default search action
4. Information Hiding 2001: Pittsburgh, PA, USA
- Ira S. Moskowitz:
Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings. Lecture Notes in Computer Science 2137, Springer 2001, ISBN 3-540-42733-3 - Marshall W. Bern, Jeff Breidenbach, David Goldberg:
Trustworthy Paper Documents. 1-12 - Toby Sharp:
An Implementation of Key-Based Digital Signal Steganography. 13-26 - Miroslav Goljan, Jessica J. Fridrich, Rui Du:
Distortion-Free Data Embedding for Images. 27-41 - Valeri Korjik, Guillermo Morales-Luna:
Information Hiding through Noisy Channels. 42-50 - Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. 51-65 - Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak:
Computational Forensic Techniques for Intellectual Property Protection. 66-80 - Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak:
Intellectual Property Metering. 81-95 - Gang Qu:
Keyless Public Watermarking for Intellectual Property Authentication. 96-111 - Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann:
Efficiency Improvements of the Private Message Service. 112-125 - Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar:
A Reputation System to Increase MIX-Net Reliability. 126-141 - Justin Picard, Arnaud Robert:
Neural Networks Functions for Public Key Watermarking. 142-156 - Ramarathnam Venkatesan, Vijay V. Vazirani, Saurabh Sinha:
A Graph Theoretic Approach to Software Watermarking. 157-168 - Dimitris Thanos:
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks. 169-184 - Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik:
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. 185-199 - Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd Girod:
Digital Watermarking of Chemical Structure Sets. 200-214 - Tonda Benes:
The Strong Eternity Service. 215-229 - Richard Clayton, George Danezis, Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems. 230-244 - Adam Back, Ulf Möller, Anton Stiglic:
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. 245-257 - Julien P. Stern, Jean-Pierre Tillich:
Automatic Detection of a Watermarked Document Using a Private Key. 258-272 - André Adelsbach, Ahmad-Reza Sadeghi:
Zero-Knowledge Watermark Detection and Proof of Ownership. 273-288 - Andreas Westfeld:
F5-A Steganographic Algorithm. 289-302 - Hirofumi Muratani:
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. 303-315 - Ryo Sugihara:
Practical Capacity of Digital Watermarks. 316-329 - Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun:
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. 330-339 - Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueño, Stéphane Marchand-Maillet, Thierry Pun:
Second Generation Benchmarking and Application Oriented Evaluation. 340-353 - Darko Kirovski, Henrique S. Malvar:
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. 354-368 - Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino:
Hiding Association Rules by Using Confidence and Support. 369-383 - Ahmad-Reza Sadeghi:
How to Break a Semi-anonymous Fingerprinting Scheme. 384-394 - Julien Boeuf, Julien P. Stern:
An Analysis of One of the SDMI Candidates. 395-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.