Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings

Overview

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Information Hiding, IH'98, held in Portland, Oregon, USA in April 1998.
The 25 revised full papers presented have gone through two rounds of reviewing and revision and were selected from initially 41 submissions. The book documents the state of the art in the area of information hiding research and development. The papers are organized in sections on steganography, ...

See more details below
Paperback (1998)
$71.56
BN.com price
(Save 27%)$99.00 List Price
Other sellers (Paperback)
  • All (15) from $4.99   
  • New (8) from $41.41   
  • Used (7) from $4.99   
Sending request ...

Overview

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Information Hiding, IH'98, held in Portland, Oregon, USA in April 1998.
The 25 revised full papers presented have gone through two rounds of reviewing and revision and were selected from initially 41 submissions. The book documents the state of the art in the area of information hiding research and development. The papers are organized in sections on steganography, other applications, copyright marking, attacks, and theory.

Read More Show Less

Product Details

Table of Contents

Information Hiding to Foil the Casual Counterfeiter 1
Fingerprinting Digital Circuits on Programmable Hardware 16
Steganography in a Video Conferencing System 32
Reliable Blind Information Hiding for Images 48
Cerebral Cryptography 62
The Steganographic File System 73
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System 83
Biometric yet Privacy Protecting Person Authentication 99
On Software Protection via Function Hiding 111
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations 124
Robust Digital Watermarking Based on Key-Dependent Basis Functions 143
Intellectual Property Protection Systems and Digital Watermarking 158
Secure Copyright Protection Techniques for Digital Images 169
Shedding More Light on Image Watermarks 191
Continuous Steganographic Data Transmission Using Uncompressed Audio 208
Attacks on Copyright Marking Systems 218
Testing Digital Watermark Resistance to Destruction 239
Analysis of the Sensitivity Attack against Electronic Watermarks in Images 258
Steganalysis of Images Created Using Current Steganography Software 273
Twin Peaks: The Histogram Attack on Fixed Depth Image Watermarks 290
An Information-Theoretic Model for Steganography 306
Steganalysis and Game Equilibria 319
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks 329
Modeling the Security of Steganographic Systems 344
On Public-Key Steganography in the Presence of an Active Warden 355
Author Index 369
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)