Information Hiding

Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

Editors:

ISBN: 978-3-540-67182-4 (Print) 978-3-540-46514-0 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Fundamentals of Steganography

    1. No Access

      Book Chapter

      Pages 1-16

      An Information-Theoretic Approach to Steganography and Watermarking

    2. No Access

      Book Chapter

      Pages 17-28

      One-Time Hash Steganography

  3. Steganography: Paradigms and Examples

    1. No Access

      Book Chapter

      Pages 29-46

      Steganography Secure against Cover-Stego-Attacks

    2. No Access

      Book Chapter

      Pages 47-60

      Secure Steganographic Methods for Palette Images

    3. No Access

      Book Chapter

      Pages 61-76

      Attacks on Steganographic Systems

  4. Beyond Symmetric Steganography

    1. No Access

      Book Chapter

      Pages 77-87

      Developments in Steganography

    2. No Access

      Book Chapter

      Pages 88-100

      An Asymmetric Public Detection Watermarking Technique

    3. No Access

      Book Chapter

      Pages 101-116

      Zero Knowledge Watermark Detection

  5. Watermarking: Proving Ownership

    1. No Access

      Book Chapter

      Pages 117-133

      Proving Ownership of Digital Content

    2. No Access

      Book Chapter

      Pages 134-145

      Error- and Collusion-Secure Fingerprinting for Digital Data

  6. Watermarking: Detection and Decoding

    1. No Access

      Book Chapter

      Pages 146-158

      Computing the Probability of False Watermark Detection

    2. No Access

      Book Chapter

      Pages 159-171

      Optimum Decoding of Non-additive Full Frame DFT Watermarks

    3. No Access

      Book Chapter

      Pages 172-186

      Watermark Detection after Quantization Attacks

    4. No Access

      Book Chapter

      Pages 187-198

      Content-Based Watermarking for Image Authentication

  7. Watermarking: Embedding Techniques

    1. No Access

      Book Chapter

      Pages 199-210

      Fast Robust Template Matching for Affine Resistant Image Watermarks

    2. No Access

      Book Chapter

      Pages 211-236

      A Stochastic Approach to Content Adaptive Digital Image Watermarking

    3. No Access

      Book Chapter

      Pages 237-252

      Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation

  8. Watermarking: New Designs and Applications

    1. No Access

      Book Chapter

      Pages 253-269

      On the Design of a Watermarking System: Considerations and Rationales

    2. No Access

      Book Chapter

      Pages 270-285

      A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking

    3. No Access

      Book Chapter

      Pages 286-301

      Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware

previous Page of 2