[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Disappearing Cryptography: Information Hiding: Steganography & WatermarkingDecember 2008
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-0-08-092270-6
Published:03 December 2008
Pages:
456
Skip Bibliometrics Section
Reflects downloads up to 11 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. * Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks. * Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design. * Grants the reader access to online source code which can be used to directly implement proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

References

  1. James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, and Sheng Zhong. Towards a theory of data entanglement. In Proceedings of the 2004 European Symposium on Research in Computer Security , 2004.Google ScholarGoogle ScholarCross RefCross Ref
  2. National Security Agency. N.S.A. press release: Venona documents released. Technical report, National Security Agency, July 1995.Google ScholarGoogle Scholar
  3. A.V. Aho, J.E. Hopcroft, and J.D. Ullman. Data Structures and Algorithms . Addison-Wesley, Reading, MA, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dana Angluin and Michael Kharitonov. When won't membership queries help? In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing , pages 444-454. ACMPress, 1991. to appear in JCSS . Google ScholarGoogle Scholar
  5. S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and K.R.Rao. Exploring steganography for low bit rate wavelet based coder in image retrieval system. In Proceedings of TENCOM '00 , volume 3, pages 250-255, Kuala Lumpur, Malaysia, September 2000.Google ScholarGoogle ScholarCross RefCross Ref
  6. Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, and Sergei Nirenburg. Natural language processing for information assurance and security: an overview and implementations. In NSPW '00: Proceedings of the 2000 workshop onNew security paradigms , pages 51-65, New York, NY, USA, 2000. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Anderson. The eternity service, 1996.Google ScholarGoogle Scholar
  8. Ross J. Anderson, editor. Information Hiding, First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings , volume 1174 of Lecture Notes in Computer Science . Springer, 1996.Google ScholarGoogle Scholar
  9. Ross J. Anderson. Stretching the limits of steganography. In Information Hiding [And96b], pages 39-48. Google ScholarGoogle Scholar
  10. Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems . John Wiley and Sons, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nate Anderson. Steroid bust shows feds can still get at 'private' and 'secure' e-mail. Ars Technica.com , November 2007.Google ScholarGoogle Scholar
  12. Ross Anderson, Roger Needham, and Adi Shamir. The steganographic file system. In IWIH: International Workshop on Information Hiding , 1998.Google ScholarGoogle ScholarCross RefCross Ref
  13. Ross Anderson and Fabien Petitcolas. On the limits of steganography. IEEE Journal on Selceted Areas in Communications , pages 474-481, May 1998.Google ScholarGoogle Scholar
  14. Benjamin Arazi. A Commonsense Approach to the Theory of Error Correcting Codes . MIT Press, Cambridge, MA, 1988.Google ScholarGoogle Scholar
  15. Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, and Sanket Naik. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Ira S. Moskowitz, editor, Information Hiding: Fourth International Workshop , volume 2137 of Lecture Notes in Computer Science , pages 185-199. Springer, April 2001. Google ScholarGoogle Scholar
  16. Mikhail J. Atallah, Victor Raskin, Christian F. Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, and Katrina E. Triezenberg. Natural language watermarking and tamperproofing. In Fabien A. P. Petitcolas, editor, Information Hiding: Fifth International Workshop , volume 2578 of Lecture Notes in Computer Science , pages 196-212. Springer, October 2002. Google ScholarGoogle Scholar
  17. Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, and Katrina E. Triezenberg. Natural language watermarking and tamperproofing. In IH '02: Revised Papers from the 5th International Workshop on Information Hiding , pages 196-212, London, UK, 2003. Springer-Verlag. Google ScholarGoogle ScholarCross RefCross Ref
  18. Tuomas Aura. Invisible communication. Technical report, Helsinki University of Technology, November 1995.Google ScholarGoogle Scholar
  19. Michael F. Barnsley. Fractal modelling of real world images. In Heinz-Otto Peitgen and Dietmar Saupe, editors, The Science of Fractal Images , chapter 5, pages 219-239. Springer-Verlag, 1988. Google ScholarGoogle Scholar
  20. Michael F. Barnsley. Fractals Everywhere . Academic Press, Cambridge, MA, USA, 2nd edition, 1993. Google ScholarGoogle Scholar
  21. Mihir Bellare and Alexandra Boldyreva. The security of chaffing and winnowing. In ASIACRYPT , pages 517-530, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  22. Mihir Bellare and Alexandra Boldyreva. The security of chaffing and winnowing. In ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security , pages 517-530, London, UK, 2000. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Blackburn, S. Blake-Wilson, M. Burmester, and S. Galbraith. Shared generation of shared rsa keys. Technical Report CORR98-19, Department of Combinatorics and Optimization, University of Waterloo, 1998.Google ScholarGoogle Scholar
  24. Michael Backes and Christian Cachin. Public-key steganography with active attacks. In Joe Kilian, editor, TCC , volume 3378 of Lecture Notes in Computer Science , pages 210-226. Springer, 2005.Google ScholarGoogle Scholar
  25. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. Lecture Notes in Computer Science , 1109:1-??, 1996. Google ScholarGoogle Scholar
  26. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Message authentication using hash functions: the HMAC construction. CryptoBytes , 2(1):12-15, Spring 1996.Google ScholarGoogle Scholar
  27. Krista Bennett. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Research paper accepted in partial fulfillment of the Dept. of Linguistics preliminary examination requirement, 05 2004. CERIAS TR 2004-13.Google ScholarGoogle Scholar
  28. D. Boneh and M. Franklin. Efficient generation of shared RSA keys. Lecture Notes in Computer Science, CRYPTO 97 , 1294:425-439, 1997. Google ScholarGoogle Scholar
  29. I.F. Blake, R. Fuji-Hara, R.C. Mullin, and S.A. Vanstone. Computing logarithms in finite fields of characteristic two. SIAM Journal on Algebraic Discrete Methods , 5, 1984.Google ScholarGoogle Scholar
