


default search action
4. Information Hiding 2001: Pittsburgh, PA, USA
- Ira S. Moskowitz:

Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings. Lecture Notes in Computer Science 2137, Springer 2001, ISBN 3-540-42733-3 - Marshall W. Bern, Jeff Breidenbach, David Goldberg:

Trustworthy Paper Documents. 1-12 - Toby Sharp:

An Implementation of Key-Based Digital Signal Steganography. 13-26 - Miroslav Goljan, Jessica J. Fridrich, Rui Du:

Distortion-Free Data Embedding for Images. 27-41 - Valeri Korjik, Guillermo Morales-Luna

:
Information Hiding through Noisy Channels. 42-50 - Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:

A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. 51-65 - Jennifer L. Wong

, Darko Kirovski, Miodrag Potkonjak:
Computational Forensic Techniques for Intellectual Property Protection. 66-80 - Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak:

Intellectual Property Metering. 81-95 - Gang Qu:

Keyless Public Watermarking for Intellectual Property Authentication. 96-111 - Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann:

Efficiency Improvements of the Private Message Service. 112-125 - Roger Dingledine, Michael J. Freedman, David Hopwood

, David Molnar:
A Reputation System to Increase MIX-Net Reliability. 126-141 - Justin Picard, Arnaud Robert:

Neural Networks Functions for Public Key Watermarking. 142-156 - Ramarathnam Venkatesan, Vijay V. Vazirani, Saurabh Sinha:

A Graph Theoretic Approach to Software Watermarking. 157-168 - Dimitris Thanos:

COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks. 169-184 - Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann

, Florian Kerschbaum, Dina Mohamed, Sanket Naik:
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. 185-199 - Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd Girod:

Digital Watermarking of Chemical Structure Sets. 200-214 - Tonda Benes:

The Strong Eternity Service. 215-229 - Richard Clayton, George Danezis, Markus G. Kuhn

:
Real World Patterns of Failure in Anonymity Systems. 230-244 - Adam Back, Ulf Möller, Anton Stiglic:

Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. 245-257 - Julien P. Stern, Jean-Pierre Tillich:

Automatic Detection of a Watermarked Document Using a Private Key. 258-272 - André Adelsbach, Ahmad-Reza Sadeghi:

Zero-Knowledge Watermark Detection and Proof of Ownership. 273-288 - Andreas Westfeld:

F5-A Steganographic Algorithm. 289-302 - Hirofumi Muratani:

A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. 303-315 - Ryo Sugihara:

Practical Capacity of Digital Watermarks. 316-329 - Sviatoslav Voloshynovskiy

, Alexander Herrigel, Thierry Pun:
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. 330-339 - Shelby Pereira, Sviatoslav Voloshynovskiy

, Maribel Madueño, Stéphane Marchand-Maillet, Thierry Pun:
Second Generation Benchmarking and Application Oriented Evaluation. 340-353 - Darko Kirovski, Henrique S. Malvar:

Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. 354-368 - Elena Dasseni, Vassilios S. Verykios

, Ahmed K. Elmagarmid, Elisa Bertino:
Hiding Association Rules by Using Confidence and Support. 369-383 - Ahmad-Reza Sadeghi:

How to Break a Semi-anonymous Fingerprinting Scheme. 384-394 - Julien Boeuf, Julien P. Stern:

An Analysis of One of the SDMI Candidates. 395-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














