default search action
5. Information Hiding 2002: Noordwijkerhout, The Netherlands
- Fabien A. P. Petitcolas:
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers. Lecture Notes in Computer Science 2578, Springer 2003, ISBN 3-540-00421-1
Information Hiding and Networking
- Kymie M. C. Tan, John McHugh, Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond. 1-17 - Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil:
Eliminating Steganography in Internet Traffic with Active Wardens. 18-35
Anonymity
- Andrei Serjantov, Roger Dingledine, Paul F. Syverson:
From a Trickle to a Flood: Active Attacks on Several Mix Types. 36-52 - Dogan Kesdogan, Dakshi Agrawal, Stefan Penz:
Limits of Anonymity in Open Environments. 53-69 - Richard Clayton, George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats. 70-86
Watermarking Fundamentals
- Fernando Pérez-González, Félix Balado:
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. 87-105 - Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon:
Robustness and Efficiency of Non-linear Side-Informed Watermarking. 106-118 - Qiming Li, Ee-Chien Chang:
Security of Public Watermarking Schemes for Binary Sequences. 119-128
Watermarking Algorithms I
- Peter A. Fletcher, Kieran G. Larkin:
Direct Embedding and Detection of RST Invariant Watermarks. 129-144 - Hyungshin Kim, Yunju Baek, Heung-Kyu Lee, Young-Ho Suh:
Robust Image Watermark Using Radon Transform and Bispectrum Invariants. 145-159 - Darko Kirovski, Hagai Attias:
Audio Watermark Robustness to Desynchronization via Beat Detection. 160-176
Watermarking Algorithms II
- Oliver Benedens:
Robust Watermarking and Affine Registration of 3D Meshes. 177-195 - Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing. 196-212
Attacks on Watermarking Algorithms
- Tri Van Le, Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. 213-225 - Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal:
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. 226-246 - Scott Craver, Bede Liu, Wayne H. Wolf:
Detectors for Echo Hiding Systems. 247-257
Steganography Algorithms
- Richard E. Newman, Ira S. Moskowitz, Liwu Chang, Murali M. Brahmadesam:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. 258-277 - Elke Franz:
Steganography Preserving Statistical Properties. 278-294 - Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. 295-309
Steganalysis I
- Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:
Steganalysis of JPEG Images: Breaking the F5 Algorithm. 310-323 - Andreas Westfeld:
Detecting Low Embedding Rates. 324-339
Steganalysis II
- Siwei Lyu, Hany Farid:
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. 340-354 - Sorina Dumitrescu, Xiaolin Wu, Zhe Wang:
Detection of LSB Steganography via Sample Pair Analysis. 355-372
Hiding Information in Unusual Content I
- Boris Shimanovsky, Jessica Feng, Miodrag Potkonjak:
Hiding Data in DNA. 373-386 - Jack Brassil:
Tracing the Source of a Shredded Document. 387-399
Hiding Information in Unusual Content II
- Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. 400-414 - Christian Tobias:
Practical Oblivious Transfer Protocols. 415-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.