.google.com › books
Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser · 2005
Found inside – Page 245
By using the fundamental principles of information hiding, we have been able to add a new capability--sensing---to RFID tags, while maintaining backward compatibility and preserving infrastructure investments.Information Hiding: 8th International Workshop, IH 2006, ... - Page 314
books.google.com › books
books.google.com › books
Jan Camenisch, Christian Collberg, Neil F. Johnson · 2007
Found inside – Page 314
It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had ...Information Hiding: 6th International Workshop, IH 2004, ... - Page 178
books.google.com › books
books.google.com › books
Jessica Fridrich · 2004
Found inside – Page 178
Information Hiding: Proceedings of the Third International Workshop. Volume 1768 of Lecture Notes in Computer Science., Dresden, Germany, Springer (1999) 1–16 Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., ...Information Hiding: 9th International Workshop, IH 2007, ...
books.google.com › books
books.google.com › books
Teddy Furon, François Cayre, Gwenaël DoërrG · 2007
Found inside
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the Corsairs town, France, during June 11–13, 2007. It was organized by a team of four ...Information Hiding and Applications - Page ii
books.google.com › books
books.google.com › books
Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain · 2009
Found inside – Page ii
... and Lakhmi C.Jain (Eds.) Information Hiding and. Further volumes of this series can be found on our homepage:springer.com Vol.205.Ajith Abraham,Aboul-Ella Hassanien,and Václav Snášel (Eds.) Foundations of Computational Intelligence ...Information Hiding: 4th International Workshop, IH 2001, ... - Page 11
books.google.com › books
books.google.com › books
Ira S. Moskowitz · 2003
Found inside – Page 11
16. 17. 18. Ross Anderson, ed. Information Hiding: First International Workshop, LNCS 1174, Springer, 1996. 2 2. Ross Anderson. Stretching the limits of steganography. Information Hiding: First International Workshop, Ross Anderson, ed.Information Hiding - Page 42
books.google.com › books
books.google.com › books
Found inside – Page 42
Z ̈ollner, J., et al., “An Information-Theoretic Model for Steganography,” in Information Hiding (2nd International Workshop), Vol. 1525 of LNCS, Berlin Heidelberg: Springer-Verlag, 1998, pp. 306–318. Ker, A. D., “A Fusion of Maximum ...Lossless Information Hiding in Images - Page 22
books.google.com › books
books.google.com › books
Found inside – Page 22
In addition to the classification way of information hiding based on research branches (or the object to be protected) in Section 1.2.4, information hiding techniques can also be classified according to various other ways, ...