Skip to main content

Revised Selected Papers of ACM IH and MMS 2013

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled. The special issue contains selected revised papers of the ACM Workshop IHMMSEC 2013, presented in June 2013 in Montpellier.

Edited by: Patrizio Campisi, Marc Chaumont, Jana Dittmann and William Puech

  1. Research

    Detection and localization of double compression in MP3 audio tracks

    In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether...

    Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo and Alessandro Piva

    EURASIP Journal on Information Security 2014 2014:10

    Published on: 23 May 2014

  2. Research

    Universal distortion function for steganography in an arbitrary domain

    Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distorti...

    Vojtěch Holub, Jessica Fridrich and Tomáš Denemark

    EURASIP Journal on Information Security 2014 2014:1

    Published on: 3 January 2014

  3. Research

    Removal and injection of keypoints for SIFT-based copy-move counter-forensics

    Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a co...

    Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo

    EURASIP Journal on Information Security 2013 2013:8

    Published on: 20 December 2013