Accepted Papers for IHW2001 12 March 2001 Ordering is meaningless---schedule to appear 1 HIDING ASSOCIATION RULES BY USING CONFIDENCE AND SUPPORT Elena Dasseni, Vassilios S. Verykios , Ahmed K. Elmagarmid, Elisa Bertino 2 HOW TO BREAK A SEMI-ANONYMOUS FINGERPRINTING SCHEME Ahmad-Reza Sadeghi 3 BLUR/DEBLUR ATTACK AGAINST DOCUMENT PROTECTION SYSTEMS ON DIGITAL WATERMARKING Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun 4 AN IMPLEMENTATION OF KEY-BASED DIGITAL SIGNAL STEGANOGRAPHY Toby Sharp 5 EFFICIENCY IMPROVEMENTS OF THE PRIVATE MESSAGE SERVICE Oliver Berthold, Sebastian Clauss--CONTACT AUTHOR, Stefan Kopsell, Andreas Pfitzmann 6 DISTORTION-FREE DATA EMBEDDING FOR IMAGES Miroslav Goljan, Jessica Fridrich, Rui Du 7 NEURAL NETWORKS FUNCTIONS FOR PUBLIC KEY WATERMARKING Justin Picard, Arnaud Robert 8 INFORMATION HIDING THROUGH NOISY CHANNELS Valeri Korjik, Guillermo Morales-Luna 9 THE STRONG ETERNITY SERVICE Tonda Benes 10 DIGITAL WATERMARKING OF CHEMICAL STRUCTURE SETS Joachim J. Eggers, W.D. Ihlenfeldt, Bernd Girod 11 PRACTICAL CAPACITY OF DIGITAL WATERMARKS Ryo Sugihara 12 HIGH CAPACITY DESPITE BETTER STEGANALYSIS F5---A Steganographic Algorithm Andreas Westfeld 13 AUTOMATIC DETECTION OF A WATERMARKED DOCUMENT USING A PRIVATE KEY Julien Stern, Jean-Pierre Tillich 14 AN ANALYSIS OF ONE OF THE SDMI CANDIDATES Julien Boeuf and Julien P. Stern 15 A GRAPH THEORETIC APPROACH FOR SOFTWARE WATERMARKING Ramarathan Venkatesan, Vijay Vazirani, Saurabh Sinha 16 NATURAL LANGUAGE WATERMARKING: DESIGN, ANALYSIS, AND A PROOF-OF-CONCEPT IMPLEMENTATION Mikhail J. Atallah, Victor Raskin 17 READING BETWEEN THE LINES: LESSONS FROM THE SDMI CHALLENGE Scott A. Craver, John P. McGregor, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten 18 ROBUST COVERT COMMUNICATION OVER A PUBLIC AUDIO CHANNEL USING SPREAD SPECTRUM Darko Kirovski, Henrique Malvar 19 TRUSTWORTHY PAPER DOCUMENTS Marshall Bern, Jeff Breidenbach, David Goldberg 20 A COLLUSION-SECURE FINGERPRINTING CODE REDUCED BY CHINESE REMAINDERING AND ITS RANDOM ERROR RESILENCE Hirofumi Muratani 21 REAL WORLD PATTERNS OF FAILURE IN ANONYMITY SYSTEMS Richard Clayton, George Danezis, Markus Kuhn 22 SECOND GENERATION BENCHMARKING S. Pereira, S. Voloshynovskiy, M. Madueno, Thierry Pun 23 ZERO-KNOWLEDGE WATERMARK DETECTION AND PROOF OF OWNERSHIP Andre Adelsbach, Ahmad-Reza Sadeghi 24 KEYLESS PUBLIC WATERMARKING FOR INTELLECTUAL PROPERTY AUTHENTICATION Gang Qu 25 COMPUTATIONAL FORENSIC TECHNIQUES FOR INTELLECTUAL PROPERTY PROTECTION Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak 26 A REPUTATION SYSTEM TO INCREASE MIX-NET RELIABILITY Roger Dingledine, Michael Freedman, David Hopwood, David Molnar 27 Intellectual Property Metering Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak 28 A TOOL FOR ROBUST AUDIO INFORMATION HIDING: A PERCEPTUAL AUDIO HASHING ALGORITHM M. Kivanc Mihcak, Ramarathnam Venkatesan 29 TRAFFIC ANALYSIS ATTACKS AND TRADE-OFFS IN ANONYMITY PROVIDING SYSTEMS Adam Back, Ulf Möller, Anton Stiglic 30 COiN-Video: A MODEL FOR THE DISSEMINATION OF COPYRIGHTED VIDEO STREAMS OVER OPEN NETWORKS Dimitris Thanos