IHW 99 Logo

Home

Call for Papers

Accommodation

Registration

Accepted papers

Program

Useful Information

Workshop on Information Hiding

Hotel Elbflorenz, Dresden, Germany

Sept. 29 - Oct. 1, 1999


Tuesday, September 28

18:00 - 19:00

Registration

19:00 -

Social event: guided tour: Dresden at night


Wednesday, September 29

08:00 - 09:00

Registration

09:00 - 09:05

Opening Remarks

09:05 - 10:05

Steganography I: Fundamentals

An Information-Theoretic Approach to Steganography and Watermarking
Thomas Mittelholzer (IBM Zurich Res. Lab)
One-Time Hash Steganography
Natori Shin (Univ. of Tokyo)

10:05 - 10:30

Coffee break

10:30 - 12:00

Steganography II: Paradigms and Examples

Steganography Secure against Cover-Stego-Attacks
Elke Franz, Andreas Pfitzmann (Dresden Univ. of Technology)
Secure Steganographic Methods for Palette Images
Jiri Fridrich, Du Rui (SUNY Binghamton)
Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and some Lessons Learned
Andreas Westfeld, Andreas Pfitzmann (Dresden Univ. of Technology)

12:00 - 13:30

Lunch at the Hotel Restaurant

13:30 - 15:00

Steganography III: Beyond Symmetric Steganography

Developments in Steganography
Joshua R. Smith, Chris Dodge (Escher Labs Cambridge)
An Asymmetric Public Detection Watermarking Technique
Teddy Furon, Pierre Duhamel (Thomson multimedia France, Ecole Nat. Sup. des T=C3=A9l=C3=A9communications de Paris)
Zero Knowledge Watermark Detection
Scott Craver (Princeton University)

15:00 - 15:30

Coffee break

15:30 - 16:00

More efficient Chaffing and Winnowing

Chaffing at the Bit: Thoughts on a Note by Ronald Rivest
John McHugh (Portland State University)

16:00 - 19:00

Rump Session


Thursday, September 30

08:30 - 10:00

Watermarking I: Proving Ownership

Proving Ownership of Digital Content
Andr=C3=A9 Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi (Univ. des Saarlandes)
Error- and Collusion-Secure Fingerprinting for Digital Data
Hans-J=C3=BCrgen Guth, Birgit Pfitzmann (Univ. des Saarlandes)
Computing the Probability of False Watermark Detection
Matt L. Miller, Jeffrey A. Bloom (Signafy Inc. Princeton)

10:00 - 10:30

Coffee break

10:30 - 12:00

Watermarking II: Detection and Decoding

Optimum Decoding of Non-additive Full Frame DFT Watermarks
A. De Rosa, M. Barni, F. Bartolini, V. Capellini, A. Piva (Univ. of Florence, Univ. of Siena)
Watermark Detection after Quantization Attacks
Joachim J. Eggers, Bernd Girod (Univ. Erlangen-Nuremberg)
Content-based Watermarking for Image Authentication
P. Lamy, J. Martinho, T. Rosa, M.P. Queluz (Instituto Superior T=C3=A9cnico Lisboa)

12:00 - 13:30

Lunch at the Hotel Restaurant

13:30 - 15:00

Watermarking III: Embedding Techniques

Fast Robust Template Matching for Affine Resistant Image Watermarks
Shelby Pereira, Thierry Pun (Univ. of Geneva)
A Stochastic Approach to Content Adaptive Digital Image Watermarking
Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun (Univ. of Geneva, DCT Zurich)
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes Through M-ary Modulation
Martin Kutter (EPF Lausanne)

15:00 - 15:30

Coffee break

15:30 - 17:00

The difficulty of separating private and public information

An Entropy-Based Framework for Database Inference
Ira S. Moskowitz, LiWu Chang (Naval Research Lab)
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
Talat Mert Dogu, Anthony Ephremides (Univ. of Maryland)
The Cocaine Auction Protocol: On The Power Of Anonymous Broadcast
Frank Stajano, Ross Anderson (Univ. of Cambridge)

18:45 -

Social event: Workshop dinner on historic steam boat


Friday, October 1

08:30 - 10:00

Watermarking IV: New Designs and Applications

On the Design of a Watermarking System
Jean-Paul Linnartz, Geert Depovere, Ton Kalker (Philips Research Labs Eindhoven)
A Bayesian Approach To Affine Transformation Resistant Image and Video Watermarking
Gabriella Csurka, Fr=C3=A9d=C3=A9ric Deguillaume, Joseph J. K. O Ruanaidh, Thierry Pun (Univ. of Geneva, Siemens Corp. Research Princeton)
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
John Lach, William H. Mangione-Smith, Miodrag Potkonjak (Univ. of California)

10:00 - 10:30

Coffee break

10:30 - 12:00

Watermarking V: Improving Robustness

Robust Watermarking for Images Based on Color Manipulation
Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro (Univ. di Catania, IBM T.J.Watson Res. Center)
Recovery of Watermarks from Distorted Images
Neil F. Johnson, Zoran Duric, Sushil Jajodia (George Mason Univ.)
Cocktail Watermarking on Images
Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze (Academia Sinica)

12:00 - 13:30

Lunch at the Hotel Restaurant

13:30 - 15:00

Watermarking VI and Software Protection

Hiding Signatures in Graph Coloring Solutions
Gang Qu, Miodrag Potkonjak (Univ. of California)
Robust Object Watermarking: Application to Code
Julien P. Stern, Gael Hachez, Francois Koeune, Jean-Jacques Quisquater (Univ. Catholique de Louvain, Univ. de Paris-Sud)
Software DisEngineering: Program Hiding Architecture and Experiments
Enriquillo Valdez, Moti Yung (Polyt. Univ. Brooklyn, CertCo New York)

15:00 - 15:30

Coffee break

15:30 - 17:00

Stego-Engineering

Protecting Secret Keys in a Compromised Computational System
W. P. R. Mitchell (Univ. of Manchester)
StegFS: A Steganographic File System for Linux
Andrew D. McDonald, Markus G. Kuhn (Univ. of Cambridge)
Nonbinary Audio Cryptography
Yvo Desmedt, Tri V. Le, Jean-Jacques Quisquater (Univ. of Wisconsin, Univ. Catholique de Louvain)

17:00 - 17:05

Closing Remarks


Saturday, October 2

09:30 - 18:00

Social event: walking: Sächsische Schweiz