X hits on this document

58 views

0 shares

0 downloads

0 comments

16 / 17

Processing, chap. 12, pp. 768–834. Englewood Cliffs, New Jer- sey, U.S.A.: Prentice-Hall International, Inc., international edn., 1989, ISBN 0-13-216771-9. [114] R. W. Schafer, “Echo removal by discrete generalized linear fil- tering.” Tech. Rep. 466, Massachusetts Institute of Technology, Feb. 1969. [115] S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, “Can in- visible watermark resolve rightful ownerships?” In Sethin and Jain [149], pp. 310–321, ISBN 0-8194-2433-1. [116] —, “Resolving rightful ownerships with invisible watermark- ing techniques: Limitations, attacks, and implications.” IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, pp. 573–586, May 1998, ISSN 0733-8716, special issue on copy- right & privacy protection. [117] D. Aucsmith, “Tamper resistant software: An implementa- tion.” In Anderson [5], pp. 317–333, ISBN 3-540-61996-8. [118] R. J. Anderson, “Stretching the limits of steganography.” In IH96 [5], pp. 39–48, ISBN 3-540-61996-8. [119] F. Hartung and B. Girod, “Fast public-key watermarking of compressed video.” In International Conference on Image Pro- cessing (ICIP’97), vol. I, pp. 528–531, IEEE, Santa Barbara, California, U.S.A., Oct. 1997, ISBN 0-8186-8183-7. [120] I. J. Cox and J.-P. M. G. Linnartz, “Public watermarks and resistance to tampering.” In International Conference on Im- age Processing (ICIP’97), IEEE, Santa Barbara, California, U.S.A., 26–29 Oct. 1997, ISBN 0-8186-8183-7. [121] C. E. Shannon, “Communication theory of secrecy systems.” Bell System Technical Journal, vol. 28, pp. 656–715, Oct. 1949. [122] G. J. Simmons, ed., Contemporary Cryptology – The Science of Information Integrity. New York, New York, U.S.A.: IEEE Press, 1992. [123] G. J. Simmons, “The prisoners’ problem and the subliminal channel.” In Chaum [143], pp. 51–67. [124] —, “The history of subliminal channels.” IEEE Journal of Se- lected Areas in Communications, vol. 16, no. 4, pp. 452–462, May 1998, ISSN 0733-8716, special issue on copyright & privacy protection. [125] R. J. Anderson, S. Vaudenay, B. Preneel, and K. Nyberg, “The Newton channel.” In Anderson [5], pp. 151–156, ISBN 3-540-

61996-8. [126] G. J. Simmons,

“Subliminal channels:

Past and present.”

European Transaction on Telecommunications, vol. 5, no. 4, pp. 459–473, July/August 1994. [127] —, “Results concerning the bandwidth of subliminal channels.” IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, pp. 463–473, May 1998, ISSN 0733-8716, special issue on copyright & privacy protection. [128] R. J. Anderson and F. A. P. Petitcolas, “On the limits of ste- ganography.” IEEE Journal of Selected Areas in Communica- tions, vol. 16, no. 4, pp. 474–481, May 1998, ISSN 0733-8716, special issue on copyright & privacy protection. [129] S. Craver, “On public-key steganography in the presence of an active warden.” Tech. Rep. RC20931, I.B.M. Research Division,

  • T.

    J. Watson Research Center, Yorktown Heights, New York,

  • U.

    S.A., Jul. 1997.

[130] J. Zo¨llner, H. Federrath, H. Klimant, A. Pfitzmann, R. Pio- traschke, A. Westfeld, G. Wicke, and G. Wolf, “Modeling the security of steganographic systems.” In Aucsmith [148], pp. 344–354, ISBN 3-540-65386-4. [131] I. Moskowitz and M. Kang, “Covert channels – Here to stay?” In Compass’94 , pp. 235–243, 1994. [132] C. Maroney, “Hide and seek.” <http://www.cypher.net/ products/hideseek.html>, mar 1997.

