Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
Saved in:
Author / Creator: | Pfitzmann, Andreas. |
---|---|
Imprint: | Berlin, Heidelberg : Springer Berlin Heidelberg, 2000. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 1768 |
Subject: | Computer Communication Networks Computer science Data encryption (Computer science) Information systems Multimedia systems |
Format: | E-Resource |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/7355979 |
Table of Contents:
- Fundamentals of Steganography
- An Information-Theoretic Approach to Steganography and Watermarking
- One-Time Hash Steganography
- Steganography: Paradigms and Examples
- Steganography Secure against Cover-Stego-Attacks
- Secure Steganographic Methods for Palette Images
- Attacks on Steganographic Systems
- Beyond Symmetric Steganography
- Developments in Steganography
- An Asymmetric Public Detection Watermarking Technique
- Zero Knowledge Watermark Detection
- Watermarking: Proving Ownership
- Proving Ownership of Digital Content
- Error- and Collusion-Secure Fingerprinting for Digital Data
- Watermarking: Detection and Decoding
- Computing the Probability of False Watermark Detection
- Optimum Decoding of Non-additive Full Frame DFT Watermarks
- Watermark Detection after Quantization Attacks
- Content-Based Watermarking for Image Authentication
- Watermarking: Embedding Techniques
- Fast Robust Template Matching for Affine Resistant Image Watermarks
- A Stochastic Approach to Content Adaptive Digital Image Watermarking
- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
- Watermarking: New Designs and Applications
- On the Design of a Watermarking System: Considerations and Rationales
- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
- Watermarking: Improving Robustness
- Robust Watermarking for Images Based on Color Manipulation
- Recovery of Watermarks from Distorted Images
- Cocktail Watermarking on Images
- Watermarking and Software Protection
- Hiding Signatures in Graph Coloring Solutions
- Robust Object Watermarking: Application to Code
- Software DisEngineering: Program Hiding Architecture and Experiments
- The Difficulty of Separating Private and Public Information
- Chaffing at the Bit: Thoughts on a Note by Ronald Rivest
- An Entropy-Based Framework for Database Inference
- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
- Stego-Engineering
- Protecting Secret Keys in a Compromised Computational System
- StegFS: A Steganographic File System for Linux
- Nonbinary Audio Cryptography
- Author Index