Sunday 6 October 2002
|
18:00 - 19:00 |
Registration |
Monday 7 October 2002
|
09:00 - 10:00 |
Session 1
– Information hiding and networking
Session chair: Neil Johnson (Booz-Allen and Hamilton) |
|
- #140 - Hiding Intrusions: From the abnormal to the
normal and beyond
- Kymie Tan (Carnegie Mellon University), John McHugh (CERT Coordination Center), Kevin
Killourhy (Carnegie Mellon University)
|
|
- #155 - Eliminating Steganography in Internet
Traffic with Active Wardens
- Gina Fisk (Los Alamos National Laboratory), Mike
Fisk (Los Alamos National Laboratory), Christos Papadopoulos
(University of Southern California), Joshua Neil (Los Alamos National
Laboratory)
|
10:00 - 10:30 |
Coffee break |
10:30 - 12:00 |
Session 2 – Anonymity Session chair: Andreas Pfitzmann (Dresden University of Technology) |
|
- #186 - From a Trickle to a Flood: Active Attacks on
Several Mix Types
- Andrei Serjantov (University of Cambridge), Roger Dingledine (The
Free Haven Project), Paul Syverson
(Naval Research Laboratory)
|
|
- #189 - Limits of Anonymity in Open Environments
- Dogan Kesdogan (RWTH Aachen), Dakshi Agrawal (IBM
T. J. Watson Research Centre), Stefan Penz (RWTH Aachen)
|
|
- #137 - Chaffinch: Confidentiality in the Face of
Legal Threats
- Richard Clayton (University of Cambridge), George Danezis (University
of Cambridge)
|
12:00
- 13:30 |
Lunch |
13:30 - 15:00 |
Session 3 – Watermarking fundamentals
Session chair: Job Oostveen (Philips Research) |
|
- #130 - Nothing But a Kiss: A Novel and Accurate
Approach to Assessing the Performance of Multidimensional
Distortion-Compensated Dither Modulation
- Felix Balado (University of Vigo), Fernando Pérez-González
(University of Vigo)
|
|
- #191 - Robustness and Efficiency of Non-Linear
Side-Informed Watermarking
- Guénolé
Silvestre (University College Dublin), Neil Hurley (University College
Dublin), Teddy Furon (IRISA)
|
|
- #147 - Security of Public Watermarking Schemes for
Binary Sequences
- Qiming Li (National University of Singapore),
Ee-Chien Chang (National University of Singapore)
|
15:00 - 15:30 |
Coffee break |
15:30 - 17:00 |
Session 4 – Watermarking algorithms I
Session chair: Hyoung Joong Kim (Kangwon National
University) |
|
- #125 - Direct Embedding and Detection of RST
Invariant Watermarks
- Kieran Larkin (Canon Information Systems Research
Australia), Peter Fletcher (Canon Information Systems Research
Australia)
|
|
- #176 - Rotation, scale, and translation invariant
watermark using bispectrum invariants
- Hyung Shin Kim (KAIST), Yunju Baek (KAIST),
Heung-Kyu Lee (KAIST), Young-Ho Suh (ETRI)
|
|
- #195 - Audio Watermark Robustness to
Desynchronization via Beat Detection
- Darko Kirovski (Microsoft Research), Hagai Attias
(Microsoft Research)
|
15:00 - 16:00 |
Rump session |
Tuesday 8 October 2002
|
09:00 - 10:00 |
Session 5 – Watermarking algorithms
II
Session chair: Ton Kalker (Philips
Research) |
|
- #179 - Robust Watermarking and Affine Registration
of 3D Meshes
- Oliver Benedens (Fraunhofer Institute for Computer
Graphics)
|
|
- #152 - Natural Language Watermarking and
Tamperproofing
- Mikhail Atallah (Purdue University), Victor Raskin
(Purdue University), Christian F. Hempelmann (Purdue University),
Mercan Karahan (Purdue University), Radu Sion (Computer Sciences,
Purdue University), Umut Topkara (Purdue University), Katrina E.
