Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

Front Cover
Ira S. Moskowitz
Springer Science & Business Media, Nov 7, 2001 - Computers - 414 pages
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Trustworthy Paper Documents
1
An Implementation of KeyBased Digital Signal Steganography
13
DistortionFree Data Embedding for Images
27
Information Hiding through Noisy Channels
42
A Tool for Robust Audio Identification and Information Hiding
51
Computational Forensic Techniques for Intellectual Property Protection
66
Intellectual Property Metering
81
Keyless Public Watermarking for Intellectual Property Authentication
96
Real World Patterns of Failurein Anonymity Systems
230
Traffic Analysis Attacks and TradeOffs in Anonymity Providing Systems
245
Automatic Detection of a Watermarked Document Using a Private Key
258
ZeroKnowledge Watermark Detection and Proof of Ownership
273
F5A Steganographic Algorithm
289
A CollusionSecure Fingerprinting Code Reduced by Chinese Remaindering and Its RandomError Resilience
303
Practical Capacity of Digital Watermarks
316
BlurDeblur Attack against Document Protection Systems Based on Digital Watermarking
330

Efficiency Improvements of the Private Message Service
112
A Reputation System to Increase MIXNet Reliability
126
Neural Networks Functions for Public Key Watermarking
142
A Graph Theoretic Approach to Software Watermarking
157
A Model for the Dissemination of Copyrighted Video Streams over Open Networks
169
Design Analysis and a ProofofConcept Implementation
185
Digital Watermarking of Chemical Structure Sets
200
The Strong Eternity Service
215
Second Generation Benchmarking and Application Oriented Evaluation
340
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
354
Hiding Association Rules by Using Confidence and Support
369
How to Break a Semianonymous Fingerprinting Scheme
384
An Analysis of One of the SDMI Candidates
395
Author Index
411
Copyright

Other editions - View all

Common terms and phrases