Information Hiding

Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

  • Andreas Pfitzmann
Conference proceedings IH 1999

DOI: 10.1007/10719724

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)

Table of contents (33 papers)

  1. Front Matter
  2. Fundamentals of Steganography

  3. Steganography: Paradigms and Examples

    1. Steganography Secure against Cover-Stego-Attacks
      Elke Franz, Andreas Pfitzmann
      Pages 29-46
    2. Secure Steganographic Methods for Palette Images
      Jiri Fridrich, Rui Du
      Pages 47-60
    3. Attacks on Steganographic Systems
      Andreas Westfeld, Andreas Pfitzmann
      Pages 61-76
  4. Beyond Symmetric Steganography

    1. Developments in Steganography
      Joshua R. Smith, Chris Dodge
      Pages 77-87
    2. An Asymmetric Public Detection Watermarking Technique
      Teddy Furon, Pierre Duhamel
      Pages 88-100
    3. Zero Knowledge Watermark Detection
      Scott Craver
      Pages 101-116
  5. Watermarking: Proving Ownership

    1. Proving Ownership of Digital Content
      André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
      Pages 117-133
    2. Error- and Collusion-Secure Fingerprinting for Digital Data
      Hans-Jürgen Guth, Birgit Pfitzmann
      Pages 134-145
  6. Watermarking: Detection and Decoding

    1. Computing the Probability of False Watermark Detection
      Matt L. Miller, Jeffrey A. Bloom
      Pages 146-158
    2. Optimum Decoding of Non-additive Full Frame DFT Watermarks
      Alessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva
      Pages 159-171
    3. Watermark Detection after Quantization Attacks
      Joachim J. Eggers, Bernd Girod
      Pages 172-186
    4. Content-Based Watermarking for Image Authentication
      Pedro Lamy, Jose’ Martinho, Tiago Rosa, Maria Paula Queluz
      Pages 187-198
  7. Watermarking: Embedding Techniques

    1. A Stochastic Approach to Content Adaptive Digital Image Watermarking
      Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
      Pages 211-236
  8. Watermarking: New Designs and Applications

    1. On the Design of a Watermarking System: Considerations and Rationales
      Jean-Paul Linnartz, Geert Depovere, Ton Kalker
      Pages 253-269
    2. A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
      Gabriella Csurka, Frédéric Deguillaume, Joseph J. K. Ó Ruanaidh, Thierry Pun
      Pages 270-285

About these proceedings

Keywords

Authentication Fingerprinting Image Watermarking Information Hiding Intellectual Property Protection Linux Softwares Protection Steganography Stego-Engineering Transformation Watermarking algorithms architecture cryptography

Editors and affiliations

  • Andreas Pfitzmann
    • 1
  1. 1.Faculty of Computer ScienceTU DresdenDresdenGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67182-4
  • Online ISBN 978-3-540-46514-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349