LEADER 03708nam 2200625Ia 450 001 9910484694203321 005 20200520144314.0 010 $a3-642-04431-X 024 7 $a10.1007/978-3-642-04431-1 035 $a(CKB)1000000000784731 035 $a(SSID)ssj0000318250 035 $a(PQKBManifestationID)11265152 035 $a(PQKBTitleCode)TC0000318250 035 $a(PQKBWorkID)10307538 035 $a(PQKB)10016055 035 $a(DE-He213)978-3-642-04431-1 035 $a(MiAaPQ)EBC3064508 035 $a(PPN)139955704 035 $a(EXLCZ)991000000000784731 100 $a20090905d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation hiding $e11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /$fStefan Katzenbeisser, Ahmad-Reza Sadeghi (eds.) 205 $a1st ed. 2009. 210 $aBerlin ;$aNew York $cSpringer$dc2009 215 $a1 online resource (X, 277 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v5806 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04430-1 320 $aIncludes bibliographical references and index. 327 $aSteganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics. 410 0$aLecture notes in computer science ;$v5806. 517 3 $aIH 2009 606 $aComputer security$vCongresses 606 $aData protection$vCongresses 615 0$aComputer security 615 0$aData protection 676 $a005.8 686 $aDAT 450f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aKatzenbeisser$b Stefan$01704861 701 $aSadeghi$b Ahmad-Reza$0878402 712 12$aIH 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484694203321 996 $aInformation hiding$94200514 997 $aUNINA