


default search action
5. Information Hiding 2002: Noordwijkerhout, The Netherlands
- Fabien A. P. Petitcolas

:
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers. Lecture Notes in Computer Science 2578, Springer 2003, ISBN 3-540-00421-1
Information Hiding and Networking
- Kymie M. C. Tan, John McHugh, Kevin S. Killourhy:

Hiding Intrusions: From the Abnormal to the Normal and Beyond. 1-17 - Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil:

Eliminating Steganography in Internet Traffic with Active Wardens. 18-35
Anonymity
- Andrei Serjantov, Roger Dingledine, Paul F. Syverson:

From a Trickle to a Flood: Active Attacks on Several Mix Types. 36-52 - Dogan Kesdogan, Dakshi Agrawal, Stefan Penz:

Limits of Anonymity in Open Environments. 53-69 - Richard Clayton, George Danezis:

Chaffinch: Confidentiality in the Face of Legal Threats. 70-86
Watermarking Fundamentals
- Fernando Pérez-González, Félix Balado:

Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. 87-105 - Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon:

Robustness and Efficiency of Non-linear Side-Informed Watermarking. 106-118 - Qiming Li, Ee-Chien Chang

:
Security of Public Watermarking Schemes for Binary Sequences. 119-128
Watermarking Algorithms I
- Peter A. Fletcher, Kieran G. Larkin:

Direct Embedding and Detection of RST Invariant Watermarks. 129-144 - Hyungshin Kim, Yunju Baek, Heung-Kyu Lee, Young-Ho Suh:

Robust Image Watermark Using Radon Transform and Bispectrum Invariants. 145-159 - Darko Kirovski, Hagai Attias:

Audio Watermark Robustness to Desynchronization via Beat Detection. 160-176
Watermarking Algorithms II
- Oliver Benedens:

Robust Watermarking and Affine Registration of 3D Meshes. 177-195 - Mikhail J. Atallah, Victor Raskin, Christian Hempelmann

, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing. 196-212
Attacks on Watermarking Algorithms
- Tri Van Le, Yvo Desmedt:

Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. 213-225 - Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal:

Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. 226-246 - Scott Craver, Bede Liu, Wayne H. Wolf:

Detectors for Echo Hiding Systems. 247-257
Steganography Algorithms
- Richard E. Newman, Ira S. Moskowitz, Liwu Chang, Murali M. Brahmadesam:

A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. 258-277 - Elke Franz:

Steganography Preserving Statistical Properties. 278-294 - Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:

Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. 295-309
Steganalysis I
- Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:

Steganalysis of JPEG Images: Breaking the F5 Algorithm. 310-323 - Andreas Westfeld:

Detecting Low Embedding Rates. 324-339
Steganalysis II
- Siwei Lyu, Hany Farid:

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. 340-354 - Sorina Dumitrescu, Xiaolin Wu, Zhe Wang:

Detection of LSB Steganography via Sample Pair Analysis. 355-372
Hiding Information in Unusual Content I
- Boris Shimanovsky, Jessica Feng, Miodrag Potkonjak:

Hiding Data in DNA. 373-386 - Jack Brassil:

Tracing the Source of a Shredded Document. 387-399
Hiding Information in Unusual Content II
- Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski:

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. 400-414 - Christian Tobias:

Practical Oblivious Transfer Protocols. 415-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














