As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Ne
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and effic
Applications of information hiding are fundamental to copyright protection of images, data, passport control, CDs, videos and more. This book offers the latest
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Inte