Information Hiding Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2000.
|
Έκδοση: | 1st ed. 2000. |
Σειρά: | Lecture Notes in Computer Science,
1768 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Fundamentals of Steganography
- An Information-Theoretic Approach to Steganography and Watermarking
- One-Time Hash Steganography
- Steganography: Paradigms and Examples
- Steganography Secure against Cover-Stego-Attacks
- Secure Steganographic Methods for Palette Images
- Attacks on Steganographic Systems
- Beyond Symmetric Steganography
- Developments in Steganography
- An Asymmetric Public Detection Watermarking Technique
- Zero Knowledge Watermark Detection
- Watermarking: Proving Ownership
- Proving Ownership of Digital Content
- Error- and Collusion-Secure Fingerprinting for Digital Data
- Watermarking: Detection and Decoding
- Computing the Probability of False Watermark Detection
- Optimum Decoding of Non-additive Full Frame DFT Watermarks
- Watermark Detection after Quantization Attacks
- Content-Based Watermarking for Image Authentication
- Watermarking: Embedding Techniques
- Fast Robust Template Matching for Affine Resistant Image Watermarks
- A Stochastic Approach to Content Adaptive Digital Image Watermarking
- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
- Watermarking: New Designs and Applications
- On the Design of a Watermarking System: Considerations and Rationales
- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
- Watermarking: Improving Robustness
- Robust Watermarking for Images Based on Color Manipulation
- Recovery of Watermarks from Distorted Images
- Cocktail Watermarking on Images
- Watermarking and Software Protection
- Hiding Signatures in Graph Coloring Solutions
- Robust Object Watermarking: Application to Code
- Software DisEngineering: Program Hiding Architecture and Experiments
- The Difficulty of Separating Private and Public Information
- Chaffing at the Bit
- An Entropy-Based Framework for Database Inference
- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
- Stego-Engineering
- Protecting Secret Keys in a Compromised Computational System
- StegFS: A Steganographic File System for Linux
- Nonbinary Audio Cryptography.