They cover information hiding
for audio and speech, for images and video, for text and binary data, and for multimedia.
IT Services Industry: Steganography: Future of Information Hiding
In the training step, the feature classifier is trained by the database composed of both plain images and stego images (generated by using different information hiding
The Second IEEE International Conference on Intelligent Information Hiding
and Multimedia Signal Processing (IIH-MSP'06) held in Pasadena, California during December 18-20, 2006; gathered individual researchers who are also the world's most respected authorities on both the fields of information hiding
and multimedia signal processing.
For more information, check out: Information Hiding
Techniques for Steganography and Digital Watermarking edited by Stefan Katzenbeisser and Fabien A.
In his book Information Hiding
, Techniques for steganography and Digital Watermarking, Fabien A.
The author's background combines maths, coding, and machine learning with information hiding
, meaning the complex statistical theory is made accessible to those new to machine learning.
They cover access control; applications of cryptography; cloud computing; communication and information systems; computer networks; cryptographic protocols and functions; foundations of computer security; grid computing; identity and trust management; image and video processing; information hiding
and watermarking; network communication; intelligent networked systems; intrusion detection, tolerance, and prevention; mobile, ad hoc, and sensor network security; network architecture and protocol design; peer-to-peer computing; parallel and distributed systems; security modeling and architecture; sensor networks; service computing; signal and information processing; and wireless networks.
The symposium's 260 peer-reviewed papers, prepared by researchers and practitioners from academia, industry, and government, are organized into sections on applied cryptography, enterprise integration applications and electronic payment, information hiding
and watermarking, information security, innovative e-business models and electronic commerce applications, intelligent computing and networks, intelligent systems and international finance, mobile commerce, multimedia technology and applications, risk analysis and business process integration, sensor networks, web applications, wireless sensor networks, and miscellaneous topics.
However, the encrypted form may attract special attention of network warders and is thus not fully secret, Current information hiding
techniques are developed to deceive warders by embedding messages into multimedia in an imperceptible manner, but still maintain their original formats and quality.