  30. Nikita Borisov and Philippe Golle, editors. Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers , volume 4776 of Lecture Notes in Computer Science . Springer, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  31. Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Proceedings of Crypto 2001, Springer Verlag LNCS Volume 2139 , 2001. Google ScholarGoogle ScholarCross RefCross Ref
  32. Walter Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal , 35(3):313, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. Barnsley and L. Hurd. Fractal Image Compression . AK Peters, Ltd., Wellesley, Ma., 1992. Google ScholarGoogle Scholar
  34. Dan Boneh, Antoine Joux, and Phong Q. Nguyen. Why textbook elgamal and RSA encryption are insecure. In ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security , pages 30-43, London, UK, 2000. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. F.P. Brooks, A.L Hopkins Jr., Peter G. Neumann, and W.V. Wright. An experiment in musical composition. EC- 6(3), September 1957.Google ScholarGoogle Scholar
  36. Charles Bennett and Rolf Landauer. The fundamental physical limits of computation. Scientific American , pages 48-56, July 1985.Google ScholarGoogle ScholarCross RefCross Ref
  37. J Brassil, S Low, N Maxemchuk, and L O'Garman. Electronic marking and identification techniques to discourage document copying. In Proceedings of IEEE Infocom 94 , pages 1278-1287, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  38. Jack Brassil, Steve Low, Nicholas Maxemchuk, and Larry O'Gorman. Hiding information in document images. In Proceedings of the 1995 Conference on Information Sciences and Systems , March 1995.Google ScholarGoogle Scholar
  39. M. Blum. Coin flipping by telephone: A protocol for solving impossible problems. Proceedings of the 24th IEEE Computer Conference (CompCon) , 1982.Google ScholarGoogle Scholar
  40. Adam Back, UlfMoeller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Fourth Information Hiding Workshop , pages 257-269, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  41. Jack Brassil and Larry O'Gorman. Watermarking document images with bounding box expansion. In Information Hiding, Lecture Notes of Computer Science (1174) , New York, Heidelberg, 1996. Springer-Verlag. Google ScholarGoogle Scholar
  42. C. Boyd. A new multiple key cipher and an improved voting scheme. In Advances in Cryptology-EUROCRYPT '89 Proceedings . Springer-Verlag, 1990. Google ScholarGoogle Scholar
  43. S.A. Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CSR9323, Computer Science Department, CWI, Mar 1993. Google ScholarGoogle Scholar
  44. Stefan A. Brands. Rethinking Publike Key Infrastructure and Digital Certificates- Building in Privacy . PhD thesis, Centrum voor Wiskunde en Informatica, Amsterdam, 1995.Google ScholarGoogle Scholar
  45. Stefan A. Brands. Secret-key certificates. Technical Report CS-R9510, Centrum voor Wiskunde en Informatica, Amsterdam, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. E.F. Brickell. A fast modular multiplication algorithm with applications to two key cryptography. In Advances in Cryptology: Proceedings of Crypto 82 . Plenum Press, 1982.Google ScholarGoogle Scholar
  47. Michael F. Barnsley and Alan D. Sloan. A better way to compress images. Byte Magazine , pages 215-223, January 1988. Google ScholarGoogle Scholar
  48. D Boneh and J Shaw. Collusion-secure fingerprinting for digital data. In 15th Annual International Cryptology Conference , number 963, pages 452-465, Santa Barbara, California, U.S.A., 27-31 1995. Google ScholarGoogle ScholarCross RefCross Ref
  49. R.W. Buccigrossi and E.P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing , 8(12):1688-1701, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, and Ismail Avcibas. Source camera identification based on cfa interpolation. In ICIP (3) , pages 69-72, 2005.Google ScholarGoogle Scholar
  51. Nader Bagherzadeh, Mateo Valero, and Alex Ramírez, editors. Proceedings of the Second Conference on Computing Frontiers, 2005, Ischia, Italy, May 4-6, 2005 . ACM, 2005. Google ScholarGoogle Scholar
  52. J.C. Benaloh and M. Yung. Distributing the power of government to enhance the privacy of voters. Proceedings of the 5th ACM Symposium on the Principles in Distributed Computing , 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Lorrie Cranor and R. Cytron. Design and implementation of a practical security-conscious electronic polling system. Technical Report WUCS-96-02, Washington University Department of Computer Science, St. Louis, 1996.Google ScholarGoogle Scholar
  54. Jan Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee, editors. Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selected Papers , volume 4437 of Lecture Notes in Computer Science . Springer, 2007. Google ScholarGoogle Scholar
  55. Mark Chapman and George Davida. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In International Conference on Information and Computer Security (ICICS'97) , Beijing, P.R. China, November 1997. Google ScholarGoogle ScholarCross RefCross Ref
  56. David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Proceedings of Crypto 88 , page 319, New York, Berlin, Heidelberg, London, Paris, Tokyo, 1993. Springer-Verlag. Google ScholarGoogle Scholar
  57. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM , 24(2), Feb 1981. Google ScholarGoogle Scholar
  58. David Charlap. The bmp file format, part i. Dr. Dobbs Journal , Mar 1995.Google ScholarGoogle Scholar
  59. David Charlap. The bmp file format, part ii. Dr. Dobbs Journal , Apr 1995.Google ScholarGoogle Scholar
  60. Brian Chen. Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems . PhD thesis, MIT, Cambridge, MA, June 2000. Google ScholarGoogle Scholar
  61. Ingemar J. Cox, Ton Kalker, and Heung-Kyu Lee, editors. Digital Watermarking, Third International Workshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers , volume 3304 of Lecture Notes in Computer Science . Springer, 2005. Google ScholarGoogle Scholar
  62. Ingemar Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In Information Hiding, Lecture Notes of Computer Science (1174) , New York, Heidelberg, 1996. Springer-Verlag. Google ScholarGoogle Scholar
  63. R. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu Rangan, and Ravi Sundaram. Steganographic communication in ordered channels. In Camenisch et al. [CCJS07], pages 42-57. Google ScholarGoogle Scholar
  64. F. Clarke. Optimization and Nonsmooth Analysis . John Wiley, New York, 1983.Google ScholarGoogle Scholar
  65. Ian Clarke. A distributed decentralised information storage and retrieval system. Technical report, Division of Informatics, University of Edinborough, 1999.Google ScholarGoogle Scholar
