Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /

Saved in:
Bibliographic Details
Author / Creator:Pfitzmann, Andreas.
Imprint:Berlin, Heidelberg : Springer Berlin Heidelberg, 2000.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 1768
Subject:Computer Communication Networks
Computer science
Data encryption (Computer science)
Information systems
Multimedia systems
Format: E-Resource
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/7355979
Hidden Bibliographic Details
Other authors / contributors:SpringerLink (Online service)
ISBN:9783540671824
Table of Contents:
  • Fundamentals of Steganography
  • An Information-Theoretic Approach to Steganography and Watermarking
  • One-Time Hash Steganography
  • Steganography: Paradigms and Examples
  • Steganography Secure against Cover-Stego-Attacks
  • Secure Steganographic Methods for Palette Images
  • Attacks on Steganographic Systems
  • Beyond Symmetric Steganography
  • Developments in Steganography
  • An Asymmetric Public Detection Watermarking Technique
  • Zero Knowledge Watermark Detection
  • Watermarking: Proving Ownership
  • Proving Ownership of Digital Content
  • Error- and Collusion-Secure Fingerprinting for Digital Data
  • Watermarking: Detection and Decoding
  • Computing the Probability of False Watermark Detection
  • Optimum Decoding of Non-additive Full Frame DFT Watermarks
  • Watermark Detection after Quantization Attacks
  • Content-Based Watermarking for Image Authentication
  • Watermarking: Embedding Techniques
  • Fast Robust Template Matching for Affine Resistant Image Watermarks
  • A Stochastic Approach to Content Adaptive Digital Image Watermarking
  • Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
  • Watermarking: New Designs and Applications
  • On the Design of a Watermarking System: Considerations and Rationales
  • A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
  • Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
  • Watermarking: Improving Robustness
  • Robust Watermarking for Images Based on Color Manipulation
  • Recovery of Watermarks from Distorted Images
  • Cocktail Watermarking on Images
  • Watermarking and Software Protection
  • Hiding Signatures in Graph Coloring Solutions
  • Robust Object Watermarking: Application to Code
  • Software DisEngineering: Program Hiding Architecture and Experiments
  • The Difficulty of Separating Private and Public Information
  • Chaffing at the Bit: Thoughts on a Note by Ronald Rivest
  • An Entropy-Based Framework for Database Inference
  • Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
  • The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
  • Stego-Engineering
  • Protecting Secret Keys in a Compromised Computational System
  • StegFS: A Steganographic File System for Linux
  • Nonbinary Audio Cryptography
  • Author Index