Digital Media Watermarking: Session Chair / Lisa MarvelSession 1: |
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf |
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang |
Reversing Global and Local Geometrical Distortions in Image Watermarking / Dariusz Bogumil |
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems / Wei Sun ; En-hui Yang |
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking / Andrea Abrardo ; Mauro Barni |
Steganalysis: Session Chair / Session 2: |
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes / Jessica Fridrich |
Exploiting Preserved Statistics for Steganalysis / Rainer Böhme ; Andreas Westfeld |
Improved Detection of LSB Steganography in Grayscale Images / Andrew D. Ker |
An Improved Sample Pairs Method for Detection of LSB Embedding / Peizhong Lu ; Xiangyang Luo ; Qingyang Tang ; Li Shen |
Forensic Applications: Session Chair / Session 3: |
Statistical Tools for Digital Forensics / Alin C. Popescu ; Hany Farid |
Relative Generic Computational Forensic Techniques / Jennifer L. Wong ; Miodrag Potkonjak |
Steganography: Session Chair / Session 4: |
Syntax and Semantics-Preserving Application-Layer Protocol Steganography / Norka B. Lucena ; James Pease ; Payman Yadollahpour ; Steve J. Chapin |
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy / Igor A. Bolshakov |
Software Watermarking: Session Chair / John McHughSession 5: |
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks / Christian Collberg ; Andrew Huntwork ; Edward Carter ; Gregg Townsend |
Threading Software Watermarks / Jasvir Nagra ; Clark Thomborson |
Soft IP Protection: Watermarking HDL Codes / Lin Yuan ; Pushkin R. Pari ; Gang Qu |
Security and Privacy: Session Chair / Ross AndersonSession 6: |
An Asymmetric Security Mechanism for Navigation Signals / Markus G. Kuhn |
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme / Jae-Gwi Choi ; Ji-Hwan Park ; Ki-Ryong Kwon |
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures / Xinwen Fu ; Bryan Graham ; Dong Xuan ; Riccardo Bettati ; Wei Zhao |
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring / Hirofumi Muratani |
Anonymity: Session Chair / Andreas PfitzmannSession 7: |
Statistical Disclosure or Intersection Attacks on Anonymity Systems / George Danezis ; Andrei Serjantov |
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic / Claudia DÃaz ; Bart Preneel |
The Hitting Set Attack on Anonymity Protocols / Dogan Kesdogan ; Lexi Pimenidis |
Data Hiding in Unusual Content: Session Chair / Session 8: |
Information Hiding in Finite State Machine |
Covert Channels for Collusion in Online Computer Games / Steven J. Murdoch ; Piotr Zielinski |
Author Index |
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1: |
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf |
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang |
Reversing Global and Local Geometrical Distortions in Image Watermarking / Dariusz Bogumil |
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems / Wei Sun ; En-hui Yang |
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking / Andrea Abrardo ; Mauro Barni |