  66. Noam Chomsky and G.A. Miller. Finite state languages. Information and Control , 1:91-112, 1958.Google ScholarGoogle ScholarCross RefCross Ref
  67. Ingemar J. Cox and Matt L. Miller. A review of watermarking and the importance of perceptualmodeling. In Proc. of Electronic Imaging '97 , February 1997.Google ScholarGoogle Scholar
  68. Camenisch and Michels. A group signature scheme with improved efficiency. In ASIACRYPT: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology . LNCS, Springer-Verlag, 1998. Google ScholarGoogle Scholar
  69. Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom. Digital Watermarking . Morgan Kaufman, San Fransisco, CA, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom. Digital watermarking . Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Ingemar Cox, Matthew L. Miller, and Jeffery A. Bloom. Digital watermarking and Steganography . Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Ingemar J. Cox, Matthew Miller, Jeffrey Bloom, and Jessica Fridrich. Digital Watermarking . MorganKaufman, San Francisco, CA, 2008.Google ScholarGoogle Scholar
  73. Don Coppersmith. Another birthday attack. In Hugh C. Williams, editor, CRYPTO , volume 218 of Lecture Notes in Computer Science , pages 14-17. Springer, 1985. Google ScholarGoogle Scholar
  74. Michael Crichton. Jurassic Park . Knopf, New York, 1990.Google ScholarGoogle Scholar
  75. I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability , Berkeley, CA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Christian S. Collberg and Clark Thomborson. Watermarking, tamper-proffing, and obfuscation: tools for software protection. IEEE Trans. Softw. Eng. , 28(8):735- 746, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. K.W. Campbell and M.J. Wiener. DES is not a group. In Advances in Cryptology-CRYPTO '92 Proceedings . Springer-Verlag, 1993. Google ScholarGoogle Scholar
  78. B. Chen and G. Wornell. Achievable performance of digital watermarking systems, 1999.Google ScholarGoogle Scholar
  79. Brian Chen and Greg Wornell. Quantization indexmodulation: A class of provably good methods for digital watermarking and information embedding (1 page). In ISIT: Proceedings IEEE International Symposium on Information Theory, sponsored by The Information Theory Society of The Institute of Electrical and Electronic Engineers , 2000.Google ScholarGoogle Scholar
  80. Rennie deGraaf, John Aycock, and Michael Jr. Jacobson. Improved port knocking with strong authentication. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference , pages 451-462, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. George Danezis, Roger Dingledine, and Nick Mathewson. Mixminion: Design of a type iii anonymous remailer protocol. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy , page 2, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarCross RefCross Ref
  82. Reinderd GordonNathan deGraaf. Enhancing Firewalls: Conveying User and Application Identification to Network Firewalls . PhD thesis, University of Calgary, 2007.Google ScholarGoogle Scholar
  83. D. M. Roger Dingledine and Michael J. Freedman. The Free Haven project: Distributed anonymous storage service. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability , July 2000. Google ScholarGoogle Scholar
  84. Roger Dingledine, NickMathewson, and Paul Syverson. Reputation in p2p anonymity systems, 2003.Google ScholarGoogle Scholar
  85. Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium , August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Joan Daemen and Vincent Rijmen. The block cipher rijndael. In Smart Card Research and Applications, LNCS 1820 , pages 288-296. Springer-Verlag, 2000. Google ScholarGoogle Scholar
  87. Joan Daemen and Vincent Rijmen. Rijndael, the advanced encryption standard. Dr. Dobb's Journal , 26(3):137-139, March 2001.Google ScholarGoogle Scholar
  88. Claudia Díaz and Andrei Serjantov. Generalising mixes. In Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003) , pages 18- 30. Springer-Verlag, LNCS 2760, March 2003.Google ScholarGoogle ScholarCross RefCross Ref
  89. Edward J. Delp and Ping Wah Wong, editors. Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings , volume 5306 of Proceedings of SPIE . SPIE, 2004. Google ScholarGoogle Scholar
  90. Edward J. Delp and Ping Wah Wong, editors. Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings , volume 5681 of Proceedings of SPIE . SPIE, 2005. Google ScholarGoogle Scholar
  91. G.J. Simmons ed. Contemporary Cryptology: The Science of Information Integrity . IEEE Press, Piscataway, NJ, 1992. Google ScholarGoogle Scholar
  92. Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding Information in Program Binaries. In Proceedings of the 6th International Conference on Information and Communications Security (ICICS) , pages 187-199, October 2004.Google ScholarGoogle Scholar
  93. T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology: Proceedings of CRYPTO 84 . Springer-Verlag, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Joachim J. Eggers, Jonathan K. Su, and Bernd Girod. Asymmetric watermarking schemes. In Sicherheit in Mediendaten , Berlin, Germany, September 2000.Google ScholarGoogle ScholarCross RefCross Ref
  95. Joachim J. Eggers, Jonathan K. Su, and Bernd Girod. Public-key watermarking by eigenvectors of linear transforms. In EUSIPCO 2000 , Tampere, Finland, September 2000.Google ScholarGoogle Scholar
  96. J. Mark Ettinger. Steganalysis and game equilibria. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle Scholar
  97. J. Fridrich, Arnold Baldoza, and Richard Simard. Robust digital watermaking based on key-dependent basis functions. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1996. Springer-Verlag.Google ScholarGoogle Scholar
  98. J. Fridrich and Rui Dui. Secure steganographic methods for palette images. In 3rd Information Hiding Workshop, Lecture Notes of Computer Science (1768) , New York, Heidelberg, 1999. Springer-Verlag. Google ScholarGoogle Scholar
  99. J. Fridrich, Rui Du, and Meng Long. Steganalysis of LS-Bencoding in color images. In Proceedings of the IEEE International Conference on Multimedia and Expo , August 2000.Google ScholarGoogle Scholar
  100. J. Fridrich and M. Goljan. Protection of digital images using self embedding. In Proceedings of NJIT Symposium on Content Security and Data Hiding in Digital Media , Newark, NJ, May 1999.Google ScholarGoogle Scholar
  101. Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, and David Soukal. Writing on wet paper. In Delp and Wong [DW05], pages 328-340.Google ScholarGoogle Scholar
