[HGI-news-int] Information Hiding / Darmstadt / June 7-10
English Newsletter of the Horst Gö rtz Institute of IT Security in Bochum
hgi-news-international at lists.ruhr-uni-bochum.de
Mon May 4 17:50:35 CEST 2009
*******************************************************************
CALL FOR PARTICIPATION
11th Information Hiding (IH'09)
June 7-10, 2009
Darmstadt, Germany
http://www.ih09.tu-darmstadt.de/
*******************************************************************
For many years, Information Hiding has captured the imagination of
researchers: Digital watermarking and steganography protect information,
conceal secrets or are used as core primitives in Digital Rights
Management schemes; steganalysis and digital forensics pose important
challenges to investigators; and information hiding plays an
important role in anonymous communication systems.
Continuing a successful series that brought together these closely
linked research areas, the 11th edition of Information Hiding will
be held in Darmstadt, Germany.
Accepted presentations:
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding
False-Positive
K. Nuida
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles
H. Crawford, J. Aycock
An Epistemological Approach to Steganography
R. Boehme
A Phase Modulation Audio Watermarking Technique
M. Arnold, P. G. Baum, W. Voeßing
Microphone Classification Using Fourier Coefficients
R. Buchholz, C.Kraetzer, J. Dittmann
Roughness-Adaptive 3D Watermarking of Polygonal Meshes
K. Kim, M. Barni, H. Tan
Embedding Ratio Estimating for Each Bit Plane of Image
C. Yang, F. Liu, X. Luo
Detect Digital Image Splicing with Visual Cues
Z. Qu, G. Qiu, J. Huang
Forensic Tracking Watermarking Against In-theater Piracy
M. Lee, K. Kim, H. Lee
Fisher Information Determines Capacity of epsilon-secure
Steganography
T. Filler, J. Fridrich
Estimating the minimal length of Tardos code
T. Furon, L. Perez-Freire, A. Guyader, F. Cerou
Self-Recovery Fragile Watermarking Using Block-Neighborhood
Tampering Characterization
H. He, J. Zhang, H. Tai
Steganography Using Version Control System
V. Tidake, S. Pukale
Estimating Steganographic Fisher Information in Real Images
A. Ker
Feature-Based Camera Model Identification Works in Practice --
Results of a Comprehensive Evaluation Study
T. Gloe, K. Borowka, A. Winkler
Fast BCH Syndrome Coding for Steganography
R. Zhang, V. Sanchev, H. J. Kim
Fast Determination of Sensitivity in the Presence of
Countermeasures in BOWS-2
A. Westfeld
Hardware-based Public-key Cryptography with Public Physically
Unclonable Functions
N. Beckmann, M. Potkonjak
Perception-based Audio Authentication Watermarking in the
Time-Frequency Domain
S. Zmudzinski, M. Steinebach
Text Hiding in high frequency components of Speech Spectrum
F. Djebbar, D. Guerchi, K. abed Meraim, H. Hamam
Hardware Trojan Horse Detection using Coordinated Algebraic
and Statistical Techniques
M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey
*******************************************************************
A preliminary program can be found at:
http://www.ih09.tu-darmstadt.de/program.html
Registration information is available at:
http://www.ih09.tu-darmstadt.de/reg.html
*******************************************************************
We would appreciate it if you could forward this information
to interested parties.
More information about the HGI-News-International
mailing list