Sciweavers

IH
1999
Springer
13 years 8 months ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
IH
1999
Springer
13 years 8 months ago
A Stochastic Approach to Content Adaptive Digital Image Watermarking
This paper presents a new stochastic approach which can be applied with di erent watermark techniques. The approach is based on the computation of a Noise Visibility Function NVF...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Naz...
IH
1999
Springer
13 years 8 months ago
Robust Object Watermarking: Application to Code
In this paper, we focus on a step of the watermarking process whose importance has been disregarded so far. In this perspective, we introduce the vector extraction paradigm which i...
Julien P. Stern, Gaël Hachez, François...
IH
1999
Springer
13 years 8 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
IH
1999
Springer
13 years 8 months ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge
IH
1999
Springer
13 years 8 months ago
On the Design of a Watermarking System: Considerations and Rationales
This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the p...
Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalk...
IH
1999
Springer
13 years 8 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
IH
1999
Springer
13 years 8 months ago
Recovery of Watermarks from Distorted Images
Many techniques for watermarking of digital images have appeared in numerous publications. Most of these techniques are sensitive to cropping and or a ne distortions e.g., rotatio...
Neil F. Johnson, Zoran Duric, Sushil Jajodia
IH
1999
Springer
13 years 8 months ago
Robust Watermarking for Images Based on Color Manipulation
Abstract. In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperce...
Sebastiano Battiato, Dario Catalano, Giovanni Gall...