Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / Edition 1
by Andreas Pfitzmann
This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is
Overview
This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is watermarking. The papers are organized in sections on fundamentals of steganography, paradigms and examples, beyond symmetric steganography; watermarking: proving ownership, detection and decoding, embedding techniques, new designs and applications, improving robustness, software protection; separating private and public information; and stego-engineering.
Product Details
- ISBN-13:
- 9783540671824
- Publisher:
- Springer Berlin Heidelberg
- Publication date:
- 03/30/2000
- Series:
- Lecture Notes in Computer Science Series, #1768
- Edition description:
- 2000
- Pages:
- 492
- Product dimensions:
- 9.21(w) x 6.14(h) x 1.02(d)
Table of Contents
Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Shastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Prool: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.
Customer Reviews
Average Review: