


default search action
3. Information Hiding 1999: Dresden, Germany
- Andreas Pfitzmann:

Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings. Lecture Notes in Computer Science 1768, Springer 2000, ISBN 3-540-67182-X
Fundamentals of Steganography
- Thomas Mittelholzer:

An Information-Theoretic Approach to Steganography and Watermarking. 1-16 - Natori Shin:

One-Time Hash Steganography. 17-28
Steganography: Paradigms and Examples
- Elke Franz, Andreas Pfitzmann:

Steganography Secure against Cover-Stego-Attacks. 29-46 - Jiri Fridrich, Rui Du:

Secure Steganographic Methods for Palette Images. 47-60 - Andreas Westfeld, Andreas Pfitzmann:

Attacks on Steganographic Systems. 61-76
Beyond Symmetric Steganography
- Joshua R. Smith, Chris Dodge:

Developments in Steganography. 77-87 - Teddy Furon, Pierre Duhamel:

An Asymmetric Public Detection Watermarking Technique. 88-100 - Scott Craver:

Zero Knowledge Watermark Detection. 101-116
Watermarking: Proving Ownership
- André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi:

Proving Ownership of Digital Content. 117-133 - Hans-Jürgen Guth, Birgit Pfitzmann:

Error- and Collusion-Secure Fingerprinting for Digital Data. 134-145
Watermarking: Detection and Decoding
- Matthew L. Miller, Jeffrey A. Bloom:

Computing the Probability of False Watermark Detection. 146-158 - Alessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva:

Optimum Decoding of Non-additive Full Frame DFT Watermarks. 159-171 - Joachim J. Eggers, Bernd Girod:

Watermark Detection after Quanization Attacks. 172-186 - Pedro Lamy, José Martinho, Tiago Rosa Maria Paula Queluz:

Content-Based Watermarking for Image Authentication. 187-198
Watermarking: Embedding Techniques
- Shelby Pereira, Thierry Pun:

Fast Robust Template Matching for Affine Resistant Image Watermarks. 199-210 - Sviatoslav Voloshynovskiy

, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun:
A Stochastic Approach to Content Adaptive Digital Image Watermarking. 211-236 - Martin Kutter:

Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation. 237-252
Watermarking: New Designs and Applications
- Jean-Paul M. G. Linnartz

, Geert Depovere, Ton Kalker:
On the Design of a Watermarking System: Considerations and Rationales. 253-269 - Gabriela Csurka, Frédéric Deguillaume, Joseph Ó Ruanaidh, Thierry Pun:

A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking. 270-285 - John C. Lach, William H. Mangione-Smith, Miodrag Potkonjak:

Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. 286-301
Watermarking: Improving Robustness
- Sebastiano Battiato

, Dario Catalano, Giovanni Gallo
, Rosario Gennaro:
Robust Watermarking for Images Based on Color Manipulation. 302-317 - Neil F. Johnson, Zoran Duric, Sushil Jajodia:

Recovery of Watermarks from Distorted Images. 318-332 - Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:

Cocktail Watermarking on Images. 333-347
Watermarking and Sotware Protection
- Gang Qu, Miodrag Potkonjak:

Hiding Signatures in Graph Coloring Solutions. 348-367 - Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater:

Robust Object Watermarking: Application to Code. 368-378 - Enriquillo Valdez, Moti Yung:

Software DisEngineering: Program Hiding Architecture and Experiments. 379-394
The Difficulty of Separating Private and Public Information
- John McHugh:

Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. 395-404 - Ira S. Moskowitz, Liwu Chang:

An Entropy-Based Framework for Database Inference. 405-418 - Talat Mert Dogu, Anthony Ephremides:

Covert Information Transmission through the Use of Standard Collision Resolution Algorithms. 419-433 - Frank Stajano, Ross J. Anderson:

The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. 434-447
Stego-Engineering
- William P. R. Mitchell:

Protecting Secret Keys in a Compromised Computational System. 448-462 - Andrew D. McDonald, Markus G. Kuhn

:
StegFS: A Steganographic File System for Linux. 462-477 - Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater:

Nonbinary Audio Cryptography. 478-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














