The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Pre-proceedings of the 4th Information Hiding Workshop

Entry type

proceedings

Key alpha

Moskowitz

Publication Date

0000-00-00

Contents

Introduction......................1 Cover Story.......................2 Preproceedings Note...............2 Wednesday, 25 April 2001 Trustworthy Paper Documents.......3 An Implementation of Key-Based Digital Signal Steganography..15 Distortion-Free Data Embedding for Images........................31 Information Hiding Through Noisy Channels......................47 A Tool for Robust Audio Infor- mation Hiding: A Perceptual Audio Hashing Algorithm.......55 Computation Forensic Techniques for Intellectual Property Protection....................71 Intellectual Property Metering...87 Keyless Public Watermarking for Intellectual Property Authentication...............103 Efficiency Improvements of the Private Message Service......119 A Reputation System to Increase MIX-net Reliability..........133 Thursday, 26 April 2001 Neural Networks Functions for Public Key Watermarking......149 A Graph Theoretic Approach to Software Watermarking........165 COiN-Video: A Model for the Dissemination of Copyrighted Video Streams Over Open Networks.....................177 Natural Language Watermarking: Design, Analysis, and a Proof- of-Concept Implementation....193 Digital Watermarking of Chemical Structure Sets...............209 The Strong Eternity Service.....225 Real World Patterns of Failure in Anonymity Systems............241 Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems............257 Automatic Detection of a Watermarked Document Using a Private Key..................269 Zero-Knowledge Watermark Detection and Proof of Ownership.......285 High Capacity Despite Better Steganalysis: F5-A Stegano- graphic Algorithm............301 A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and its Random- Error Resilience.............315 Practical Capacity of Digital Watermarks...................329 Blur/Deblur Attack Against Doc- ument Protection Systems Based on Digital Watermarking......343 Second Generation Benchmarking and Application Oriented Evaluation...................351 Robust Covert Communication Over a Public Audio Channel Using Spread Spectrum..............363 Hiding Association Rules by Using Confidence and Support.......379 How to Break a Semi-Anonymous Fingerprinting Scheme........395 An Analysis of One of the SDMI Candidates...................407 Reading Between the Lines: Lessons from the SDMI Challenge......423 Author Index....................425

Copyright

2001

Keywords

Algorithm, MIX-net, Watermarking, Fingerprinting, SDMI

Language

English

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.