Triezenberg (Purdue University)
|
10:00 - 10:30 |
Coffee break |
10:30 - 12:00 |
Session 6 – Attacks on watermarking
algorithms
Session chair: Fabien A. P. Petitcolas (Microsoft
Research) |
|
- #154 - Cryptanalysis of UCLA Watermarking Schemes
for Intellectual Property Protection
- Tri Le-Van (Florida State University), Yvo Desmedt
(Florida State University)
|
|
- #180 - Cryptanalysis of Discrete-Sequence Spread
Spectrum Watermarks
- M. Kivanç Mihçak (Microsoft Research), Ramarathnam
Venkatesan (Microsoft Research), Mustafa Kesal (University of
Illinois, Urbana-Champaign)
|
|
- #196 - Detectors for Echo Hiding Systems
- Scott Craver (Princeton University), Bede Liu (Princeton University), Wayne Wolf (Princeton University)
|
12:00 - 13:30 |
Lunch |
13:30 - 15:00 |
Session 7 – Steganography algorithms
Session chair: Jessica Fridrich (SUNY Binghamton) |
|
- #141 - A Steganographic Embedding Undetectable by
JPEG Compatibility Steganalysis
- Richard Newman (University of Florida), Ira Moskowitz (Naval Research Laboratory), LiWu
Chang (US), Murali Brahmadesam (University of Florida)
|
|
- #143 - Steganography Preserving Statistical
Properties
- Elke Franz (Dresden University of Technology)
|
|
- #112 - Bit-Plane Decomposition Steganography
Combined with JPEG2000 Compression
- Hideki Noda (Kyushu Institute of Technology), Jeremiah Spaulding (Kyushu Institute
of Technology), Mahdad N. Shirazi (Communications Research
Laboratory), Michiharu Niimi (Kyushu Institute of Technology), Eiji
Kawaguchi (Kyushu Institute of Technology)
|
10:00 - 15:30 |
Coffee break |
15:30 - 16:30 |
Session 8 – Steganalysis I
Session chair: Richard Clayton (University of Cambridge) |
|
- #134 - Steganalysis of JPEG Images: Breaking the F5
Algorithm
- Jessica Fridrich (SUNY Binghamton), Miroslav Goljan
(SUNY Binghamton), Dorin Hogea (SUNY Binghamton)
|
|
- #120 - Detecting Low Embedding Rates
- Andreas Westfeld (TU Dresden)
|
16:30 - 17:00 |
- Invited talk
- Secret-Ballot Receipts and Transparent Integrity
- David Chaum
|
17:30
- 22:30 |
Conference dinner |
Wednesday 9 October 2002
|
09:00 - 10:00 |
Session 9 – Steganalysis II
Session chair: John McHugh (SEI/CERT) |
|
- #133 - Detecting Hidden Messages Using Higher-Order
Statistics and Support Vector Machines
- Siwei Lyu
(Dartmouth College), Hany Farid (Dartmouth College)
|
|
- #158 - Detection of LSB Steganography via Sample
Pair Analysis
- Sorina Dumitrescu
(McMaster University), Xiaolin Wu (McMaster University), Zhe Wang (McMaster University)
|
10:00 - 10:30 |
Coffee break |
10:30 - 11:30 |
Session 10 – Hiding information in
unusual content I
Session chair: Christian S. Collberg (University of
Arizona) |
|
- #194 - Hiding Data in DNA
- Boris Shimanovsky (XAP
Corporation), Jessica Feng (UCLA), Miodrag Potkonjak (UCLA)
|
|
- #116 - Tracing the Source of a Shredded Document
- Jack Brassil (HP Laboratories)
|
11:30 - 13:00 |
Lunch |
13:00 - 14:00 |
Session 11 – Hiding information in
unusual content II
Session chair: Caroline Fontaine (Université des Sciences
et Technologies de Lille) |
|
- #124 - Oblivious Hashing: Silent Verification of
Code Execution
- Yuqun Chen (Microsoft Research), Ramarathnam
Venkatesan (Microsoft Research), Matthew Cary (University of
Washington), Ruoming Pang (Princeton University), Saurabh Sinha
(University of Washington), Mariusz Jakubowski (Microsoft Research)
|
|
- #132 - Practical Oblivious Transfer Protocols
- Christian Tobias (University of Frankfurt)
|
14:00 |
Closing remarks
Call for proposals for the next workshop |