author: stefan katzenbeisser

Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

... order of magnitude is likely to remain stable. (More prudently, we hope that ... audio files. To conclude, this paper is intended to motivate the community ... Goljan for their helpful comments. References. 1. Anderson, R., Petitcolas ...

SOFSEM 2012: Theory and Practice of Computer Science: 38th Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 21-27, 2012, Proceedings

... every maximal independent set, we may assume that G is connected. Let σA ... other maximal independent set in G contains at least one vertex from A ... E). We first show that every connected component of G[S] contains at most two vertices ...

Information Hiding Techniques for Steganography and Digital Watermarking

This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.

Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

... evolution. Solution to a problem solved by genetic algorithms uses an evolutionary process (it is evolved). The algorithm starts ... package from the North Carolina State University with their default settings for floatGA [HJK95]. The options ...

Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

... Lecture Notes in Computer Science, pages 278–294. Springer, 2003. 4. Jessica Fridrich, Miroslav Goljan, and David Soukal. Higher–order statistical ste- ganalysis of palette images. In Proceedings of the Electronic Imaging SPIE Santa ...

Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings

... order statistics of image and their other representations after image ... Goljan et al. [7] extracted the higher-order absolute moments of the noise ... class classification problem. The basic idea of this algorithm is “boosting”, which ...

Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

... Freenet's get(name) interface where name is its content key. Queries are forwarded to servers hosting names which offer the closest match to name. If the document is found, the server reverse-routes doc back to the client, and each ...

Information Hiding

... Goljan, M., R. Cogranne, and J. Fridrich, “Rich Model for Steganalysis of ... Lecture Notes in Computer Science, Noordwijkerhout, The Netherlands ... Lecture Notes in Computer Science, Toronto, Canada: Springer-Verlag, New York, May 23–25 ...

Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers

... presentation content distribution content creation host image watermark watermark detection received image decoding embedding watermarked image Fig. 1. The application scenario Alternatively, in a different scenario, the watermark could ...

ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

... MediaMarkt L: https://www.mediamarkt.de/webapp/wcs/stores/servlet/Logo... Facebook L: https://www.facebook.com/login (Obfuscate) M: https://130.83.167.26/login Flickr L: https://login.yahoo.com (Obfuscate) M: https://www.xplan.com ...

Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

... the hidden message less conspicuous because a certain amount of regularity is assumed in drum beats, for example. Table 1. BER results for the tests performed. The two. Supraliminal Audio Steganography 11 Results No Noise Noise.

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

... public criticisms. In October 2010, Facebook introduced the New Profile, and ... See Figures 1-2 for a comparison between early version of ... Facebook Launching the New Profile on Facebook 327 Methodology Research Context Data Collection.

Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers

... watermark embedding watermarked image 4 compression JPEG JPEG 2 compression decoding JPEG compression received watermark image detection JPEG2000 coding bitstream adaption content creation content distribution content presentation Fig ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.