Skip to main content
  • Conference proceedings
  • © 1996

Information Hiding

First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1174)

Conference series link(s): IH: International Workshop on Information Hiding

Conference proceedings info: IH 1996.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. The history of steganography

    • David Kahn
    Pages 1-5
  3. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

    • Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand
    Pages 7-21
  4. Hiding data in the OSI network model

    • Theodore G. Handel, Maxwell T. Sandford II
    Pages 23-38
  5. Stretching the limits of steganography

    • Ross Anderson
    Pages 39-48
  6. Trials of traced traitors

    • Birgit Pfitzmann
    Pages 49-64
  7. Covert channels—A context-based view

    • Catherine Meadows, Ira S. Moskowitz
    Pages 73-93
  8. Covert channel analysis for Stubs

    • Mark S. Anderson, Maris A. Ozols
    Pages 95-113
  9. MIXes in mobile communication systems: Location management with privacy

    • Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Pages 121-135
  10. Hiding Routing information

    • David M. Goldschlag, Michael G. Reed, Paul F. Syverson
    Pages 137-150
  11. The Newton channel

    • Ross Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg
    Pages 151-156
  12. A progress report on subliminal-free channels

    • Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung
    Pages 157-168
  13. Modeling cryptographic protocols and their collusion analysis

    • Steven H. Low, Nicholas F. Maxemchuk
    Pages 169-184
  14. A secure, robust watermark for multimedia

    • Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon
    Pages 185-206
  15. Modulation and information hiding in images

    • Joshua R. Smith, Barrett O. Comiskey
    Pages 207-226
  16. Watermarking document images with bounding box expansion

    • Jack Brassil, Larry O'Gorman
    Pages 227-235
  17. The history of subliminal channels

    • Gustavus J. Simmons
    Pages 237-256

Other Volumes

  1. Information Hiding

About this book

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access