  102. Jessica Fridrich, Miroslav Goljan, and David Soukal. Perturbed quantization steganography with wet paper codes. In MM & Sec '04: Proceedings of the 2004 workshop onMultimedia and security , pages 4-15, NewYork, NY, USA, 2004. ACM. Google ScholarGoogle Scholar
  103. Pierre-Alain Fouque, Gaëtan Leurent, and Phong Q. Nguyen. Full key-recovery attacks on HMAC/NMACMD4 and NMAC-MD5. In Proc. CRYPTO '07 , volume 4622 of Lecture Notes in Computer Science , pages 13-30. Springer, 2007. Google ScholarGoogle Scholar
  104. Yair Frankel, Philip D. MacKenzie, and Moti Yung. Robust efficient distributed RSA-key generation. In Symposium on Principles of Distributed Computing , page 320, 1998. Google ScholarGoogle Scholar
  105. A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In Advances in Cryptology-AUSCRYPT '92 Proceedings . Springer-Verlag, 1993. Google ScholarGoogle Scholar
  106. Electronic Frontier Foundation. Cracking DES :Secrets of Encryption Research, Wiretap Politics and Chip Design . O'Reilly, 1998. Google ScholarGoogle Scholar
  107. Michael P. Frank. Introduction to reversible computing: motivation, progress, and challenges. In Bagherzadeh et al. [BVR05], pages 385-390. Google ScholarGoogle Scholar
  108. Ed Fredkin. Conservative logic. International Journal of Theoretical Physics , 21, 1982.Google ScholarGoogle Scholar
  109. J. Fridrich. A new steganographic method for palette-based images. In Proceedings of the IS&T PICS Conference , pages 285-289, Savannah, Georgia, April 1999.Google ScholarGoogle Scholar
  110. Jessica J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In Jessica J. Fridrich, editor, Information Hiding , volume 3200 of Lecture Notes in Computer Science , pages 67-81. Springer, 2004. Google ScholarGoogle Scholar
  111. Edward Fredkin and Tommaso Toffoli. Conservative logic. International Journal of Theoretical Physics , 21:219-253, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  112. Wolfgang Funk. Reversible watermarking of nurbs-based cad models. In Camenisch et al. [CCJS07], pages 172-187. Google ScholarGoogle Scholar
  113. Daniel Gruhl and Walter Bender. Information hiding to foil the casual counterfeiter. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle Scholar
  114. Marc Girault, Robert Cohen, and Mireille Campana. A generalized birthday attack. In EUROCRYPT , pages 129-156, 1988. Google ScholarGoogle ScholarCross RefCross Ref
  115. Michael R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness . W.H. Freeman and Company, New York City, New York, 1979. Google ScholarGoogle Scholar
  116. Philippe Golle and Ari Juels. Dining cryptographers revisited. In Proceedings of Eurocrypt 2004 , May 2004.Google ScholarGoogle ScholarCross RefCross Ref
  117. Daniel Gruhl, Anthony Lu, and Walter Bender. Echo hiding. In Proceedings of the First International Workshop on Information Hiding , pages 293-315, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Rosario Gennaro, Tal Rabin, Stanislav Jarecki, and Hugo Krawczyk. Robust and efficient sharing of RSA functions. Journal of Cryptology: the journal of the International Association for Cryptologic Research , 13(2):273- 300, 2000. Google ScholarGoogle Scholar
  119. Wendy Grossman. alt.scientology.war. Wired , 3(2), December 1995.Google ScholarGoogle Scholar
  120. C.G. Gunther. A universal algorithm for homophonic coding. In Advances in Cryptology-Eurocrypt '88 Lecture Notes in Computer Science , number 330, pages 405-414, New York, 1988. Springer-Verlag. Google ScholarGoogle Scholar
  121. Nicholas Zhong-Yang Ho and Ee-Chien Chang. Residual information of redacted images. hidden in the compression artifacts. In Information Hiding 2008, Lecture Notes of Computer Science , New York, Heidelberg, 2008. Springer-Verlag.Google ScholarGoogle Scholar
  122. Paul Heckbert. Color image quantization for frame buffer display. In Proceedings of SIGGRAPH 82 , 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Frank Hartung and Bernd Girod. Fast public-key watermarking of compressed video. In International Conference on Image Processing (ICIP'97) , volume I, pages 528-531, Santa Barbara, California, U.S.A., 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. D Hillman. The structural of reversible one-dimensional cellular automata. Physica D , 52(2/3):277, sep 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. David Hillman. The structure of reversible one-dimensional cellular automata. Physica D , 54:277-292, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Martin Hirt. Multi-Party Computation: Efficient Protocols, General Adversaries, and Voting . PhD thesis, ETH Zurich, September 2001. Reprint as vol. 3 of ETH Series in Information Security and Cryptography , ISBN3- 89649-747-2, Hartung-Gorre Verlag, Konstanz, 2001.Google ScholarGoogle Scholar
  127. Martin Hirt and Kazue Sako. Efficient receipt-free voting based on homomorphic encryption. In Eurocrypt 2000 , pages 539-556. Springer-Verlag, 2000. Google ScholarGoogle Scholar
  128. Frank Hartung, Jonathan K. Su, and Bernd Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents, Proc. SPIE 3657, Jan. 1999 , pages 147- 158, Jan 1999.Google ScholarGoogle Scholar
  129. John Hopcroft and Jeffrey Ullman. Introduction to Automata Theory, Languages and Computation . Addison-Wesley, Reading, Massachusetts, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. D.A. Huffman. Canonical forms for information-lossless finite-state machines. IRE Transactions on Circuit Theory (special supplement) and IRE Transactions on Information Theory (special supplement) , CT-6 and IT-5:41-59, May 1959. A slightly revised version appeared in E.F. Moore, Editor, Sequential Machines: Selected Papers , Addison-Wesley, Reading, Massachusetts, 1964.Google ScholarGoogle Scholar
  131. Neil F. Johnson, Zoran Duric, and Sushil Jajodia. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) . Kluwer Academic Publishers, February 2001.Google ScholarGoogle Scholar
  132. Sebastien Jeanquier. An Analysis of Port Knocking and Single Packet Authorization . PhD thesis, Royal Holloway College, University of London, September 2006.Google ScholarGoogle Scholar
  133. Neil F. Johnson and Sushil Jajodia. Steganalysis of images created using current steganography software. In Information Hiding, Second International Workshop , pages 273-289, 1998.Google ScholarGoogle Scholar
  134. Neil F. Johnson and Sushil Jajodia. Steganalysis: The investigation of hidden information, 1998.Google ScholarGoogle Scholar
  135. H.N. Jendal, Y. J. B. Kuhn, and J. L. Massey. An information-theoretic treatment of homophonic substitution. In Advances in Cryptology-Eurocrypt '89 , New York, 1990. Springer-Verlag, Lecture Notes in Computer Science. Google ScholarGoogle Scholar
