Home
Call for
Papers
Accommodation
Registration
Accepted
papers
Program
Useful
Information |
Workshop on Information Hiding
Hotel Elbflorenz, Dresden, Germany
Sept. 29 - Oct. 1, 1999
Tuesday, September 28 |
18:00 - 19:00 |
Registration |
19:00 - |
Social event: guided tour: Dresden at night |
Wednesday, September 29 |
08:00 - 09:00 |
Registration |
09:00 - 09:05 |
Opening Remarks |
09:05 - 10:05 |
Steganography I: Fundamentals
An
Information-Theoretic Approach to Steganography and Watermarking
Thomas
Mittelholzer (IBM Zurich Res. Lab)
One-Time Hash
Steganography
Natori Shin
(Univ. of Tokyo) |
10:05 - 10:30 |
Coffee break |
10:30 - 12:00 |
Steganography II: Paradigms and
Examples
Steganography
Secure against Cover-Stego-Attacks
Elke Franz,
Andreas Pfitzmann (Dresden Univ. of Technology)
Secure
Steganographic Methods for Palette Images
Jiri Fridrich, Du
Rui (SUNY Binghamton)
Attacks on
Steganographic Systems: Breaking the Steganographic Utilities
EzStego, Jsteg, Steganos, and S-Tools - and some Lessons Learned
Andreas Westfeld,
Andreas Pfitzmann (Dresden Univ. of Technology) |
12:00 - 13:30 |
Lunch at the Hotel Restaurant |
13:30 - 15:00 |
Steganography III: Beyond Symmetric
Steganography
Developments in
Steganography
Joshua R. Smith,
Chris Dodge (Escher Labs Cambridge)
An Asymmetric
Public Detection Watermarking Technique
Teddy Furon,
Pierre Duhamel (Thomson multimedia France, Ecole Nat. Sup. des
T=C3=A9l=C3=A9communications de Paris)
Zero Knowledge
Watermark Detection
Scott Craver
(Princeton University) |
15:00 - 15:30 |
Coffee break |
15:30 - 16:00 |
More efficient Chaffing and
Winnowing
Chaffing at the
Bit: Thoughts on a Note by Ronald Rivest
John McHugh
(Portland State University) |
16:00 - 19:00 |
Rump Session |
Thursday, September 30 |
08:30 - 10:00 |
Watermarking I: Proving
Ownership
Proving
Ownership of Digital Content
Andr=C3=A9 Adelsbach,
Birgit Pfitzmann, Ahmad-Reza Sadeghi (Univ. des Saarlandes)
Error- and
Collusion-Secure Fingerprinting for Digital Data
Hans-J=C3=BCrgen Guth,
Birgit Pfitzmann (Univ. des Saarlandes)
Computing the
Probability of False Watermark Detection
Matt L. Miller,
Jeffrey A. Bloom (Signafy Inc. Princeton) |
10:00 - 10:30 |
Coffee break |
10:30 - 12:00 |
Watermarking II: Detection and
Decoding
Optimum Decoding
of Non-additive Full Frame DFT Watermarks
A. De Rosa, M.
Barni, F. Bartolini, V. Capellini, A. Piva (Univ. of Florence, Univ.
of Siena)
Watermark
Detection after Quantization Attacks
Joachim J.
Eggers, Bernd Girod (Univ. Erlangen-Nuremberg)
Content-based
Watermarking for Image Authentication
P. Lamy, J.
Martinho, T. Rosa, M.P. Queluz (Instituto Superior T=C3=A9cnico Lisboa)
|
12:00 - 13:30 |
Lunch at the Hotel Restaurant |
13:30 - 15:00 |
Watermarking III: Embedding
Techniques
Fast Robust
Template Matching for Affine Resistant Image Watermarks
Shelby Pereira,
Thierry Pun (Univ. of Geneva)
A Stochastic
Approach to Content Adaptive Digital Image Watermarking
Sviatoslav
Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry
Pun (Univ. of Geneva, DCT Zurich)
Performance
Improvement of Spread Spectrum Based Image Watermarking Schemes
Through M-ary Modulation
Martin Kutter
(EPF Lausanne) |
15:00 - 15:30 |
Coffee break |
15:30 - 17:00 |
The difficulty of separating private and
public information
An Entropy-Based
Framework for Database Inference
Ira S. Moskowitz,
LiWu Chang (Naval Research Lab)
Covert
Information Transmission through the Use of Standard Collision
Resolution Algorithms
Talat Mert Dogu,
Anthony Ephremides (Univ. of Maryland)
The Cocaine
Auction Protocol: On The Power Of Anonymous Broadcast
Frank Stajano,
Ross Anderson (Univ. of Cambridge) |
18:45 - |
Social event: Workshop dinner on historic steam boat |
Friday, October 1 |
08:30 - 10:00 |
Watermarking IV: New Designs and
Applications
On the Design of
a Watermarking System
Jean-Paul
Linnartz, Geert Depovere, Ton Kalker (Philips Research Labs
Eindhoven)
A Bayesian
Approach To Affine Transformation Resistant Image and Video
Watermarking
Gabriella Csurka,
Fr=C3=A9d=C3=A9ric Deguillaume, Joseph J. K. O Ruanaidh, Thierry Pun (Univ. of
Geneva, Siemens Corp. Research Princeton)
Enhanced
Intellectual Property Protection for Digital Circuits on
Programmable Hardware
John Lach,
William H. Mangione-Smith, Miodrag Potkonjak (Univ. of California)
|
10:00 - 10:30 |
Coffee break |
10:30 - 12:00 |
Watermarking V: Improving
Robustness
Robust
Watermarking for Images Based on Color Manipulation
Sebastiano
Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro (Univ. di
Catania, IBM T.J.Watson Res. Center)
Recovery of
Watermarks from Distorted Images
Neil F. Johnson,
Zoran Duric, Sushil Jajodia (George Mason Univ.)
Cocktail
Watermarking on Images
Chun-Shien Lu,
Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze (Academia Sinica)
|
12:00 - 13:30 |
Lunch at the Hotel Restaurant |
13:30 - 15:00 |
Watermarking VI and Software
Protection
Hiding
Signatures in Graph Coloring Solutions
Gang Qu, Miodrag
Potkonjak (Univ. of California)
Robust Object
Watermarking: Application to Code
Julien P. Stern,
Gael Hachez, Francois Koeune, Jean-Jacques Quisquater (Univ.
Catholique de Louvain, Univ. de Paris-Sud)
Software
DisEngineering: Program Hiding Architecture and Experiments
Enriquillo
Valdez, Moti Yung (Polyt. Univ. Brooklyn, CertCo New York)
|
15:00 - 15:30 |
Coffee break |
15:30 - 17:00 |
Stego-Engineering
Protecting
Secret Keys in a Compromised Computational System
W. P. R. Mitchell
(Univ. of Manchester)
StegFS: A
Steganographic File System for Linux
Andrew D.
McDonald, Markus G. Kuhn (Univ. of Cambridge)
Nonbinary Audio
Cryptography
Yvo Desmedt, Tri
V. Le, Jean-Jacques Quisquater (Univ. of Wisconsin, Univ. Catholique
de Louvain) |
17:00 - 17:05 |
Closing Remarks |
Saturday, October 2 |
09:30 - 18:00 |
Social event: walking: Sächsische Schweiz | |