default search action
3. Information Hiding 1999: Dresden, Germany
- Andreas Pfitzmann:
Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings. Lecture Notes in Computer Science 1768, Springer 2000, ISBN 3-540-67182-X
Fundamentals of Steganography
- Thomas Mittelholzer:
An Information-Theoretic Approach to Steganography and Watermarking. 1-16 - Natori Shin:
One-Time Hash Steganography. 17-28
Steganography: Paradigms and Examples
- Elke Franz, Andreas Pfitzmann:
Steganography Secure against Cover-Stego-Attacks. 29-46 - Jiri Fridrich, Rui Du:
Secure Steganographic Methods for Palette Images. 47-60 - Andreas Westfeld, Andreas Pfitzmann:
Attacks on Steganographic Systems. 61-76
Beyond Symmetric Steganography
- Joshua R. Smith, Chris Dodge:
Developments in Steganography. 77-87 - Teddy Furon, Pierre Duhamel:
An Asymmetric Public Detection Watermarking Technique. 88-100 - Scott Craver:
Zero Knowledge Watermark Detection. 101-116
Watermarking: Proving Ownership
- André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving Ownership of Digital Content. 117-133 - Hans-Jürgen Guth, Birgit Pfitzmann:
Error- and Collusion-Secure Fingerprinting for Digital Data. 134-145
Watermarking: Detection and Decoding
- Matthew L. Miller, Jeffrey A. Bloom:
Computing the Probability of False Watermark Detection. 146-158 - Alessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva:
Optimum Decoding of Non-additive Full Frame DFT Watermarks. 159-171 - Joachim J. Eggers, Bernd Girod:
Watermark Detection after Quanization Attacks. 172-186 - Pedro Lamy, José Martinho, Tiago Rosa Maria Paula Queluz:
Content-Based Watermarking for Image Authentication. 187-198
Watermarking: Embedding Techniques
- Shelby Pereira, Thierry Pun:
Fast Robust Template Matching for Affine Resistant Image Watermarks. 199-210 - Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun:
A Stochastic Approach to Content Adaptive Digital Image Watermarking. 211-236 - Martin Kutter:
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation. 237-252
Watermarking: New Designs and Applications
- Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalker:
On the Design of a Watermarking System: Considerations and Rationales. 253-269 - Gabriela Csurka, Frédéric Deguillaume, Joseph Ó Ruanaidh, Thierry Pun:
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking. 270-285 - John C. Lach, William H. Mangione-Smith, Miodrag Potkonjak:
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. 286-301
Watermarking: Improving Robustness
- Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation. 302-317 - Neil F. Johnson, Zoran Duric, Sushil Jajodia:
Recovery of Watermarks from Distorted Images. 318-332 - Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:
Cocktail Watermarking on Images. 333-347
Watermarking and Sotware Protection
- Gang Qu, Miodrag Potkonjak:
Hiding Signatures in Graph Coloring Solutions. 348-367 - Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater:
Robust Object Watermarking: Application to Code. 368-378 - Enriquillo Valdez, Moti Yung:
Software DisEngineering: Program Hiding Architecture and Experiments. 379-394
The Difficulty of Separating Private and Public Information
- John McHugh:
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. 395-404 - Ira S. Moskowitz, Liwu Chang:
An Entropy-Based Framework for Database Inference. 405-418 - Talat Mert Dogu, Anthony Ephremides:
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms. 419-433 - Frank Stajano, Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. 434-447
Stego-Engineering
- William P. R. Mitchell:
Protecting Secret Keys in a Compromised Computational System. 448-462 - Andrew D. McDonald, Markus G. Kuhn:
StegFS: A Steganographic File System for Linux. 462-477 - Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater:
Nonbinary Audio Cryptography. 478-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.