Abstract is missing.
- An Information-Theoretic Approach to Steganography and WatermarkingThomas Mittelholzer. 1-16
- One-Time Hash SteganographyNatori Shin. 17-28
- Steganography Secure against Cover-Stego-AttacksElke Franz, Andreas Pfitzmann. 29-46
- Secure Steganographic Methods for Palette ImagesJiri Fridrich, Rui Du. 47-60
- Attacks on Steganographic SystemsAndreas Westfeld, Andreas Pfitzmann. 61-76
- Developments in SteganographyJoshua R. Smith, Chris Dodge. 77-87
- An Asymmetric Public Detection Watermarking TechniqueTeddy Furon, Pierre Duhamel. 88-100
- Zero Knowledge Watermark DetectionScott Craver. 101-116
- Proving Ownership of Digital ContentAndré Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi. 117-133
- Error- and Collusion-Secure Fingerprinting for Digital DataHans-Jürgen Guth, Birgit Pfitzmann. 134-145
- Computing the Probability of False Watermark DetectionMatthew L. Miller, Jeffrey A. Bloom. 146-158
- Optimum Decoding of Non-additive Full Frame DFT WatermarksAlessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva. 159-171
- Watermark Detection after Quanization AttacksJoachim J. Eggers, Bernd Girod. 172-186
- Content-Based Watermarking for Image AuthenticationPedro Lamy, José Martinho, Tiago Rosa Maria Paula Queluz. 187-198
- Fast Robust Template Matching for Affine Resistant Image WatermarksShelby Pereira, Thierry Pun. 199-210
- A Stochastic Approach to Content Adaptive Digital Image WatermarkingSviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun. 211-236
- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary ModulationMartin Kutter. 237-252
- On the Design of a Watermarking System: Considerations and RationalesJean-Paul M. G. Linnartz, Geert Depovere, Ton Kalker. 253-269
- A Bayesian Approach to Affine Transformation Resistant Image and Video WatermarkingGabriela Csurka, Frédéric Deguillaume, Joseph Ó Ruanaidh, Thierry Pun. 270-285
- Enhanced Intellectual Property Protection for Digital Circuits on Programmable HardwareJohn Lach, William H. Mangione-Smith, Miodrag Potkonjak. 286-301
- Robust Watermarking for Images Based on Color ManipulationSebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro. 302-317
- Recovery of Watermarks from Distorted ImagesNeil F. Johnson, Zoran Duric, Sushil Jajodia. 318-332
- Cocktail Watermarking on ImagesChun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze. 333-347
- Hiding Signatures in Graph Coloring SolutionsGang Qu, Miodrag Potkonjak. 348-367
- Robust Object Watermarking: Application to CodeJulien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater. 368-378
- Software DisEngineering: Program Hiding Architecture and ExperimentsEnriquillo Valdez, Moti Yung. 379-394
- Chaffing at the Bit: Thoughts on a Note by Ronald RivestJohn McHugh. 395-404
- An Entropy-Based Framework for Database InferenceIra S. Moskowitz, LiWu Chang. 405-418
- Covert Information Transmission through the Use of Standard Collision Resolution AlgorithmsTalat Mert Dogu, Anthony Ephremides. 419-433
- The Cocaine Auction Protocol: On the Power of Anonymous BroadcastFrank Stajano, Ross J. Anderson. 434-447
- Protecting Secret Keys in a Compromised Computational SystemWilliam P. R. Mitchell. 448-462
- StegFS: A Steganographic File System for LinuxAndrew D. McDonald, Markus G. Kuhn. 462-477
- Nonbinary Audio CryptographyYvo Desmedt, Tri Van Le, Jean-Jacques Quisquater. 478-489