Information Hiding

Second International Workshop, IH’98 Portland, Oregon, USA, April 14–17, 1998 Proceedings

Conference proceedings IH 1998

DOI: 10.1007/3-540-49380-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Table of contents (25 papers)

  1. Front Matter
    Pages I-IX
  2. Steganography

    1. Daniel Gruhl, Walter Bender
      Pages 1-15
    2. John Lach, William H. Mangione-Smith, Miodrag Potkonjak
      Pages 16-31
    3. Andreas Westfeld, Gritta Wolf
      Pages 32-47
    4. Lisa M. Marvel, Charles G. Boncelet Jr, Charles T. Retter
      Pages 48-61
    5. Yvo G. Desmedt, Shuang Hou, Jean-Jacques Quisquater
      Pages 62-72
  3. Other Applications

    1. Ross Anderson, Roger Needham, Adi Shamir
      Pages 73-82
    2. Dogan Kesdogan, Jan Egner, Roland Büschkes
      Pages 83-98
    3. Tomas Sander, Christian F. Tschudin
      Pages 111-123
    4. Markus G. Kuhn, Ross J. Anderson
      Pages 124-142
  4. Copyright Marking

    1. Jiri Fridrich, Arnold C. Baldoza, Richard J. Simard
      Pages 143-157
    2. Jack Lacy, Schuyler R. Quackenbush, Amy Reibman, James H. Snyder
      Pages 158-168
    3. Alexander Herrigel, Joseph ó Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun
      Pages 169-190
    4. Juan Ramón Hernández, Fernando Pérez-González
      Pages 191-207
    5. Chr. Neubauer, J. Herre, K. Brandenburg
      Pages 208-217
  5. Attack

    1. Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn
      Pages 218-238
    2. Sabrina Sowers, Abdou Youssef
      Pages 239-257
    3. Jean -Paul M. G. Linnartz, Marten van Dijk
      Pages 258-272
    4. Neil F. Johnson, Sushil Jajodia
      Pages 273-289

About these proceedings

Introduction

The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in ‘stray’ communication channels, such as those which arise via shared resourcesin operating systems or the physical le- age of information through radio frequency emissions; and n ally, many workers in these elds drew inspiration from ‘classical’ hidden communication methods such as steganography and spread-spectrum radio. The rst international workshop on this new emergent discipline of inf- mation hiding was organised by Ross Anderson and held at the Isaac Newton Institute, Cambridge, from the 30th May to the 1st June 1996, and was judged by attendees to be a successful and signi cant event. In addition to a number of research papers, we had invited talks from David Kahn on the history of steganography and from Gus Simmons on the history of subliminal channels. We also had a number of discussion sessions, culminating in a series of votes on common terms and de nitions. These papers and talks, together with minutes of the discussion, can be found in the proceedings, which are published in this series as Volume 1174.

Keywords

Copyright Marking Digital Cash electronic commerce information hiding watermarking

Bibliographic information

  • Copyright Information Springer-Verlag 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-65386-8
  • Online ISBN 978-3-540-49380-8
  • Series Print ISSN 0302-9743