![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
2. Information Hiding 1998: Portland, Oregon, USA
- David Aucsmith:
Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings. Lecture Notes in Computer Science 1525, Springer 1998, ISBN 3-540-65386-4
Steganography
- Daniel Gruhl, Walter Bender:
Information Hiding to Foil the Casual Counterfeiter. 1-15 - John C. Lach, William H. Mangione-Smith, Miodrag Potkonjak:
Fingerprinting Digital Circuits on Programmable Hardware. 16-31 - Andreas Westfeld, Gritta Wolf:
Steganography in a Video Conferencing System. 32-47 - Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter:
Reliable Blind Information Hiding for Images. 48-61 - Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater:
Cerebral Cryptography. 62-72
Other Applications
- Ross J. Anderson, Roger M. Needham, Adi Shamir:
The Steganographic File System. 73-82 - Dogan Kesdogan, Jan Egner, Roland Büschkes:
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. 83-98 - Gerrit Bleumer:
Biometric yet Privacy Protecting Person Authentication. 99-110 - Tomas Sander, Christian F. Tschudin:
On Software Protection via Function Hiding. 111-123 - Markus G. Kuhn
, Ross J. Anderson:
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. 124-142
Copyright Marking
- Jiri Fridrich, Arnold C. Baldoza, Richard J. Simard:
Robust Digital Watermarking Based on Key-Dependent Basis Functions. 143-157 - Jack Lacy, Schuyler R. Quackenbush, Amy R. Reibman
, James H. Snyder:
Intellectual Property Protection Systems and Digital Watermarking. 158-168 - Alexander Herrigel, Joseph Ó Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun:
Secure Copyright Protection Techniques for Digital Images. 169-190 - Juan Ramón Hernández, Fernando Pérez-González
:
Shedding More Light on Image Watermarks. 191-207 - Christian Neubauer, Jürgen Herre, Karlheinz Brandenburg:
Continuous Steganographic Data Transmission Using Uncompressed Audio. 208-217
Attacks
- Fabien A. P. Petitcolas
, Ross J. Anderson, Markus G. Kuhn
:
Attacks on Copyright Marking Systems. 218-238 - Sabrina Sowers, Abdou Youssef:
Testing Digital Watermark Resistance to Destruction. 239-257 - Jean-Paul M. G. Linnartz
, Marten van Dijk
:
Analysis of the Sensitivity Attack against Electronic Watermarks in Images. 258-272 - Neil F. Johnson, Sushil Jajodia:
Steganalysis of Images Created Using Current Steganography Software. 273-289 - Maurice Maes:
Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. 290-305
Theory
- Christian Cachin:
An Information-Theoretic Model for Steganography. 306-318 - Mark Ettinger:
Steganalysis and Game Equilibria. 319-328 - Jean-Paul M. G. Linnartz
, Ton Kalker, Geert Depovere:
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks. 329-343 - Jan Zöllner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf:
Modeling the Security of Steganographic Systems. 344-354 - Scott Craver:
On Public-Key Steganography in the Presence of an Active Warden. 355-368
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.