Information Hiding Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Pfitzmann, Andreas (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1768
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Fundamentals of Steganography
  • An Information-Theoretic Approach to Steganography and Watermarking
  • One-Time Hash Steganography
  • Steganography: Paradigms and Examples
  • Steganography Secure against Cover-Stego-Attacks
  • Secure Steganographic Methods for Palette Images
  • Attacks on Steganographic Systems
  • Beyond Symmetric Steganography
  • Developments in Steganography
  • An Asymmetric Public Detection Watermarking Technique
  • Zero Knowledge Watermark Detection
  • Watermarking: Proving Ownership
  • Proving Ownership of Digital Content
  • Error- and Collusion-Secure Fingerprinting for Digital Data
  • Watermarking: Detection and Decoding
  • Computing the Probability of False Watermark Detection
  • Optimum Decoding of Non-additive Full Frame DFT Watermarks
  • Watermark Detection after Quantization Attacks
  • Content-Based Watermarking for Image Authentication
  • Watermarking: Embedding Techniques
  • Fast Robust Template Matching for Affine Resistant Image Watermarks
  • A Stochastic Approach to Content Adaptive Digital Image Watermarking
  • Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
  • Watermarking: New Designs and Applications
  • On the Design of a Watermarking System: Considerations and Rationales
  • A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
  • Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
  • Watermarking: Improving Robustness
  • Robust Watermarking for Images Based on Color Manipulation
  • Recovery of Watermarks from Distorted Images
  • Cocktail Watermarking on Images
  • Watermarking and Software Protection
  • Hiding Signatures in Graph Coloring Solutions
  • Robust Object Watermarking: Application to Code
  • Software DisEngineering: Program Hiding Architecture and Experiments
  • The Difficulty of Separating Private and Public Information
  • Chaffing at the Bit
  • An Entropy-Based Framework for Database Inference
  • Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
  • The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
  • Stego-Engineering
  • Protecting Secret Keys in a Compromised Computational System
  • StegFS: A Steganographic File System for Linux
  • Nonbinary Audio Cryptography.