[HGI-News-de] Information Hiding / Darmstadt / June 7-10

Newsletter des Horst Görtz Instituts hgi-news-deutschland at lists.ruhr-uni-bochum.de
Mo Mai 4 17:50:53 CEST 2009


*******************************************************************
CALL FOR PARTICIPATION
11th Information Hiding (IH'09)
June 7-10, 2009
Darmstadt, Germany

http://www.ih09.tu-darmstadt.de/
*******************************************************************


For many years, Information Hiding has captured the imagination of
researchers: Digital watermarking and steganography protect information,
conceal secrets or are used as core primitives in Digital Rights
Management schemes; steganalysis and digital forensics pose important
challenges to investigators; and information hiding plays an
important role in anonymous communication systems.

Continuing a successful series that brought together these closely
linked research areas, the 11th edition of Information Hiding will
be held in Darmstadt, Germany.


Accepted presentations:

An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding
False-Positive
K. Nuida

Supraliminal Audio Steganography: Audio Files Tricking Audiophiles
H. Crawford, J. Aycock

An Epistemological Approach to Steganography
R. Boehme

A Phase Modulation Audio Watermarking Technique
M. Arnold, P. G. Baum, W. Voeßing

Microphone Classification Using Fourier Coefficients
R. Buchholz, C.Kraetzer, J. Dittmann

Roughness-Adaptive 3D Watermarking of Polygonal Meshes
K. Kim, M. Barni, H. Tan

Embedding Ratio Estimating for Each Bit Plane of Image
C. Yang, F. Liu, X. Luo

Detect Digital Image Splicing with Visual Cues
Z. Qu, G. Qiu, J. Huang

Forensic Tracking Watermarking Against In-theater Piracy
M. Lee, K. Kim, H. Lee

Fisher Information Determines Capacity of epsilon-secure
Steganography
T. Filler, J. Fridrich

Estimating the minimal length of Tardos code
T. Furon, L. Perez-Freire, A. Guyader, F. Cerou

Self-Recovery Fragile Watermarking Using Block-Neighborhood
Tampering Characterization
H. He, J. Zhang, H. Tai

Steganography Using Version Control System
V. Tidake, S. Pukale

Estimating Steganographic Fisher Information in Real Images
A. Ker

Feature-Based Camera Model Identification Works in Practice --
Results of a Comprehensive Evaluation Study
T. Gloe, K. Borowka, A. Winkler

Fast BCH Syndrome Coding for Steganography
R. Zhang, V. Sanchev, H. J. Kim

Fast Determination of Sensitivity in the Presence of
Countermeasures in BOWS-2
A. Westfeld

Hardware-based Public-key Cryptography with Public Physically
Unclonable Functions
N. Beckmann, M. Potkonjak

Perception-based Audio Authentication Watermarking in the
Time-Frequency Domain
S. Zmudzinski, M. Steinebach

Text Hiding in high frequency components of Speech Spectrum
F. Djebbar, D. Guerchi, K. abed Meraim, H. Hamam

Hardware Trojan Horse Detection using Coordinated Algebraic
and Statistical Techniques
M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey

*******************************************************************

A preliminary program can be found at:
http://www.ih09.tu-darmstadt.de/program.html

Registration information is available at:
http://www.ih09.tu-darmstadt.de/reg.html

*******************************************************************

We would appreciate it if you could forward this information
to interested parties.






Mehr Informationen über die Mailingliste Hgi-News-Deutschland