  136. Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, and Sean W. Smith. Nymble: Anonymous ip-address blocking. In Borisov and Golle [BG07], pages 113-133. Google ScholarGoogle Scholar
  137. Markus G. Kuhn and Ross J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle Scholar
  138. David Kahn. The Codebreakers . Macmillan, New York City, 1967.Google ScholarGoogle Scholar
  139. John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, and Ben Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACMASPLOS . ACM, November 2000. Google ScholarGoogle Scholar
  140. Ton Kalker, Ingemar J. Cox, and Yong Man Ro, editors. Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers , volume 2939 of Lecture Notes in Computer Science . Springer, 2004. Google ScholarGoogle Scholar
  141. Michael Kearns. The Computational Complexity of Machine Learning . PhD thesis, Harvard University Center for Research in Computing Technology, May 1989. Google ScholarGoogle Scholar
  142. Deepa Kundur and Dimitrios Hatzinakos. Digital watermarking using multiresolution wavelet decomposition. In International Conference on Acoustic, Speech and Signal Processing (ICASP) , volume 5, pages 2969- 2972, Seattle, Washington, U.S.A., 1998.Google ScholarGoogle ScholarCross RefCross Ref
  143. Deepa Kundur and D. Hatzinakos. Digital watermarking for telltale tamper-proofing and authentication. Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information , 87(7):1167-1180, July 1999.Google ScholarGoogle Scholar
  144. Gregory Kipper. Investigator's Guide to Steganography . CRC Press, Inc., Boca Raton, FL, USA, 2003. Google ScholarGoogle Scholar
  145. D. Knuth. The Art of Computer Programming: Volume 2, Seminumerical Algorithms . 2nd edition, Addison-Wesley, Reading, MA, 1981.Google ScholarGoogle Scholar
  146. Hugh Kenner and Joseph O'Rourke. A travesty generator formicros. BYTE , page 129, November 1984.Google ScholarGoogle Scholar
  147. Neal Koblitz. A Course in Number Theory and Cryptography . Springer-Verlag, New York, Berlin, Heidelberg, London, Paris, Tokyo, 1987. Google ScholarGoogle Scholar
  148. John Kominek. Convergence of fractal encoded images. In J. A. Storer and M. Cohn, editors, Data Compression Conference 1995 , pages 242-251, Snowbird, UT, USA, March 1995. Google ScholarGoogle Scholar
  149. Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak. Intellectual property metering. In Fourth Information Hiding Workshop , 2001. Google ScholarGoogle ScholarCross RefCross Ref
  150. Hugo Krawczyk. Secret sharing made short. In CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology , pages 136- 146, New York, NY, USA, 1994. Springer-Verlag New York, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Martin Krzywinski. Port knocking. Linux Journal , June 2003.Google ScholarGoogle Scholar
  152. Martin Krzywinski. Port knocking: Network authentication across closed ports. SysAdmin Magazine , 12:12-17, 2003.Google ScholarGoogle Scholar
  153. Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon. Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging , 15(4), 2006.Google ScholarGoogle Scholar
  154. Michael Kearns and Leslie Valient. Cryptographic limitations on learning boolean formulae and finite automata. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing , pages 433-444, Seattle, WA, May 1989. Google ScholarGoogle Scholar
  155. J. C. Lagarias. Performance analysis of shamir's attack on the basic merkle-hellman knapsack cryptosystem. In Proceedings of the 11th Colloquium on Automata, Languages and Programming , pages 312-323, London, UK, 1984. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Shu Lin and Daniel J. Costello. Error Control Coding, Second Edition . Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 2004. Google ScholarGoogle Scholar
  157. D.J. Lehmann. On primality tests. SIAM Journal on Computing , 11(2), May 1982. ((page numbers are wrong)).Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. S. Lyu and H. Farid. Howrealistic is photorealistic? IEEE Transactions on Signal Processing , 53(2):845-850, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Wilson MacGyver Liaw. Reading gif files. Dr. Dobbs Journal , Feb 1995.Google ScholarGoogle Scholar
  160. Shu Lin and Daniel J. Costello Jr. Error Control Coding: Fundaments and Applications . Prentice Hall, Englewood Cliffs, NJ, 1983.Google ScholarGoogle Scholar
  161. Vinicius Licks and R. Jordan. On digital image watermarking robust to geometric transformations. In IEEE International Conference on Image Processing 2000, Vancouver, Canada , 2000.Google ScholarGoogle ScholarCross RefCross Ref
  162. Steve Low, Nicholas Maxemchuk, Jack Brassil, and Larry O'Gorman. Document marking and identification using both line and word shifting. In Proceedings of the 1995 Conference on Infocom '95 , April 1995. Google ScholarGoogle ScholarCross RefCross Ref
  163. John Lach, WIlliam H. Mangione-Smith, and Miodrag Potkonjak. Fingerprinting digital circuits on programmable hardware. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle ScholarCross RefCross Ref
  164. Michael Luby. Lt codes. In FOCS , pages 271-. IEEE Computer Society, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. S. Lyu. Natural Image Statistics for Digital Image Forensics . PhD thesis, Department of Computer Science, Dartmouth College, Hanover, NH, 2005. Google ScholarGoogle Scholar
  166. Maurise Maes. Twin peaks: The histogram attack to fixed depth image watermarks. In Information HidingWorkshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle Scholar
  167. Kevin Maher. Texto. circulating on the web, February 1995. http://www.ecn.org/crypto/soft/texto.zip, accessed 2005-03-22.Google ScholarGoogle Scholar
  168. S. Manoharan. Using self-synchronizing codes to improve steganography. In Internet and Multimedia Systems and Applications IMSA 2003 , Honolulu, USA, 8 2003.Google ScholarGoogle Scholar
  169. N. Margolus. Physics-likemodels of computation. Physica D , 10:81-95, 1984. Discussion of reversible cellular automata illustrated by an implementation of Fredkin's Billiard-Ball model of computation .Google ScholarGoogle ScholarCross RefCross Ref
  170. L. Marvel, C. Boncelet, and C. Retter. Spread spectrum image steganography. IEEE Transactions on Image Processing 8 , pages 1075-1083, August 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. John McHugh. Cover image. In Fourth Information Hiding Workshop , page 0, 2001.Google ScholarGoogle Scholar
  172. M. Miller, I. Cox, J. Linnartz, and T. Kalker. A review of watermarking principles and practices, 1999.Google ScholarGoogle Scholar
