About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IAS 2007
IWCF 2007DHIM 2007
Other Years
Ethics and Malpractice Statement

    DHIM

    1st International ICST Workshop on Data Hiding for Information and Multimedia Security

    As rapid and tremendous progress in information technology is constantly being made, and, while an enormous amount of media such as text, audio, speech, music, image and video can be easily exchanged through the Internet and other communication networks, information security issues such as copyrigh…

    As rapid and tremendous progress in information technology is constantly being made, and, while an enormous amount of media such as text, audio, speech, music, image and video can be easily exchanged through the Internet and other communication networks, information security issues such as copyright protection, digital right management, integrity verification, authentication, and access control have become exceptionally acute. As a result, the subject of data hiding for information security and forensics has been taken as one of the top research and development agendas for researchers, organisations and governments worldwide. In addition, data hiding techniques have also found applications in the areas of covert communication, image/video indexing, medical image archiving and exchange, transmission error recovery and concealment, image captioning, audio in video for language translation, etc.

    more »
    Editor(s): Ning Zhang (University of Manchester, UK) and Ajith Abraham (Norwegian University of Science and Technology, Norwa)
    Publisher
    IEEE
    ISBN
    0-7695-2876-7
    Conference dates
    2007-08-31
    Location
    Manchester, UK
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 10 results
    Page size: 102550
    • 1
    • A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Geong Sen Poh, Keith M. Martin
    • A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      M. Venkatesan, P. MeenakshiDevi, K. Duraiswamy, K. Thiagarajah
    • A Weighted Stego Image Detector for Sequential LSB Replacement

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Andrew D. Ker
    • A novel anti-collusion coding scheme tailored to track linear collusions

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Kannan Karthik, Dimitrios Hatzinakos
    • An Analysis of Database Watermarking Security

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Julien LAFAYE
    • Detection of Hidden Information in Webpages Based on Randomness

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo
    • Metrics-based Evaluation of Slicing Obfuscations

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Anirban Majumdar, Stephen Drape, Clark Thomborson
    • Protection of Mammograms Using Blind Steganography and Watermarking

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Yue Li, Chang-Tsun Li, Chia-Hung Wei
    • Research on Steganalysis for Text Steganography Based on Font Format

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan
    • Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain

      Research Article in 1st International ICST Workshop on Data Hiding for Information and Multimedia Security

      Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao
    • 1
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL