Accepted Papers for IHW2001   12 March 2001

Ordering is meaningless---schedule to appear

1 HIDING ASSOCIATION RULES BY USING CONFIDENCE AND SUPPORT
Elena Dasseni, Vassilios S. Verykios ,  Ahmed K. Elmagarmid,
Elisa Bertino

2 HOW TO BREAK A SEMI-ANONYMOUS FINGERPRINTING SCHEME
Ahmad-Reza Sadeghi

3 BLUR/DEBLUR ATTACK AGAINST DOCUMENT PROTECTION SYSTEMS ON DIGITAL
WATERMARKING
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun

4 AN IMPLEMENTATION OF KEY-BASED DIGITAL SIGNAL STEGANOGRAPHY
Toby Sharp

5 EFFICIENCY IMPROVEMENTS OF THE PRIVATE MESSAGE SERVICE
Oliver Berthold, Sebastian Clauss--CONTACT AUTHOR, Stefan Kopsell, Andreas
Pfitzmann

6 DISTORTION-FREE DATA EMBEDDING FOR IMAGES
Miroslav Goljan, Jessica Fridrich, Rui Du

7 NEURAL NETWORKS FUNCTIONS FOR PUBLIC KEY WATERMARKING
Justin Picard, Arnaud Robert

8 INFORMATION HIDING THROUGH NOISY CHANNELS
Valeri Korjik, Guillermo Morales-Luna

9 THE STRONG ETERNITY SERVICE
Tonda Benes

10 DIGITAL WATERMARKING OF CHEMICAL STRUCTURE SETS
Joachim J. Eggers, W.D. Ihlenfeldt, Bernd Girod

11 PRACTICAL CAPACITY OF DIGITAL WATERMARKS
Ryo Sugihara

12 HIGH CAPACITY DESPITE BETTER STEGANALYSIS
F5---A Steganographic Algorithm
Andreas Westfeld

13 AUTOMATIC DETECTION OF A WATERMARKED DOCUMENT USING A PRIVATE KEY
Julien Stern, Jean-Pierre Tillich

14 AN ANALYSIS OF ONE OF THE SDMI CANDIDATES
Julien Boeuf and Julien P. Stern

15 A GRAPH THEORETIC APPROACH FOR SOFTWARE WATERMARKING
Ramarathan Venkatesan, Vijay Vazirani, Saurabh Sinha

16 NATURAL LANGUAGE WATERMARKING: DESIGN, ANALYSIS, AND A PROOF-OF-CONCEPT
IMPLEMENTATION
Mikhail J. Atallah, Victor Raskin

17 READING BETWEEN THE LINES: LESSONS FROM THE SDMI CHALLENGE
Scott A. Craver, John P. McGregor, Min Wu, Bede Liu, Adam Stubblefield,
Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten

18 ROBUST COVERT COMMUNICATION OVER A PUBLIC AUDIO CHANNEL USING SPREAD
SPECTRUM
Darko Kirovski, Henrique Malvar

19 TRUSTWORTHY PAPER DOCUMENTS
Marshall Bern, Jeff Breidenbach, David Goldberg

20 A COLLUSION-SECURE FINGERPRINTING CODE REDUCED BY CHINESE REMAINDERING
AND ITS RANDOM ERROR RESILENCE
Hirofumi Muratani

21 REAL WORLD PATTERNS OF FAILURE IN ANONYMITY SYSTEMS
Richard Clayton, George Danezis, Markus Kuhn

22 SECOND GENERATION BENCHMARKING
S. Pereira, S. Voloshynovskiy, M. Madueno, Thierry Pun

23 ZERO-KNOWLEDGE WATERMARK DETECTION AND PROOF OF OWNERSHIP
Andre Adelsbach, Ahmad-Reza Sadeghi

24 KEYLESS PUBLIC WATERMARKING FOR INTELLECTUAL PROPERTY AUTHENTICATION
Gang Qu

25 COMPUTATIONAL FORENSIC TECHNIQUES FOR INTELLECTUAL PROPERTY PROTECTION
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak

26 A REPUTATION SYSTEM TO INCREASE MIX-NET RELIABILITY
Roger Dingledine, Michael Freedman, David Hopwood, David Molnar

27 Intellectual Property Metering
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak

28 A TOOL FOR ROBUST AUDIO INFORMATION HIDING: A PERCEPTUAL AUDIO HASHING
ALGORITHM
M. Kivanc Mihcak, Ramarathnam Venkatesan

29 TRAFFIC ANALYSIS ATTACKS AND TRADE-OFFS IN ANONYMITY PROVIDING SYSTEMS
Adam Back, Ulf Möller, Anton Stiglic

30 COiN-Video: A MODEL FOR THE DISSEMINATION OF COPYRIGHTED VIDEO STREAMS
OVER OPEN NETWORKS
Dimitris Thanos