Information Hiding

4th International Workshop, IH 2001 Pittsburgh, PA, USA, April 25–27, 2001 Proceedings

  • Ira S. Moskowitz
Conference proceedings IH 2001

DOI: 10.1007/3-540-45496-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2137)

Table of contents (29 papers)

  1. Front Matter
    Pages I-VIII
  2. Trustworthy Paper Documents
    Marshall Bern, Jeff Breidenbach, David Goldberg
    Pages 1-12
  3. Distortion-Free Data Embedding for Images
    Miroslav Goljan, Jessica J. Fridrich, Rui Du
    Pages 27-41
  4. Information Hiding through Noisy Channels
    Valeri Korjik, Guillermo Morales-Luna
    Pages 42-50
  5. Computational Forensic Techniques for Intellectual Property Protection
    Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak
    Pages 66-81
  6. Intellectual Property Metering
    Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
    Pages 81-95
  7. Efficiency Improvements of the Private Message Service
    Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann
    Pages 112-125
  8. A Reputation System to Increase MIX-Net Reliability
    Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar
    Pages 126-141
  9. Neural Networks Functions for Public Key Watermarking
    Justin Picard, Arnaud Robert
    Pages 142-156
  10. A Graph Theoretic Approach to Software Watermarking
    Ramarathnam Venkatesan, Vijay Vazirani, Saurabh Sinha
    Pages 157-168
  11. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
    Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed et al.
    Pages 185-200
  12. Digital Watermarking of Chemical Structure Sets
    Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd Girod
    Pages 200-214
  13. The Strong Eternity Service
    Tonda Beneš
    Pages 215-229
  14. Real World Patterns of Failure in Anonymity Systems
    Richard Clayton, George Danezis, Markus G. Kuhn
    Pages 230-245
  15. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
    Adam Back, Ulf Möller, Anton Stiglic
    Pages 245-257
  16. Automatic Detection of a Watermarked Document Using a Private Key
    Julien P. Stern, Jean-Pierre Tillich
    Pages 258-272

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.

Keywords

Information hiding anonymous communication audio authentication communication fingerprinting image watermarking information intellectual property protection privacy software protection stego-engineering video watermarking

Editors and affiliations

  • Ira S. Moskowitz
    • 1
  1. 1.Naval Research LaboratoryWashingtonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42733-9
  • Online ISBN 978-3-540-45496-0
  • Series Print ISSN 0302-9743