Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Volume 5 (Google eBook)

Front Cover
Fabien A. P. Petitcolas
Springer, Jan 21, 2003 - Business & Economics - 426 pages
0 Reviews

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.

  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Related books

Contents

From the Abnormal to the Normal and Beyond
1
Eliminating Steganography in Internet Traffic with Active Wardens
18
Active Attacks on Several Mix Types
36
Limits of Anonymity in Open Environments
53
Confidentiality in the Face of Legal Threats
70
A Novel and Accurate Approach to Assessing the Performance of Multidimensional DistortionCompensated Dither Modulation
87
Robustness and Efficiency of Nonlinear SideInformed Watermarking
106
Security of Public Watermarking Schemes for Binary Sequences
119
Detectors for Echo Hiding Systems
247
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
258
Steganography Preserving Statistical Properties
278
BitPlane Decomposition Steganography Combined with JPEG2000 Compression
295
Breaking the F5 Algorithm
310
Detecting Low Embedding Rates
324
Detecting Hidden Messages Using HigherOrder Statistics and Support Vector Machines
340
Detection of LSB Steganography via Sample Pair Analysis
355

Direct Embedding and Detection of RST Invariant Watermarks
129
Robust Image Watermark Using Radon Transform and Bispectrum Invariants
145
Audio Watermark Robustness to Desynchronization via Beat Detection
160
Robust Watermarking and Affine Registration of 3D Meshes
177
Natural Language Watermarking and Tamperproofing
196
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
213
Cryptanalysis of DiscreteSequence Spread Spectrum Watermarks
226
Hiding Data in DNA
373
Tracing the Source of a Shredded Document
387
A Stealthy Software Integrity Verification Primitive
400
Practical Oblivious Transfer Protocols
415
Author Index
427
Copyright

Common terms and phrases

References from web pages

1. Information Hiding 1996: Cambridge, uk
Ross J. Anderson (Ed.): Information Hiding, First International Workshop, Cambridge, uk, May 30 - June 1, 1996, Proceedings. ...
www.informatik.uni-trier.de/ ~ley/ db/ conf/ ih/ ih96.html

On the Limitations of Digital Watermarks: A Cautionary Note
On the Limitations of Digital Watermarks: A Cautionary Note. Stephen Wolthusen. Fraunhofer-Institute for Computer Graphics. 64283 Darmstadt, Germany ...
www.wolthusen.com/ publications/ SCI1998.pdf

Livros online: marka.pt
Título : Information Hiding First International Workshop, Cambridge, uk, May 30-June 1, 1996 - Proceedings. Tipo : Livro. Autor : Anderson, Ross ...
www.marka.pt/ (S(mdihot45dkhwovjmz1u5z345))/ Produto.Aspx?Artigo=00567277

About the author (2003)

Fabien A.P. Petitcolas received his Ph.D. from the University of Cambridge (UK). Petitcolas is employed by Microsoft Research Cambridge.