IH2006


  HOME - CFP

  Agenda

  Accepted Papers

  Calendar

  Accommodations

  Registration


  Email: ih2006@jjtc.com

8th Information Hiding

Old Town Alexandria, Virginia, USA
10-12 July 2006

*** Information about the 9th IH Conference: IH07, Saint Malo, Brittany, France ***

Accepted Papers


Sunday	7/9/2006
	1700	2100	Registration
	1900	2100	Reception - drinks and light hors d'oeuvres

Monday	7/10/2006		(11 Papers)
	800	1600	Registration Desk Open
	800	900		Breakfast in conference room
	900	1030	3	papers
		Session 1 - Watermarking

			NATURAL WATERMARKING: A SECURE SPREAD SPECTRUM TECHNIQUE FOR WOA
			Patrick Bas and Francois Cayre

			AN IMPROVED ASYMMETRIC WATERMARKING SYSTEM USING MATRIX EMBEDDING
			Scott Craver

			A CRYPTOGRAPHIC METHOD FOR SECURE WATERMARK DETECTION
			Michael Malkin and Ton Kalker

	1030	1100	Coffee break
	1100	1200	2	papers
		Session 2 - Information Hiding and Networking

			STEGANOGRAPHIC COMMUNICATION IN ORDERED CHANNELS
			Ravi Sundaram, Guevara Noubir, Rajsekar Manokaran, Abishek
			Kumarasubramaniam, Ravi Chandra, Pandu Rangan C

			ANALYZING NETWORK-AWARE ACTIVE WARDENS IN IPV6
			Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin

	1200	1330	Group lunch
	1330	1500	3	papers
		Session 3 - Data Hiding in Unusual Content I

			VIDEO WATERMARKING BY USING GEOMETRIC WARPING WITHOUT VISIBLE ARTIFACTS
			Dima Pröfrock Mathias Schlauweg Erika Müller

			TIME-SCALE INVARIANT AUDIO WATERMARKING BASED ON THE STATISTICAL
			FEATURES IN TIME DOMAIN
			Shijun Xiang, Jiwu Huang

			CONTENT-AWARE STEGANOGRAPHY: ABOUT LAZY PRISONERS AND NARROW-MINDED
			WARDENS
			Richard Bergmair, Stefan Katzenbeisser

	1500	1530	Coffee break
	1530	1700	3	papers
		Session 4 - Fundamentals

			NOISY TIMING CHANNELS WITH BINARY INPUTS AND OUTPUTS
			Keye Martin and Ira S. Moskowitz

			A COMPUTATIONAL MODEL FOR WATERMARK ROBUSTNESS
			Andre Adelsbach, Stefan Katzenbeisser and Ahmad-Reza Sadeghi

			HIDING INFORMATION HIDING
			Adam Young and Moti Yung

	1700	1730	Announcements
		Evening	Dinner on your own
	1930	until	Walking Tour of Old Town

Tuesday	7/11/2006		(10 Papers)
	800	1600	Registration Desk Open
	800	900		Breakfast in conference room
	900	1030	3	papers
		Session 5 - Data Hiding in Unusual Content II

			REVERSIBLE WATERMARKING OF NURBS-BASED CAD MODELS
			Wolfgang Funk

			A HIGH-CAPACITY DATA HIDING METHOD FOR POLYGONAL MESHES
			Haotian Wu and Yiu-ming Cheung

			STEGANOGRAPHY FOR RADIO AMATEURS
			A DSSS BASED APPROACH FOR SLOW SCAN TELEVISION
			Andreas Westfeld

	1030	1100	Coffee break
	1100	1200	2	papers
		Session 6 - Software Protection

			DELAYED AND CONTROLLED FAILURES IN TAMPER-RESISTANT SYSTEMS
			Gang Tan, Yuqun Chen, Mariusz H. Jakubowski


			A MODEL FOR SELF-MODIFYING CODE
			Bertrand Anckaert and Matias Madou and Koen De Bosschere

	1200	1330	Group lunch
	1330	1500	3	papers
		Session 7 - Steganalysis

			A MARKOV PROCESS BASED APPROACH TO EFFECTIVE ATTACKING JEPG
			STEGANOGRAPHY
			Yun Q. Shi Chunhua Chen Wen Chen

			BATCH STEGANOGRAPHY AND POOLED STEGANALYSIS
			Andrew D. Ker

			ON STEGANOGRAPHIC EMBEDDING EFFICIENCY
			Jessica Fridrich, Petr Lisonek, and David Soukal

	1500	1530	Coffee break
	1530	1630	2	papers
		Session 8 - Steganography

			EFFICIENT PUBLIC KEY STEGANOGRAPHY SECURE AGAINST ADAPTIVE CHOSEN
			STEGOTEXT ATTACKS
			Tri van Le Kaoru Kurosawa

			MODIFIED MATRIX ENCODING FOR MINIMAL DISTORTION STEGANOGRAPHY
			Younhee Kim, Zoran Duric, and Dana Richards

	1630	1930	Dinner on your own (save room of dessert)
	1630	1730	Rump session, discussion for those interested
	1930	2000	Make way to Boat Dock in Old Town Alexandria
	2000	2300	Board and cruise on the Miss Christin
			Dessert Cruise with a bar viewing sites from Alexandria/DC

Wednesday	7/12/2006		(4 papers)
	800	1330	Registration Desk Open
	800	900		Breakfast in conference room
	900	1000	2	papers
		Session 9 - Fingerprinting

			STATISTICALLY SECURE ANTI-COLLUSION CODE DESIGN FOR MEDIAN ATTACK
			ROBUSTNESS FOR PRACTICAL FINGERPRINTING
			Jae-Min Seol, Seong-Whan Kim, and Shan Suthaharan

			A COLLUSION-RESISTANT VIDEO WATERMARKING SCHEME
			Amir Houmansadr Shahrokh Ghaemmaghami

	1000	1030	Coffee break
	1030	1130	2	papers
		Session 10 - Subliminal Channels

			AN ELLIPTIC CURVE BACKDOOR ALGORITHM FOR RSASSA
			Adam Young and Moti Yung

			A SUBLIMINAL-FREE VARIANT OF ECDSA
			Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer
			Steinwandt

	1130	1200	Closing Remarks - Adjourn


		

DISCLAIMER:
The Information Hiding conference (IH2006) is a voluntary association of individuals and groups sharing common research interests. The opinions and ideas presented in the conference material are those of their original authors, and do not necessarily reflect the views and opinions of Booz Allen Hamilton and conference sponsors. The author is solely responsible for content.

Use of the information provided at IH2006 is at your own risk. The conference sponsors give no warranty of accuracy, completeness or reliability of such information. The sponsors of the conference disclaim all liability of any kind arising directly or indirectly from any use of the information or ideas conveyed or published.

Any of the trademarks, service marks, collective marks, design rights, personality rights or similar rights that are mentioned, used or cited in the papers submitted to the conference or information presented at the conference are the property of their respective owners. Unless otherwise stated Booz Allen Hamilton and conference sponsors neither endorse nor are affiliated with any of the holders of any such rights and as such cannot grant any rights to use any otherwise protected materials.


Home | Agenda | Accepted Papers | Calendar | Accommodations | Registration Site