Information Hiding

First International Workshop Cambridge, U.K., May 30 – June 1, 1996 Proceedings

Editors:

ISBN: 978-3-540-61996-3 (Print) 978-3-540-49589-5 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-5

    The history of steganography

  2. No Access

    Book Chapter

    Pages 7-21

    Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

  3. No Access

    Book Chapter

    Pages 23-38

    Hiding data in the OSI network model

  4. No Access

    Book Chapter

    Pages 39-48

    Stretching the limits of steganography

  5. No Access

    Book Chapter

    Pages 49-64

    Trials of traced traitors

  6. No Access

    Book Chapter

    Pages 65-71

    Establishing big brother using covert channels and other covert techniques

  7. No Access

    Book Chapter

    Pages 73-93

    Covert channels—A context-based view

  8. No Access

    Book Chapter

    Pages 95-113

    Covert channel analysis for Stubs

  9. No Access

    Book Chapter

    Pages 115-120

    Anonymous addresses and confidentiality of location

  10. No Access

    Book Chapter

    Pages 121-135

    MIXes in mobile communication systems: Location management with privacy

  11. No Access

    Book Chapter

    Pages 137-150

    Hiding Routing information

  12. No Access

    Book Chapter

    Pages 151-156

    The Newton channel

  13. No Access

    Book Chapter

    Pages 157-168

    A progress report on subliminal-free channels

  14. No Access

    Book Chapter

    Pages 169-184

    Modeling cryptographic protocols and their collusion analysis

  15. No Access

    Book Chapter

    Pages 185-206

    A secure, robust watermark for multimedia

  16. No Access

    Book Chapter

    Pages 207-226

    Modulation and information hiding in images

  17. No Access

    Book Chapter

    Pages 227-235

    Watermarking document images with bounding box expansion

  18. No Access

    Book Chapter

    Pages 237-256

    The history of subliminal channels

  19. No Access

    Book Chapter

    Pages 257-264

    Blind decoding, blind undeniable signatures, and their applications to privacy protection

  20. No Access

    Book Chapter

    Pages 265-278

    Practical invisibility in digital communication

previous Page of 2