Information Hiding: Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is watermarking. The papers are organized in sections on fundamentals of steganography, paradigms and examples, beyond symmetric steganography; watermarking: proving ownership, detection and decoding, embedding techniques, new designs and applications, improving robustness, software protection; separating private and public information; and stego-engineering.

Author(s): Thomas Mittelholzer (auth.), Andreas Pfitzmann (eds.)
Series: Lecture Notes in Computer Science 1768
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000

Language: English
Pages: 492
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Multimedia Information Systems; Information Systems Applications (incl.Internet)

Front Matter....Pages -
An Information-Theoretic Approach to Steganography and Watermarking....Pages 1-16
One-Time Hash Steganography....Pages 17-28
Steganography Secure against Cover-Stego-Attacks....Pages 29-46
Secure Steganographic Methods for Palette Images....Pages 47-60
Attacks on Steganographic Systems....Pages 61-76
Developments in Steganography....Pages 77-87
An Asymmetric Public Detection Watermarking Technique....Pages 88-100
Zero Knowledge Watermark Detection....Pages 101-116
Proving Ownership of Digital Content....Pages 117-133
Error- and Collusion-Secure Fingerprinting for Digital Data....Pages 134-145
Computing the Probability of False Watermark Detection....Pages 146-158
Optimum Decoding of Non-additive Full Frame DFT Watermarks....Pages 159-171
Watermark Detection after Quantization Attacks....Pages 172-186
Content-Based Watermarking for Image Authentication....Pages 187-198
Fast Robust Template Matching for Affine Resistant Image Watermarks....Pages 199-210
A Stochastic Approach to Content Adaptive Digital Image Watermarking....Pages 211-236
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation....Pages 237-252
On the Design of a Watermarking System: Considerations and Rationales....Pages 253-269
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking....Pages 270-285
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware....Pages 286-301
Robust Watermarking for Images Based on Color Manipulation....Pages 302-317
Recovery of Watermarks from Distorted Images....Pages 318-332
Cocktail Watermarking on Images....Pages 333-347
Hiding Signatures in Graph Coloring Solutions....Pages 348-367
Robust Object Watermarking: Application to Code....Pages 368-378
Software DisEngineering: Program Hiding Architecture and Experiments....Pages 379-394
Chaffing at the Bit....Pages 395-404
An Entropy-Based Framework for Database Inference....Pages 405-418
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms....Pages 419-433
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast....Pages 434-447
Protecting Secret Keys in a Compromised Computational System....Pages 448-462
StegFS: A Steganographic File System for Linux....Pages 463-477
Nonbinary Audio Cryptography....Pages 478-489
Back Matter....Pages -