Limit this search to....

Information Hiding: 6th International Workshop, Ih 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers 2005 Edition
Contributor(s): Fridrich, Jessica (Editor)
ISBN: 3540242074     ISBN-13: 9783540242079
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: December 2004
Qty:
Annotation: This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Information Hiding, IH 2004, held in Toronto, Canada in August 2004.

The 25 revised full papers presented were carefully selected during two rounds of reviewing and revision from 70 papers submitted. The papers are organized in topical sections on digital media watermarking, steganalysis, forensic applications, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content.

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Computer Science
- Computers | Networking - Hardware
Dewey: 005.8
LCCN: 2004117066
Series: Lecture Notes in Computer Science
Physical Information: 0.85" H x 6.61" W x 9.21" (1.27 lbs) 371 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We would like to thank all authors who submitted their work for consideration. Out of the 70 submisions received by the program committee, 25 papers were accepted for publication based on their novelty, originality, and scientific merit. We strived to achieve a balanced exposition of papers that would represent many different aspects of information hiding. All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content. This year, the workshop included a one-hour rump session that offered an opportunity to the delegates to share their work in progress and other brief but interesting contributions.