Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /

Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.

Saved in:
Bibliographic Details
Main Authors: Pfitzmann, Andreas. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Multimedia information systems., Management information systems., Computer Science., Data Encryption., Computer Communication Networks., Management of Computing and Information Systems., Multimedia Information Systems., Information Systems Applications (incl. Internet).,
Online Access:http://dx.doi.org/10.1007/10719724
Tags: Add Tag
No Tags, Be the first to tag this record!