  173. Ralph Merkle. Reversible electronic logic using switches. Nanotechnology , 4:21-40, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  174. Daniel B. Miller and Edward Fredkin. Two-state, reversible, universal cellular automata in three dimensions. In Bagherzadeh et al. [BVR05], pages 45-51. Google ScholarGoogle Scholar
  175. Steven J. Murdoch and Stephen Lewis. Embedding covert channels into tcp/ip. In Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, and Fernando Pérez-González, editors, Information Hiding , volume 3727 of Lecture Notes in Computer Science , pages 247-261. Springer, 2005.Google ScholarGoogle Scholar
  176. IS Moskowitz and AR Miller. The channel capacity of a certain noisy timing channel. IEEE Trans. on Information Theory , IT-38(4):1339-43, 1992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. P.L. Montgomery. Modular multiplication without trial division. Mathematics of Computation , 44(170), 1985.Google ScholarGoogle Scholar
  178. Wojciech Mazurczyk and Krzysztof Szczypiorski. Steganography of voip streams, 2008.Google ScholarGoogle Scholar
  179. Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, and William P. Marnane. Differential power analysis of hmac based on sha-2, and countermeasures. In Sehun Kim, Moti Yung, and Hyung-Woo Lee, editors, WISA , volume 4867 of Lecture Notes in Computer Science , pages 317-332. Springer, 2007. Google ScholarGoogle Scholar
  180. Steven J. Murdoch. Hot or not: revealing hidden services by their clock skew. In CCS '06: Proceedings of the 13th ACMconference on Computer and communications security , pages 27-36, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography . CRC Press, New York, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Ogden Nash. Lineup for yesterday. Sport Magazine , January 1949.Google ScholarGoogle Scholar
  183. NCSC. A guide to understanding covert channel analysis of trusted systems. Technical Report TG-030, NCSC, November 1993.Google ScholarGoogle Scholar
  184. P.G. Neumann. Error-limiting coding using information-lossless sequential machines. IEEE Transactions on Information Theory , IT-10:108-115, April 1964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. Mohannad Najjar and Firas Najjar. d-hmac dynamic hmac function. In DepCoS-RELCOMEX , pages 119-126. IEEE Computer Society, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. Arjun Nambiar and Matthew Wright. Salsa: a structured approach to large-scale anonymity. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security , pages 17-26, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of the 21nd Annual ACM Symposium on Theory of Computing , pages 33-43. ACM, 1989. Google ScholarGoogle ScholarCross RefCross Ref
  188. M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing , pages 427-437. ACM, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  189. A. M. Odlyzko. Cryptanalytic attacks on the multiplicative knapsack scheme and on Shamir's fast signature scheme. IEEE Trans. Inform. Theory , IT-30:594-601, 1984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  190. Lasse Øverlier and Paul Syverson. Improving efficiency and simplicity of tor circuit establishment and hidden services. In Borisov and Golle [BG07], pages 134-152. Google ScholarGoogle Scholar
  191. Lasse Øverlier and Paul Syverson. Location hidden services and valet nodes. Telektronikk , pages 52-60, February 2007.Google ScholarGoogle Scholar
  192. A. Piva, M. Barni, F. Bartolini, and V. Cappellini. DCTbased watermark recovering without resorting to the uncorrupted original image. In IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP'97) , Santa Barbara, California, October 1997. Google ScholarGoogle Scholar
  193. Alin C. Popescu and Hany Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing , 53(10):3948-3959, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  194. Fabien A. P. Petitcolas and Hyoung Joong Kim, editors. Digital Watermarking, First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers , volume 2613 of Lecture Notes in Computer Science . Springer, 2003. Google ScholarGoogle Scholar
  195. N Proctor and P Neumann. Architectural implications of covert channels. In Proceedings of the 15th National Computer Security Conference , 1993.Google ScholarGoogle Scholar
  196. Edgar Allan Poe. The purloined letter. The Gift: A Christmas and New Year's Present for 1844 , 1844.Google ScholarGoogle Scholar
  197. A.C. Popescu. Statistical Tools for Digital Image Forensics . PhD thesis, Department of Computer Science, Dartmouth College, Hanover, NH, 2005.Google ScholarGoogle Scholar
  198. B Pfitzmann and A Pfitzmann. How to break the direct rsa-implementation of mixes. In Advances in Cryptology- Eurocrypt '89 , number 434. Springer-Verlag, 1990. Google ScholarGoogle Scholar
  199. Federal Information Processing. Fips pub 198: The keyed-hashmessage authentication code (hmac).Google ScholarGoogle Scholar
  200. Niels Provos. Defending against statistical steganalysis, August 2001.Google ScholarGoogle Scholar
  201. Niels Provos. Probabilistic methods for improving information hiding. Technical Report 01-1, University of Michigan, January 2001.Google ScholarGoogle Scholar
  202. Dima Pröfrock, Mathias Schlauweg, and Erika Müller. Video watermarking by using geometric warping without visible artifacts. In Camenisch et al. [CCJS07], pages 78-92. Google ScholarGoogle Scholar
  203. Publius. Federalist: A Collection of Essays Written in Favor of the New Constitution . J. and A. McClean, 1788.Google ScholarGoogle Scholar
  204. J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for rsa public-key cryptosystem. Electronic Letters , 18, 1982.Google ScholarGoogle Scholar
  205. Gang Qu. Keyless public watermarking for intellectual property authentication. In Fourth Information Hiding Workshop , 2001. Google ScholarGoogle ScholarCross RefCross Ref
  206. Michael Rabin. Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM , 38:335-348, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  207. Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM , 36(2):335-348, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  208. R. Rinaldo and G. Calvagno. Image coding by block prediction of multiresolution submimages. IEEE Transactions on Image Processing , 4:909-920, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  209. J. Ruanaidh, W. Dowling, and F. Boland. Phase watermarking of digital images. In Proceedings of ICIP'96 , volume III, pages 239-242, Lausanne, Switzerland, September 1996.Google ScholarGoogle ScholarCross RefCross Ref
  210. Ron Rivest. Chaffing and winnowing: Confidentiality without encryption, summer 1998.Google ScholarGoogle Scholar
