Book Volume 1174 1996

Information Hiding

First International Workshop Cambridge, U.K., May 30 – June 1, 1996 Proceedings

Editors:

ISBN: 978-3-540-61996-3 (Print) 978-3-540-49589-5 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-5

    The history of steganography

  3. Chapter

    Pages 7-21

    Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

  4. Chapter

    Pages 23-38

    Hiding data in the OSI network model

  5. Chapter

    Pages 39-48

    Stretching the limits of steganography

  6. Chapter

    Pages 49-64

    Trials of traced traitors

  7. Chapter

    Pages 65-71

    Establishing big brother using covert channels and other covert techniques

  8. Chapter

    Pages 73-93

    Covert channels—A context-based view

  9. Chapter

    Pages 95-113

    Covert channel analysis for Stubs

  10. Chapter

    Pages 115-120

    Anonymous addresses and confidentiality of location

  11. Chapter

    Pages 121-135

    MIXes in mobile communication systems: Location management with privacy

  12. Chapter

    Pages 137-150

    Hiding Routing information

  13. Chapter

    Pages 151-156

    The Newton channel

  14. Chapter

    Pages 157-168

    A progress report on subliminal-free channels

  15. Chapter

    Pages 169-184

    Modeling cryptographic protocols and their collusion analysis

  16. Chapter

    Pages 185-206

    A secure, robust watermark for multimedia

  17. Chapter

    Pages 207-226

    Modulation and information hiding in images

  18. Chapter

    Pages 227-235

    Watermarking document images with bounding box expansion

  19. Chapter

    Pages 237-256

    The history of subliminal channels

  20. Chapter

    Pages 257-264

    Blind decoding, blind undeniable signatures, and their applications to privacy protection

  21. Chapter

    Pages 265-278

    Practical invisibility in digital communication

previous Page of 2