This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is watermarking. The papers are organized in sections on fundamentals of steganography, paradigms and examples, beyond symmetric steganography; watermarking: proving ownership, detection and decoding, embedding techniques, new designs and applications, improving robustness, software protection; separating private and public information; and stego-engineering.
Author(s): Thomas Mittelholzer (auth.), Andreas Pfitzmann (eds.)
Series: Lecture Notes in Computer Science 1768
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000
Language: English
Pages: 492
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Multimedia Information Systems; Information Systems Applications (incl.Internet)
Front Matter....Pages -
An Information-Theoretic Approach to Steganography and Watermarking....Pages 1-16
One-Time Hash Steganography....Pages 17-28
Steganography Secure against Cover-Stego-Attacks....Pages 29-46
Secure Steganographic Methods for Palette Images....Pages 47-60
Attacks on Steganographic Systems....Pages 61-76
Developments in Steganography....Pages 77-87
An Asymmetric Public Detection Watermarking Technique....Pages 88-100
Zero Knowledge Watermark Detection....Pages 101-116
Proving Ownership of Digital Content....Pages 117-133
Error- and Collusion-Secure Fingerprinting for Digital Data....Pages 134-145
Computing the Probability of False Watermark Detection....Pages 146-158
Optimum Decoding of Non-additive Full Frame DFT Watermarks....Pages 159-171
Watermark Detection after Quantization Attacks....Pages 172-186
Content-Based Watermarking for Image Authentication....Pages 187-198
Fast Robust Template Matching for Affine Resistant Image Watermarks....Pages 199-210
A Stochastic Approach to Content Adaptive Digital Image Watermarking....Pages 211-236
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation....Pages 237-252
On the Design of a Watermarking System: Considerations and Rationales....Pages 253-269
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking....Pages 270-285
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware....Pages 286-301
Robust Watermarking for Images Based on Color Manipulation....Pages 302-317
Recovery of Watermarks from Distorted Images....Pages 318-332
Cocktail Watermarking on Images....Pages 333-347
Hiding Signatures in Graph Coloring Solutions....Pages 348-367
Robust Object Watermarking: Application to Code....Pages 368-378
Software DisEngineering: Program Hiding Architecture and Experiments....Pages 379-394
Chaffing at the Bit....Pages 395-404
An Entropy-Based Framework for Database Inference....Pages 405-418
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms....Pages 419-433
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast....Pages 434-447
Protecting Secret Keys in a Compromised Computational System....Pages 448-462
StegFS: A Steganographic File System for Linux....Pages 463-477
Nonbinary Audio Cryptography....Pages 478-489
Back Matter....Pages -