Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Volume 1

Front Cover
Ross Anderson
Springer Science & Business Media, Nov 13, 1996 - Business & Economics - 350 pages
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The History of Steganography
1
How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense at Best
7
Hiding Data in the OSI Network Model
23
Stretching the Limits of Steganography
39
Trials of Traced Traitors
49
Establishing Big Brother Using Covert Channels and Other Covert Techniques
65
Covert ChannelsA ContextBased View
73
Covert Channel Analysis for Stubs
95
A Secure Robust Watermark for Multimedia
185
Modulation and Information Hiding in Images
207
Watermarking Document Images with Bounding Box Expansion
227
The History of Subliminal Channels
237
Blind Decoding Blind Undeniable Signatures and Their Applications to Privacy Protection
257
Practical Invisibility in Digital Communication
265
Fractal Based Image Steganography
279
Echo Hiding
295

Anonymous Addresses and Confidentiality of Location
115
Location Management with Privacy
121
Hiding Routing Information
137
The Newton Channel
151
A Progress Report on SubliminalFree Channels
157
Modeling Cryptographic Protocols and Their Collusion Analysis
169
An Implementation
317
Oblivious Key Escrow
335
Her Majestys Orthography Service
345
Information Hiding Terminology
347
Index
Copyright

Other editions - View all

Common terms and phrases