[138] “Request for proposals – Embedded signalling systems.” Inter- national Federation of the Phonographic Industry, 54 Regent Street, London W1R 5PJ, Jun. 1997. [139] J. Gurnsey, Copyright Theft. Aldershot, England: Aslib Gower, 1995, ISBN 0-566-07631-4. [140] R. Willard, “ICE (Identification Coding, Embedded).” Preprint 3516 (D2-3) of the Audio Engineering Society, 1993, presented at the 74th Convention of the AES, Berlin, 16–19 March, 1993. [141] W. Niblack and R. C. Jain, eds., Storage and Retrieval for Image and Video Database III , vol. 2420, San Jose, California, U.S.A., 9–10 Feb. 1995, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, ISBN 0-8194-1767-X. [142] B. E. Rogowitz and T. N. Pappas, eds., Human Vision and Electronic Imaging II , vol. 3016, San Jose, California, U.S.A., Feb. 1997, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, ISBN 0-8194-2427-7. [143] D. Chaum, ed., Workshop on Communications Security (CRYPTO’83), Santa Barbara, California, U.S.A., 1984, IEEE, Plenum Press. [144] M. Lomas, B. Crispo, B. Christianson, and M. Roe, eds., Secu- rity Protocols: Proceeding of the 5th International Workshop,

´ vol. 1361 of Lecture Notes in Computer Science, Ecole Nor-

male Supe´rieure, Paris, France, Apr. 1997, University of Cam- bridge, Isaac Newton Institute, Springer-Verlag, Berlin, Ger- many, ISBN 3-540-64040-1. [145] E. Biham, ed., Fast Software Encryption – 4th International Workshop (FSE’97), vol. 1267 of Lecture Notes in Computer Science, Haifa, Israel, Jan. 1997, Springer-Verlag, Germany, ISBN 3-540-63247-6. [146] J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, eds., Computer Security – 5th European Symposium on Re- search in Computer Security, (ESORICS’98), vol. 1485 of Lec- ture Notes in Computer Science, Louvain-la-Neuve, Belgium, Sep. 1998, Springer, Berlin, Germany, ISBN 3-540-65004-0. [147] J. Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz, eds., Multimedia and Security – Workshop at ACM Multime- dia’98 , vol. 41 of GMD Report, Bristol, United Kingdom, Sep. 1998, ACM, GMD – Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany. [148] D. Aucsmith, ed., Information Hiding: Second International Workshop, vol. 1525 of Lecture Notes in Computer Science, Portland, Oregon, U.S.A., 1998, Springer-Verlag, Berlin, Ger- many, ISBN 3-540-65386-4. [149] I. K. Sethin and R. C. Jain, eds., Storage and Retrieval for Image and Video Database V , vol. 3022, San Jose, Califor- nia, U.S.A., Feb. 1997, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), SPIE, ISBN 0-8194-2433-1.

Fabien A. P. Petitcolas graduated from the

´ Ecole Centrale, Lyon, France and received a

Diploma in Computer Science from the Univer- sity of Cambridge, UK, where he is currently a research student at the Computer Laboratory. His research topic is the robustness of informa- tion hiding systems and his research is funded by Intel Corporation.

[133] “Stegodos.”

<ftp://ftp.funet.fi/pub/crypt/

steganography/stegodos.zip>, Mar. 1997. [134] E. Franz, A. Jerichow, S. M¨oller, A. Pfitzmann, and I. Stierand, “Computer based steganography: how it works and why there- fore any restriction on cryptography are nonsense, at best.” In Anderson [5], pp. 7–21, ISBN 3-540-61996-8. [135] P. Wayner, Disappearing Cryptography – Being and Nothing on the Net. Chestnut Hill, MA: AP Professional, 1996, ISBN 0-12-738671-8. [136] B. Macq and J.-J. Quisquater, “Cryptology for digital TV broadcasting.” Proceedings of the IEEE, vol. 83, no. 6, pp. 944– 956, Jun. 1995. [137] J. Fridrich and M. Goljan, “Comparing robustness of water- marking techniques.” In Wong and Delp [106], pp. 214–225, ISBN 0-8194-3128-1.

Ross J. Anderson received his BA, MA and PhD degrees from the University of Cambridge, UK, where he teaches and directs research in computer security and software engineering. He was the program chair of the first inter- national workshop on information hiding, held at Cambridge in May–June 1996. He is a Fel- low of the RSA and the IMA, a Member of the IEE and a Chartered Engineer; he is also the editor-in-chief of ‘Computer and Communica- tions Security Reviews’.

1077

Document info
Document views58
Page views58
Page last viewedMon Dec 05 09:25:34 UTC 2016
Pages17
Paragraphs556
Words16709

Comments