These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Philips Research, The Netherlands), Andreas P?tzmann (Dresden University of Technology, Germany), Mike Reiter (Carnegie Mellon University, USA), and me. We all wish to thank all the authors of submissions for o?ering their papers for consideration. This year, contrary to the four previous workshops, the call for papers - quested anonymous submissions. However, anonymity was not compulsory and we did accept some papers in which the identity of the authors was clear. Each submission was assigned to three members of the program committee. Papers submitted by program committee members were assigned to four reviewers. The program committee relied on the advice of outside colleagues. We also insisted that 12 of the 27 accepted papers should be revised according to the comments of the reviewers.
Author(s): Kymie Tan, John McHugh, Kevin Killourhy (auth.), Fabien A. P. Petitcolas (eds.)
Series: Lecture Notes in Computer Science 2578
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 430
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Legal Aspects of Computing; Management of Computing and Information Systems
Hiding Intrusions: From the Abnormal to the Normal and Beyond....Pages 1-17
Eliminating Steganography in Internet Traffic with Active Wardens....Pages 18-35
From a Trickle to a Flood: Active Attacks on Several Mix Types....Pages 36-52
Limits of Anonymity in Open Environments....Pages 53-69
Chaffinch: Confidentiality in the Face of Legal Threats....Pages 70-86
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation....Pages 87-105
Robustness and Efficiency of Non-linear Side-Informed Watermarking....Pages 106-119
Security of Public Watermarking Schemes for Binary Sequences....Pages 119-128
Direct Embedding and Detection of RST Invariant Watermarks....Pages 129-144
Robust Image Watermark Using Radon Transform and Bispectrum Invariants....Pages 145-159
Audio Watermark Robustness to Desynchronization via Beat Detection....Pages 160-176
Robust Watermarking and Affine Registration of 3D Meshes....Pages 177-195
Natural Language Watermarking and Tamperproofing....Pages 196-212
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection....Pages 213-225
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks....Pages 226-246
Detectors for Echo Hiding Systems....Pages 247-257
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis....Pages 258-277
Steganography Preserving Statistical Properties....Pages 278-294
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression....Pages 295-309
Steganalysis of JPEG Images: Breaking the F5 Algorithm....Pages 310-323
Detecting Low Embedding Rates....Pages 324-339
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines....Pages 340-354
Detection of LSB Steganography via Sample Pair Analysis....Pages 355-372
Hiding Data in DNA....Pages 373-386
Tracing the Source of a Shredded Document....Pages 387-399
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive....Pages 400-414
Practical Oblivious Transfer Protocols....Pages 415-426