Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008363688/catalog> ?p ?o. }
Showing items 1 to 35 of
35
with 100 items per page.
- catalog abstract "Now that I have compiled these proceedings, it is a great pleasure to thank all involved. The ?rst thanks go to the scienti?c community interested in hiding infor- tion or in stopping other people doing this. At the initiative of Ross Anderson in 1995, we came together for the ?rst international meeting at IH’96 in C- bridge,andsubsequently met atIH’98in Portland.Our communitynowconsists of about 200 people collaborating around the world – and making remarkable progress.Itis ourcommonconvictionthatinthe longrun,muchmoresecurityis achievedbyopendiscussionandpublicselectionofmechanismsandimplemen- tionsthanby”securitybyobscurity”.Thisisespeciallytrueforlargecommercial systems, and it is most probably also true within the ?eld of information hiding. Trying to hide the design and implementation of hiding mechanisms may be particularly tempting – since hiding is an issue anyway. But as shown by the breaks of quite a few digital copy- protection systems within the last few years, ”security by obscurity” may prove not to be commercially viable, at least not in civil societies. The scienti?c community submitted 68 papers to this conference IH’99. This was many more papers than we had expected, and they were of much higher quality than we had dared to hope for. Many thanks to all authors. To cope with this situation, the program committee, consisting of Ross - derson (Cambridge University), David Aucsmith (Intel, Portland, OR), Jean- Paul Linnartz (Philips Research, Eindhoven), Steve Low (University of M- bourne), Ira Moskowitz (US Naval Research Laboratory), Jean-Jacques Quisquater(Universit´ ecatholiquedeLouvain),MichaelWaidner(IBMResearch, Zurich), and me, decided to ask additional experts to help in the review of - pers.".
- catalog contributor b11646602.
- catalog created "2000.".
- catalog date "2000".
- catalog date "2000.".
- catalog dateCopyrighted "2000.".
- catalog description "A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- ".
- catalog description "An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.".
- catalog description "Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Now that I have compiled these proceedings, it is a great pleasure to thank all involved. The ?rst thanks go to the scienti?c community interested in hiding infor- tion or in stopping other people doing this. At the initiative of Ross Anderson in 1995, we came together for the ?rst international meeting at IH’96 in C- bridge,andsubsequently met atIH’98in Portland.Our communitynowconsists of about 200 people collaborating around the world – and making remarkable progress.Itis ourcommonconvictionthatinthe longrun,muchmoresecurityis achievedbyopendiscussionandpublicselectionofmechanismsandimplemen- tionsthanby”securitybyobscurity”.Thisisespeciallytrueforlargecommercial systems, and it is most probably also true within the ?eld of information hiding. Trying to hide the design and implementation of hiding mechanisms may be particularly tempting – since hiding is an issue anyway. But as shown by the breaks of quite a few digital copy- protection systems within the last few years, ”security by obscurity” may prove not to be commercially viable, at least not in civil societies. The scienti?c community submitted 68 papers to this conference IH’99. This was many more papers than we had expected, and they were of much higher quality than we had dared to hope for. Many thanks to all authors. To cope with this situation, the program committee, consisting of Ross - derson (Cambridge University), David Aucsmith (Intel, Portland, OR), Jean- Paul Linnartz (Philips Research, Eindhoven), Steve Low (University of M- bourne), Ira Moskowitz (US Naval Research Laboratory), Jean-Jacques Quisquater(Universit´ ecatholiquedeLouvain),MichaelWaidner(IBMResearch, Zurich), and me, decided to ask additional experts to help in the review of - pers.".
- catalog extent "ix, 492 p. :".
- catalog identifier "354067182X (alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 1768".
- catalog issued "2000".
- catalog issued "2000.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Data protection Congresses.".
- catalog subject "Information Systems.".
- catalog subject "Information systems.".
- catalog subject "Multimedia systems.".
- catalog subject "QA76.9.A25 I54143 2000".
- catalog tableOfContents "A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- ".
- catalog tableOfContents "An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.".
- catalog tableOfContents "Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- ".
- catalog title "Information hiding : third international workshop, IH'99, Drezden, Germany, September 29-October 1, 1999 : proceedings / Andreas Pfitzmann, (ed.).".
- catalog type "Conference proceedings. fast".
- catalog type "Dresden (1999) swd".
- catalog type "text".