Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, Volume 5

Front Cover
Fabien A. P. Petitcolas
Springer Science & Business Media, Jan 21, 2003 - Business & Economics - 426 pages
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Philips Research, The Netherlands), Andreas P?tzmann (Dresden University of Technology, Germany), Mike Reiter (Carnegie Mellon University, USA), and me. We all wish to thank all the authors of submissions for o?ering their papers for consideration. This year, contrary to the four previous workshops, the call for papers - quested anonymous submissions. However, anonymity was not compulsory and we did accept some papers in which the identity of the authors was clear. Each submission was assigned to three members of the program committee. Papers submitted by program committee members were assigned to four reviewers. The program committee relied on the advice of outside colleagues. We also insisted that 12 of the 27 accepted papers should be revised according to the comments of the reviewers.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

From the Abnormal to the Normal and Beyond
1
Eliminating Steganography in Internet Traffic with Active Wardens
18
Active Attacks on Several Mix Types
36
Limits of Anonymity in Open Environments
53
Confidentiality in the Face of Legal Threats
70
A Novel and Accurate Approach to Assessing the Performance of Multidimensional DistortionCompensated Dither Modulation
87
Robustness and Efficiency of Nonlinear SideInformed Watermarking
106
Security of Public Watermarking Schemes for Binary Sequences
119
Detectors for Echo Hiding Systems
247
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
258
Steganography Preserving Statistical Properties
278
BitPlane Decomposition Steganography Combined with JPEG2000 Compression
295
Breaking the F5 Algorithm
310
Detecting Low Embedding Rates
324
Detecting Hidden Messages Using HigherOrder Statistics and Support Vector Machines
340
Detection of LSB Steganography via Sample Pair Analysis
355

Direct Embedding and Detection of RST Invariant Watermarks
129
Robust Image Watermark Using Radon Transform and Bispectrum Invariants
145
Audio Watermark Robustness to Desynchronization via Beat Detection
160
Robust Watermarking and Affine Registration of 3D Meshes
177
Natural Language Watermarking and Tamperproofing1
196
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
213
Cryptanalysis of DiscreteSequence Spread Spectrum Watermarks
226
Hiding Data in DNA
373
Tracing the Source of a Shredded Document
387
A Stealthy Software Integrity Verification Primitive
400
Practical Oblivious Transfer Protocols
415
Author Index
427
Copyright

Other editions - View all

Common terms and phrases

About the author (2003)

Fabien A.P. Petitcolas received his Ph.D. from the University of Cambridge (UK). Petitcolas is employed by Microsoft Research Cambridge.