The Resource Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings, Ira S. Moskowitz, ed

Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings, Ira S. Moskowitz, ed

Label
Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings
Title
Information hiding
Title remainder
4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings
Statement of responsibility
Ira S. Moskowitz, ed
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
DLC
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I49 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
IH 2001
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1956-
http://library.link/vocab/relatedWorkOrContributorName
Moskowitz, Ira S.
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • canal caché
  • copyright
  • filigrane
  • authentification
  • protection logiciel
  • empreinte digitale
  • stéganographie
  • cryptographie
  • Sécurité informatique
  • Protection de l'information (Informatique)
  • Computer security
  • Data protection
  • Informatie
  • Geheimen
  • Systèmes informatiques
  • Protection de l'information (informatique)
  • Authentifikation
  • Elektronische Publikation
  • Elektronisches Wasserzeichen
  • Geheimnisprinzip
  • Kongress
Label
Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings, Ira S. Moskowitz, ed
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Perceptual audio hashing algorithm: a tool for robust audio identification and information hiding
  • M. Kivanç Mihçak and Ramarathnam Venkatesan
  • Computational forensic techniques for intellectual property protection
  • Jennifer L. Wong, Darko Kirovski, and Miodrag Potkonjak
  • Intellectual property metering
  • Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak
  • Keyless public watermarking for intellectual property authentication
  • Gang Qu
  • Efficiency improvements of the private message service
  • Oliver Berthold [and others]
  • Trustworthy paper documents
  • Reputation system to increase MIX-net reliability
  • Roger Dingledine [and others]
  • Neural networks functions for public key watermarking
  • Justin Picard and Arnaud Robert
  • Graph theoretic approach to software watermarking
  • Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha
  • COiN-video: a model for the dissemination of copyrighted video streams over open networks
  • Dimitris Thanos
  • Natural language watermarking: design, analysis, and a proof-of-concept implementation
  • Mikhail J. Atallah [and others]
  • Marshall Bern, Jeff Breidenbach, and David Goldberg
  • Digital watermarking of chemical structure sets
  • Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, and Bernd Girod
  • Strong eternity service
  • Tonda Beneš
  • Real world patterns of failure in anonymity systems
  • Richard Clayton, George Danezis, and Markus G. Kuhn
  • Traffic analysis attacks and trade-offs in anonymity providing systems
  • Adam Back, Ulf Möller, and Anton Stiglic
  • Automatic detection of a watermarked document using a private key
  • Julien P. Stern and Jean-Pierre Tillich
  • Implementation of key-based digital signal steganography
  • Zero-knowledge watermark detection and proof of ownership
  • Andre Adelsbach and Ahmad-Reza Sadeghi
  • F5 -- a steganographic algorithm: high capacity despite better steganalysis
  • Andreas Westfeld
  • Collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience
  • Hirofumi Muratani
  • Practical capacity of digital watermarks
  • Ryo Sugihara
  • Blur/deblur attack against document protection systems based on digital watermarking
  • Sviatoslav Voloshynovskiy, Alexander Herrigel, and Thierry Pun
  • Toby Sharp
  • Second generation benchmarking and application oriented evaluation
  • Shelby Pereira [and others]
  • Robust covert communication over a public audio channel using spread spectrum
  • Darko Kirovski and Henrique Malvar
  • Hiding association rules by using confidence and support
  • Elena Dasseni [and others]
  • How to break a semi-anonymous fingerprinting scheme
  • Ahmad-Reza Sadeghi
  • Analysis of one of the SDMI candidates
  • Julien Boeuf and Julien P. Stern
  • Distortion-free data embedding for images
  • Miroslav Goljan, Jessica J. Fridrich, and Rui Du
  • Information hiding through noisy channels
  • Valeri Korjik and Guillermo Morales-Luna
Dimensions
24 cm.
Dimensions
unknown
Extent
viii, 412 pages
Isbn
9783540427339
Lccn
2001055071
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48383520
  • (OCoLC)ocm48383520
Label
Information hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings, Ira S. Moskowitz, ed
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Perceptual audio hashing algorithm: a tool for robust audio identification and information hiding
  • M. Kivanç Mihçak and Ramarathnam Venkatesan
  • Computational forensic techniques for intellectual property protection
  • Jennifer L. Wong, Darko Kirovski, and Miodrag Potkonjak
  • Intellectual property metering
  • Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak
  • Keyless public watermarking for intellectual property authentication
  • Gang Qu
  • Efficiency improvements of the private message service
  • Oliver Berthold [and others]
  • Trustworthy paper documents
  • Reputation system to increase MIX-net reliability
  • Roger Dingledine [and others]
  • Neural networks functions for public key watermarking
  • Justin Picard and Arnaud Robert
  • Graph theoretic approach to software watermarking
  • Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha
  • COiN-video: a model for the dissemination of copyrighted video streams over open networks
  • Dimitris Thanos
  • Natural language watermarking: design, analysis, and a proof-of-concept implementation
  • Mikhail J. Atallah [and others]
  • Marshall Bern, Jeff Breidenbach, and David Goldberg
  • Digital watermarking of chemical structure sets
  • Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, and Bernd Girod
  • Strong eternity service
  • Tonda Beneš
  • Real world patterns of failure in anonymity systems
  • Richard Clayton, George Danezis, and Markus G. Kuhn
  • Traffic analysis attacks and trade-offs in anonymity providing systems
  • Adam Back, Ulf Möller, and Anton Stiglic
  • Automatic detection of a watermarked document using a private key
  • Julien P. Stern and Jean-Pierre Tillich
  • Implementation of key-based digital signal steganography
  • Zero-knowledge watermark detection and proof of ownership
  • Andre Adelsbach and Ahmad-Reza Sadeghi
  • F5 -- a steganographic algorithm: high capacity despite better steganalysis
  • Andreas Westfeld
  • Collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience
  • Hirofumi Muratani
  • Practical capacity of digital watermarks
  • Ryo Sugihara
  • Blur/deblur attack against document protection systems based on digital watermarking
  • Sviatoslav Voloshynovskiy, Alexander Herrigel, and Thierry Pun
  • Toby Sharp
  • Second generation benchmarking and application oriented evaluation
  • Shelby Pereira [and others]
  • Robust covert communication over a public audio channel using spread spectrum
  • Darko Kirovski and Henrique Malvar
  • Hiding association rules by using confidence and support
  • Elena Dasseni [and others]
  • How to break a semi-anonymous fingerprinting scheme
  • Ahmad-Reza Sadeghi
  • Analysis of one of the SDMI candidates
  • Julien Boeuf and Julien P. Stern
  • Distortion-free data embedding for images
  • Miroslav Goljan, Jessica J. Fridrich, and Rui Du
  • Information hiding through noisy channels
  • Valeri Korjik and Guillermo Morales-Luna
Dimensions
24 cm.
Dimensions
unknown
Extent
viii, 412 pages
Isbn
9783540427339
Lccn
2001055071
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48383520
  • (OCoLC)ocm48383520

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...