6. MM&Sec 2004: Magdeburg, Germany

Steganography I

Attack and evaluation

Steganography II

Security

Watermarking algorithms

Authentication I

Robust digital watermarking

Authentication II