Contents
Introduction......................1
Cover Story.......................2
Preproceedings Note...............2
Wednesday, 25 April 2001
Trustworthy Paper Documents.......3
An Implementation of Key-Based
Digital Signal Steganography..15
Distortion-Free Data Embedding for
Images........................31
Information Hiding Through Noisy
Channels......................47
A Tool for Robust Audio Infor-
mation Hiding: A Perceptual
Audio Hashing Algorithm.......55
Computation Forensic Techniques
for Intellectual Property
Protection....................71
Intellectual Property Metering...87
Keyless Public Watermarking for
Intellectual Property
Authentication...............103
Efficiency Improvements of the
Private Message Service......119
A Reputation System to Increase
MIX-net Reliability..........133
Thursday, 26 April 2001
Neural Networks Functions for
Public Key Watermarking......149
A Graph Theoretic Approach to
Software Watermarking........165
COiN-Video: A Model for the
Dissemination of Copyrighted
Video Streams Over Open
Networks.....................177
Natural Language Watermarking:
Design, Analysis, and a Proof-
of-Concept Implementation....193
Digital Watermarking of Chemical
Structure Sets...............209
The Strong Eternity Service.....225
Real World Patterns of Failure in
Anonymity Systems............241
Traffic Analysis Attacks and
Trade-Offs in Anonymity
Providing Systems............257
Automatic Detection of a
Watermarked Document Using a
Private Key..................269
Zero-Knowledge Watermark Detection
and Proof of Ownership.......285
High Capacity Despite Better
Steganalysis: F5-A Stegano-
graphic Algorithm............301
A Collusion-Secure Fingerprinting
Code Reduced by Chinese
Remaindering and its Random-
Error Resilience.............315
Practical Capacity of Digital
Watermarks...................329
Blur/Deblur Attack Against Doc-
ument Protection Systems Based
on Digital Watermarking......343
Second Generation Benchmarking and
Application Oriented
Evaluation...................351
Robust Covert Communication Over a
Public Audio Channel Using
Spread Spectrum..............363
Hiding Association Rules by Using
Confidence and Support.......379
How to Break a Semi-Anonymous
Fingerprinting Scheme........395
An Analysis of One of the SDMI
Candidates...................407
Reading Between the Lines: Lessons
from the SDMI Challenge......423
Author Index....................425
Keywords
Algorithm, MIX-net, Watermarking, Fingerprinting, SDMI