Search dblp for Publications

export results for "toc:db/conf/ih/ih2007.bht:"

 download as .bib file

@proceedings{DBLP:conf/ih/2007,
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77370-2},
  doi          = {10.1007/978-3-540-77370-2},
  isbn         = {978-3-540-77369-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BasD07,
  author       = {Patrick Bas and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Practical Security Analysis of Dirty Paper Trellis Watermarking},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {174--188},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_12},
  doi          = {10.1007/978-3-540-77370-2\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BasD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CancelliB07,
  author       = {Giacomo Cancelli and
                  Mauro Barni},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {MPSteg-color: {A} New Steganographic Technique for Color Images},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_1},
  doi          = {10.1007/978-3-540-77370-2\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CancelliB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenFLG07,
  author       = {Mo Chen and
                  Jessica J. Fridrich and
                  Jan Luk{\'{a}}s and
                  Miroslav Goljan},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {342--358},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_23},
  doi          = {10.1007/978-3-540-77370-2\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenFLG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DedicJV07,
  author       = {Nenad Dedic and
                  Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {A Graph Game Model for Software Tamper Protection},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {80--95},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_6},
  doi          = {10.1007/978-3-540-77370-2\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DedicJV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DonigusEFHJLPSTVWW07,
  author       = {Daniel D{\"{o}}nigus and
                  Stefan Endler and
                  Marc Fischlin and
                  Andreas H{\"{u}}lsing and
                  Patrick J{\"{a}}ger and
                  Anja Lehmann and
                  Sergey Podrazhansky and
                  Sebastian Schipp and
                  Erik Tews and
                  Sven Vowe and
                  Matthias Walthart and
                  Frederik Weidemann},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Security of Invertible Media Authentication Schemes Revisited},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_13},
  doi          = {10.1007/978-3-540-77370-2\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/DonigusEFHJLPSTVWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FontaineG07,
  author       = {Caroline Fontaine and
                  Fabien Galand},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {How Can Reed-Solomon Codes Improve Steganographic Schemes?},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_9},
  doi          = {10.1007/978-3-540-77370-2\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FontaineG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HofbauerH07,
  author       = {Konrad Hofbauer and
                  Horst Hering},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Noise Robust Speech Watermarking with Bit Synchronisation for the
                  Aeronautical Radio},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_17},
  doi          = {10.1007/978-3-540-77370-2\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HofbauerH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JakubowskiNPV07,
  author       = {Mariusz H. Jakubowski and
                  Prasad Naldurg and
                  Vijay Patankar and
                  Ramarathnam Venkatesan},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {96--111},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_7},
  doi          = {10.1007/978-3-540-77370-2\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JakubowskiNPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JohnsonF07,
  author       = {Micah K. Johnson and
                  Hany Farid},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Exposing Digital Forgeries Through Specular Highlights on the Eye},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {311--325},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_21},
  doi          = {10.1007/978-3-540-77370-2\_21},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JohnsonF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KatzenbeisserSCS07,
  author       = {Stefan Katzenbeisser and
                  Boris Skoric and
                  Mehmet Utku Celik and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Combining Tardos Fingerprinting Codes and Fingercasting},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_20},
  doi          = {10.1007/978-3-540-77370-2\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KatzenbeisserSCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker07,
  author       = {Andrew D. Ker},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {A Fusion of Maximum Likelihood and Structural Steganalysis},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {204--219},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_14},
  doi          = {10.1007/978-3-540-77370-2\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Ker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KirchnerB07,
  author       = {Matthias Kirchner and
                  Rainer B{\"{o}}hme},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Tamper Hiding: Defeating Image Forensics},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_22},
  doi          = {10.1007/978-3-540-77370-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KirchnerB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KratzerD07,
  author       = {Christian Kr{\"{a}}tzer and
                  Jana Dittmann},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using {SVM}
                  Classification},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {359--377},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_24},
  doi          = {10.1007/978-3-540-77370-2\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KratzerD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeeWL07,
  author       = {Kwangsoo Lee and
                  Andreas Westfeld and
                  Sangjin Lee},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Generalised Category Attack - Improving Histogram-Based Attack on
                  {JPEG} {LSB} Embedding},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {378--391},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_25},
  doi          = {10.1007/978-3-540-77370-2\_25},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeeWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LuW07,
  author       = {Peizhong Lu and
                  Dan Wang},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_18},
  doi          = {10.1007/978-3-540-77370-2\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Martin07,
  author       = {Keye Martin},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Steganographic Communication with Quantum Information},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {32--49},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_3},
  doi          = {10.1007/978-3-540-77370-2\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Martin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NuidaHWI07,
  author       = {Koji Nuida and
                  Manabu Hagiwara and
                  Hajime Watanabe and
                  Hideki Imai},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory
                  Amount},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_19},
  doi          = {10.1007/978-3-540-77370-2\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NuidaHWI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Perez-FreireP07,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Exploiting Security Holes in Lattice Data Hiding},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {159--173},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_11},
  doi          = {10.1007/978-3-540-77370-2\_11},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Perez-FreireP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchlauwegPM07,
  author       = {Mathias Schlauweg and
                  Dima Pr{\"{o}}frock and
                  Erika M{\"{u}}ller},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_16},
  doi          = {10.1007/978-3-540-77370-2\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SchlauwegPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchonfeldW07,
  author       = {Dagmar Sch{\"{o}}nfeld and
                  Antje Winkler},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Reducing the Complexity of Syndrome Coding for Embedding},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_10},
  doi          = {10.1007/978-3-540-77370-2\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SchonfeldW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SolankiSM07,
  author       = {Kaushal Solanki and
                  Anindya Sarkar and
                  B. S. Manjunath},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {{YASS:} Yet Another Steganographic Scheme That Resists Blind Steganalysis},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_2},
  doi          = {10.1007/978-3-540-77370-2\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SolankiSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TroncosoDDP07,
  author       = {Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Orr Dunkelman and
                  Bart Preneel},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Traffic Analysis Attacks on a Continuously-Observable Steganographic
                  File System},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_15},
  doi          = {10.1007/978-3-540-77370-2\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangLDB07,
  author       = {Kai Wang and
                  Guillaume Lavou{\'{e}} and
                  Florence Denis and
                  Atilla Baskurt},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_4},
  doi          = {10.1007/978-3-540-77370-2\_4},
  timestamp    = {Thu, 17 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangLDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangNHZH07,
  author       = {Chuntao Wang and
                  Jiangqun Ni and
                  Jiwu Huang and
                  Rongyue Zhang and
                  Meiying Huang},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Robust and High Capacity Image Watermarking Based on Jointly Coding
                  and Embedding Optimization},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_5},
  doi          = {10.1007/978-3-540-77370-2\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangNHZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YoungY07,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Space-Efficient Kleptography Without Random Oracles},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_8},
  doi          = {10.1007/978-3-540-77370-2\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YoungY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics