Information Hiding

Second International Workshop, IH’98 Portland, Oregon, USA, April 14–17, 1998 Proceedings

ISBN: 978-3-540-65386-8 (Print) 978-3-540-49380-8 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages I-IX

  2. Steganography

    1. No Access

      Book Chapter

      Pages 1-15

      Information Hiding to Foil the Casual Counterfeiter

    2. No Access

      Book Chapter

      Pages 16-31

      Fingerprinting Digital Circuits on Programmable Hardware

    3. No Access

      Book Chapter

      Pages 32-47

      Steganography in a Video Conferencing System

    4. No Access

      Book Chapter

      Pages 48-61

      Reliable Blind Information Hiding for Images

    5. No Access

      Book Chapter

      Pages 62-72

      Cerebral Cryptography

  3. Other Applications

    1. No Access

      Book Chapter

      Pages 73-82

      The Steganographic File System

    2. No Access

      Book Chapter

      Pages 83-98

      Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System

    3. No Access

      Book Chapter

      Pages 99-110

      Biometric yet Privacy Protecting Person Authentication

    4. No Access

      Book Chapter

      Pages 111-123

      On Software Protection via Function Hiding

    5. No Access

      Book Chapter

      Pages 124-142

      Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations

  4. Copyright Marking

    1. No Access

      Book Chapter

      Pages 143-157

      Robust Digital Watermarking Based on Key-Dependent Basis Functions

    2. No Access

      Book Chapter

      Pages 158-168

      Intellectual Property Protection Systems and Digital Watermarking

    3. No Access

      Book Chapter

      Pages 169-190

      Secure Copyright Protection Techniques for Digital Images

    4. No Access

      Book Chapter

      Pages 191-207

      Shedding More Light on Image Watermarks

    5. No Access

      Book Chapter

      Pages 208-217

      Continuous Steganographic Data Transmission Using Uncompressed Audio

  5. Attack

    1. No Access

      Book Chapter

      Pages 218-238

      Attacks on Copyright Marking Systems

    2. No Access

      Book Chapter

      Pages 239-257

      Testing Digital Watermark Resistance to Destruction

    3. No Access

      Book Chapter

      Pages 258-272

      Analysis of the Sensitivity Attack against Electronic Watermarks in Images

    4. No Access

      Book Chapter

      Pages 273-289

      Steganalysis of Images Created Using Current Steganography Software

    5. No Access

      Book Chapter

      Pages 290-305

      Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks

previous Page of 2