  211. Ronald L. Rivest. Peppercoin micropayments. In Ari Juels, editor, Financial Cryptography , volume 3110 of Lecture Notes in Computer Science , pages 2-8. Springer, 2004.Google ScholarGoogle Scholar
  212. L. G. Roberts. Picture coding using pseudo-random noise. IRE Trans. on Information Theory , IT-8, Feb 1962.Google ScholarGoogle ScholarCross RefCross Ref
  213. M. Rennhard and B. Plattner. Practical anonymity for themasses withmorphmix, 2004.Google ScholarGoogle Scholar
  214. Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security , 1(1):66-92, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  215. Christian Rechberger and Vincent Rijmen. New results on nmac/hmac when instantiated with popular hash functions. Journal of Universal Computer Science , 14(3):347-376, feb 2008.Google ScholarGoogle Scholar
  216. M. G. Reed, P. F. Syverson, and D.M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications , 16(4):482-494, May 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  217. Joanna Rutkowska. Subverting vista kernel for fun and profit. In Black Hat Briefings , 2006.Google ScholarGoogle Scholar
  218. Frank Stajano and Ross J. Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In IH '99: Proceedings of the Third International Workshop on Information Hiding , pages 434-447, London, UK, 2000. Springer-Verlag. Google ScholarGoogle ScholarCross RefCross Ref
  219. Khalid Sayood. Introduction to data compression (2nd ed.) . MorganKaufmann Publishers Inc., San Francisco, CA, USA, 2000. Google ScholarGoogle Scholar
  220. Bruce Schneier. Applied Cryptography . John Wiley and Sons, New York, 1994.Google ScholarGoogle Scholar
  221. Jacob Seidelin. Compression using canvas and png-embedded data. nihilogic , April 2008.Google ScholarGoogle Scholar
  222. Andrei Serjantov. A fresh look at the generalised mix framework. In Borisov and Golle [BG07], pages 17-29. Google ScholarGoogle Scholar
  223. P. F. Syverson, D.M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In IEEE, editor, Proceedings / 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, California , pages 44-54, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, 1997. IEEE Computer Society Press. Google ScholarGoogle Scholar
  224. A. Shamir. How to share a secret. Communications of the ACM , 24(11), Nov 1979. Google ScholarGoogle Scholar
  225. Adi Shamir. A polynomial time algorithm for breaking the basic merkle-hellman cryptosystem. In CRYPTO , pages 279-288, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  226. J. Shapiro. Embedded image coding using zerotrees of wavelet coeffcients. IEEE Transactions on Signal Processing , 41(12):3445-3462, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. Toby Sharp. An implementation of key-baseddigital signal steganography. In Fourth Information Hiding Workshop , 2001. Google ScholarGoogle ScholarCross RefCross Ref
  228. Adi Shamir. How to solve it: New techniques in algebraic cryptanalysis. In Crypto 2008 , Santa Barbara, California, August 2008.Google ScholarGoogle Scholar
  229. Natori Shin. One-time hash steganography. In 3rd Information Hiding Workshop, Lecture Notes of Computer Science (1768) , New York, Heidelberg, 1999. Springer-Verlag. Google ScholarGoogle Scholar
  230. G.J. Simmons. The prisoner's problem and the subliminal channel. In Advances in Cryptology: Proceedings of CRYPTO '83 . PlenumPress, 1984.Google ScholarGoogle Scholar
  231. G.J. Simmons. The subliminal channel and digital signatures. In Advances in Cryptology: Proceedings of EUROCRYPT 84 . Springer-Verlag, 1985. Google ScholarGoogle ScholarCross RefCross Ref
  232. G.J. Simmons. A secure subliminal channel (?). In Advances in Cryptology-CRYPTO '85 Proceedings . Springer-Verlag, 1986. Google ScholarGoogle Scholar
  233. G.J. Simmons. The subliminal channels of the U.S. Digital Signature Algorithm (DSA). In Proceedings of the Third Symposium on: State and Progress of Research in Cryptography , Fondazone Ugo Bordoni, Rome, 1993.Google ScholarGoogle Scholar
  234. G.J. Simmons. Subliminal communication is easy using the DSA. In Advances in Cryptology-EUROCRYPT '93 Proceedings . Springer-Verlag, 1994. Google ScholarGoogle Scholar
  235. Yun-Qing Shi and Byeungwoo Jeon, editors. Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings , volume 4283 of Lecture Notes in Computer Science . Springer, 2006. Google ScholarGoogle Scholar
  236. Kazue Sako and Joe Kilian. Secure voting using partially compatible homomorphisms. In CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology , pages 411-424, London, UK, 1994. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  237. K Sako and J Kilian. Receipt-free mix-type voting schemes. In Advances in Cryptology- Eurocrypt '95 , pages 393-403. Springer-Verlag, 1995. Google ScholarGoogle ScholarCross RefCross Ref
  238. A.P. Petitcolas (Editor) Stefan Katzenbeisser (Editor), Fabien. Information Hiding Techniques for Steganography and Digital Watermarking . Artech House, January 2000.Google ScholarGoogle Scholar
  239. Matthew D. Spisak. An analysis of perturbed quantization steganography in the spatial domain . PhD thesis, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, April 2005.Google ScholarGoogle Scholar
  240. Paul F. Syverson, Michael G. Reed, and David M. Goldschlag. Onion routing access configurations. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition , volume I, pages 34-40, Hilton Head, SC, January 2000. IEEE CS Press.Google ScholarGoogle ScholarCross RefCross Ref
  241. Paul F. Syverson, Stuart G. Stubblebine, and David M. Goldschlag. Unlinkable serial transactions. In Financial Cryptography , pages 39-56, 1997. Google ScholarGoogle ScholarCross RefCross Ref
  242. James Storer. Data Compression . Computer Science Press, Rockville, MD, 1988. Google ScholarGoogle Scholar
  243. Paul F. Syverson, Gene Tsudik, Michael G. Reed, and Carl E. Landwehr. Towards an analysis of onion routing security. In Workshop on Design Issues in Anonymity and Unobservability , Berkeley, CA, July 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  244. Claude E. Shannon andWarrenWeaver. A Mathematical Theory of Communication . University of Illinois Press, Champaign, IL, USA, 1963. Google ScholarGoogle ScholarDigital LibraryDigital Library
  245. Sabrina Sowers and Abdou Youssef. Testing digital watermark resistance to destruction. In Information Hiding Workshop, Lecture Notes of Computer Science (1525) , New York, Heidelberg, 1998. Springer-Verlag.Google ScholarGoogle ScholarCross RefCross Ref
