Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / Edition 1

Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / Edition 1

by Andreas Pfitzmann
     
 

This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is

See more details below

Overview

This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is watermarking. The papers are organized in sections on fundamentals of steganography, paradigms and examples, beyond symmetric steganography; watermarking: proving ownership, detection and decoding, embedding techniques, new designs and applications, improving robustness, software protection; separating private and public information; and stego-engineering.

Product Details

ISBN-13:
9783540671824
Publisher:
Springer Berlin Heidelberg
Publication date:
03/30/2000
Series:
Lecture Notes in Computer Science Series, #1768
Edition description:
2000
Pages:
492
Product dimensions:
9.21(w) x 6.14(h) x 1.02(d)

Table of Contents

Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Shastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Prool: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >