Skip to main content


Revised Selected Papers of ACM IH and MMS 2013

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled. The special issue contains selected revised papers of the ACM Workshop IHMMSEC 2013, presented in June 2013 in Montpellier.

Edited by: Patrizio Campisi, Marc Chaumont, Jana Dittmann and William Puech

  1. Content type: Research

    This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. T...

    Authors: Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya and Patrick Bas

    Citation: EURASIP Journal on Information Security 2014 2014:9

    Published on:

  2. Content type: Research

    In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether...

    Authors: Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo and Alessandro Piva

    Citation: EURASIP Journal on Information Security 2014 2014:10

    Published on:

  3. Content type: Research

    Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distorti...

    Authors: Vojtěch Holub, Jessica Fridrich and Tomáš Denemark

    Citation: EURASIP Journal on Information Security 2014 2014:1

    Published on:

  4. Content type: Research

    Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a co...

    Authors: Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo

    Citation: EURASIP Journal on Information Security 2013 2013:8

    Published on: