Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA, April 25–27, 2001 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.

Author(s): Marshall Bern, Jeff Breidenbach, David Goldberg (auth.), Ira S. Moskowitz (eds.)
Series: Lecture Notes in Computer Science 2137
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2001

Language: English
Pages: 414
Tags: Data Encryption; Management of Computing and Information Systems; Computers and Society; Operating Systems; Special Purpose and Application-Based Systems; Information Systems Applications (incl.Internet)

Trustworthy Paper Documents....Pages 1-12
An Implementation of Key-Based Digital Signal Steganography....Pages 13-26
Distortion-Free Data Embedding for Images....Pages 27-41
Information Hiding through Noisy Channels....Pages 42-50
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding....Pages 51-65
Computational Forensic Techniques for Intellectual Property Protection....Pages 66-81
Intellectual Property Metering....Pages 81-95
Keyless Public Watermarking for Intellectual Property Authentication....Pages 96-111
Efficiency Improvements of the Private Message Service....Pages 112-125
A Reputation System to Increase MIX-Net Reliability....Pages 126-141
Neural Networks Functions for Public Key Watermarking....Pages 142-156
A Graph Theoretic Approach to Software Watermarking....Pages 157-168
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks....Pages 169-184
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation....Pages 185-200
Digital Watermarking of Chemical Structure Sets....Pages 200-214
The Strong Eternity Service....Pages 215-229
Real World Patterns of Failure in Anonymity Systems....Pages 230-245
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems....Pages 245-257
Automatic Detection of a Watermarked Document Using a Private Key....Pages 258-272
Zero-Knowledge Watermark Detection and Proof of Ownership....Pages 273-288
F5—A Steganographic Algorithm....Pages 289-302
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience....Pages 303-315
Practical Capacity of Digital Watermarks....Pages 316-330
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking....Pages 330-339
Second Generation Benchmarking and Application Oriented Evaluation....Pages 340-353
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum....Pages 354-368
Hiding Association Rules by Using Confidence and Support....Pages 369-383
How to Break a Semi-anonymous Fingerprinting Scheme....Pages 384-394
An Analysis of One of the SDMI Candidates....Pages 395-410