  246. Eugene Tumoian and Maxim Anikeev. Network based detection of passive covert channels in tcp/ip. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary , pages 802-809, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  247. H. Taha. Operations Research An Introduction . Macmillan Publishing Company., New York, 1992. Google ScholarGoogle Scholar
  248. Parisa Tabriz and Nikita Borisov. Breaking the collusion detection mechanism of morphmix. In George Danezis and Philippe Golle, editors, Privacy Enhancing Technologies , volume 4258 of Lecture Notes in Computer Science , pages 368-383. Springer, 2006.Google ScholarGoogle Scholar
  249. Tommaso Toffoli and Lev B. Levitin. Specific ergodicity: an informative indicator for invertible computational media. In Bagherzadeh et al. [BVR05], pages 52-58. Google ScholarGoogle Scholar
  250. Tommaso Toffoli and Norman Margolus. Cellular Automata Machines . MIT Press, London, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  251. T. Toffoli. Cellular Automata Mechanics . PhD thesis, The University ofMichigan, 1977. Toffoli's demonstration of reversible universal computation . Google ScholarGoogle Scholar
  252. Tommaso Toffoli. Computation and construction universality of reversible cellular automata. Journal of Computer and SystemSciences , 15:213-231, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  253. Mercan Topkara, Guiseppe Riccardi, Dilek Hakkani-Tur, and Mikhail J. Atallah. Natural language watermarking: Challenges in building a practical system. In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents , January 2006.Google ScholarGoogle ScholarCross RefCross Ref
  254. Umut Topkara, Mercan Topkara, and Mikhail J. Atallah. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In MM & Sec '06: Proceedings of the 8th workshop on Multimedia and security , pages 164-174, New York, NY, USA, 2006. ACM. Google ScholarGoogle Scholar
  255. Cuneyt M. Taskiran, Umut Topkara, Mercan Topkara, and Edward J. Delp. Attacks on lexical natural language steganography systems. In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents , January 2006.Google ScholarGoogle ScholarCross RefCross Ref
  256. Alan Turing. On computable numbers with an application to the entscheidungsproblem. Proceedings of the London Math Soceity , 2(42):230-265, 1936.Google ScholarGoogle Scholar
  257. Alan Turing. On computable numbers with an application to the entscheidungsproblem. Proceedings of the London Math Soceity , 2(43):544-546, 1936.Google ScholarGoogle Scholar
  258. Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT , volume 3027 of Lecture Notes in Computer Science , pages 323-341. Springer, 2004.Google ScholarGoogle Scholar
  259. Leslie G. Valient. A theory of the learnable. Communications of the ACM , 27:1134-1142, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  260. Alexis De Vos and Yvan Van Rentergem. Reversible computing: frommathematical group theory to electronical circuit experiment. In Bagherzadeh et al. [BVR05], pages 35-44. Google ScholarGoogle Scholar
  261. John Walker. Steganosaurus. circulating on the web, December 1994. http://www.fourmilab.ch/stego/stego.shar.gz, accessed 2005-03-25.Google ScholarGoogle Scholar
  262. S. Walton. Information authentication for a slippery new age. Dr. Dobbs Journal , 20(4):18-26, April 1995.Google ScholarGoogle Scholar
  263. Steve Walton. Image authentification for a slippery new age. Dr. Dobbs Journal , Apr 1995.Google ScholarGoogle Scholar
  264. Peter Wayner. Building a travesty tree. BYTE , page 183, September 1985.Google ScholarGoogle Scholar
  265. Peter C. Wayner. Content-addressable search engines and DES-like systems. In Advances in Cryptology: CRYPTO '92 Lecture Notes in Computer Science, volume 740 , pages 575-586, New York, 1992. Springer-Verlag. Google ScholarGoogle Scholar
  266. Peter Wayner. Strong theoretical steganography. Cryptologia , 19(3):285-299, July 1995.Google ScholarGoogle ScholarCross RefCross Ref
  267. Peter C. Wayner. Digital Cash: Commerce on the Net . AP Professional, Boston, 1995. Google ScholarGoogle Scholar
  268. Peter Wayner. Digital Cash, 2nd Edition . AP Professional, Chestnut Hill, MA, 1997.Google ScholarGoogle Scholar
  269. Peter Wayner. Digital Copyright Protection . AP Professional, Chestnut Hill, MA, 1997. Google ScholarGoogle Scholar
  270. Peter Wayner. Data Compression for Real Programmers . AP Professional, Chesnutt, Hill, MA, 1999. Google ScholarGoogle Scholar
  271. Peter Wayner. Compression algorithms for real programmers . MorganKaufmann Publishers Inc., San Francisco, CA, USA, 2000. Google ScholarGoogle Scholar
  272. Peter Wayner. Translucent Databases . Flyzone Press, Baltimore, MD, USA, 2001.Google ScholarGoogle Scholar
  273. Peter Wayner. Translucent Databases . Flyzone Press, Baltimore, Maryland, 2003.Google ScholarGoogle Scholar
  274. Peter Wayner. Policing Online Games . Flyzone Press, Baltimore, Maryland, 2005. Google ScholarGoogle Scholar
  275. Joseph Weizenbaum. Computer power and human reason : from judgment to calculation . W.H. Freeman, San Fransisco, 1976. Google ScholarGoogle Scholar
  276. Andreas Westfeld. High capacity depsite better steganalysis: F5- a steganographic algorithm. In Fourth Information Hiding Workshop , pages 301-315, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  277. Peter Wayner and Dan Huttenlocher. Image analysis to obtain typeface information. U.S. Patent , 5253307, 1994.Google ScholarGoogle Scholar
  278. Hao-Tian Wu and Yiu ming Cheung. A high-capacity data hiding method for polygonal meshes. In Camenisch et al. [CCJS07], pages 188-200. Google ScholarGoogle Scholar
  279. P.W. Wong. A public key watermark for image verification and authentication. In In Proc. of ICIP'98 , volume1, pages 425- 429, Chicago, USA, October 1998.Google ScholarGoogle Scholar
  280. Andreas Westfeld and Andreas Pfitzmann. Attacks on steganographic systems. In Information Hiding, Third International Workshop, IH'99 , volume 1768, pages 61- 76, Dresden, Germany, 1999. Springer Verlag. Google ScholarGoogle Scholar
  281. Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium , pages 59-72, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  282. Wright and Spalding. Experimental performance of shared RSAmodulus generation (short). In SODA: ACMSIAM Symposium on Discrete Algorithms (A Conference on Theoretical and Experimental Analysis of Discrete Algorithms) , 1999. Google ScholarGoogle Scholar
  283. X.-G. Xia, C. Boncelet, and G. Arce. A multiresolution watermark for digital images. In IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP'97) , Santa Barbara, California, October 1997. Google ScholarGoogle Scholar
Contributors
  • Cornell University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations