Advertisement

Information Hiding

Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

  • Andreas Pfitzmann

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)

Table of contents

  1. Front Matter
  2. Fundamentals of Steganography

  3. Steganography: Paradigms and Examples

    1. Elke Franz, Andreas Pfitzmann
      Pages 29-46
    2. Jiri Fridrich, Rui Du
      Pages 47-60
    3. Andreas Westfeld, Andreas Pfitzmann
      Pages 61-76
  4. Beyond Symmetric Steganography

    1. Joshua R. Smith, Chris Dodge
      Pages 77-87
    2. Teddy Furon, Pierre Duhamel
      Pages 88-100
    3. Scott Craver
      Pages 101-116
  5. Watermarking: Proving Ownership

    1. André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
      Pages 117-133
    2. Hans-Jürgen Guth, Birgit Pfitzmann
      Pages 134-145
  6. Watermarking: Detection and Decoding

    1. Matt L. Miller, Jeffrey A. Bloom
      Pages 146-158
    2. Alessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva
      Pages 159-171
    3. Joachim J. Eggers, Bernd Girod
      Pages 172-186
    4. Pedro Lamy, Jose’ Martinho, Tiago Rosa, Maria Paula Queluz
      Pages 187-198
  7. Watermarking: Embedding Techniques

    1. Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
      Pages 211-236
  8. Watermarking: New Designs and Applications

    1. Jean-Paul Linnartz, Geert Depovere, Ton Kalker
      Pages 253-269
    2. Gabriella Csurka, Frédéric Deguillaume, Joseph J. K. Ó Ruanaidh, Thierry Pun
      Pages 270-285
    3. John Lach, William H. Mangione-Smith, Miodrag Potkonjak
      Pages 286-301
  9. Watermarking: Improving Robustness

    1. Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro
      Pages 302-317
    2. Neil F. Johnson, Zoran Duric, Sushil Jajodia
      Pages 318-332
    3. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze
      Pages 333-347
  10. Watermarking and Software Protection

    1. Gang Qu, Miodrag Potkonjak
      Pages 348-367
    2. Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater
      Pages 368-378
  11. The Difficulty of Separating Private and Public Information

    1. John McHugh
      Pages 395-404
    2. Ira S. Moskowitz, LiWu Chang
      Pages 405-418
    3. Frank Stajano, Ross Anderson
      Pages 434-447
  12. Stego-Engineering

    1. Andrew D. McDonald, Markus G. Kuhn
      Pages 463-477
    2. Yvo Desmedt, Tri V. Le, Jean-Jacques Quisquater
      Pages 478-489
  13. Back Matter

About these proceedings

Keywords

Authentication Fingerprinting Image Watermarking Information Hiding Intellectual Property Protection Linux Softwares Protection Steganography Stego-Engineering Transformation Watermarking algorithms architecture cryptography

Editors and affiliations

  • Andreas Pfitzmann
    • 1
  1. 1.Faculty of Computer ScienceTU DresdenDresdenGermany

Bibliographic information

  • DOI https://doi.org/10.1007/10719724
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67182-4
  • Online ISBN 978-3-540-46514-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site