Information Hiding
Editat de Fabien A. P. Petitcolasen Limba Engleză Paperback – 21 ian 2003
Preț: 328.50 lei
Preț vechi: 410.63 lei
-20%
Puncte Express: 493
Preț estimativ în valută:
58.15€ • 67.79$ • 50.37£
58.15€ • 67.79$ • 50.37£
Carte tipărită la comandă
Livrare economică 27 februarie-13 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540004219
ISBN-10: 3540004211
Pagini: 444
Ilustrații: X, 430 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.67 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540004211
Pagini: 444
Ilustrații: X, 430 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.67 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Information Hiding and Networking.- Hiding Intrusions: From the Abnormal to the Normal and Beyond.- Eliminating Steganography in Internet Traffic with Active Wardens.- Anonymity.- From a Trickle to a Flood: Active Attacks on Several Mix Types.- Limits of Anonymity in Open Environments.- Chaffinch: Confidentiality in the Face of Legal Threats.- Watermarking Fundamentals.- Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.- Robustness and Efficiency of Non-linear Side-Informed Watermarking.- Security of Public Watermarking Schemes for Binary Sequences.- Watermarking Algorithms I.- Direct Embedding and Detection of RST Invariant Watermarks.- Robust Image Watermark Using Radon Transform and Bispectrum Invariants.- Audio Watermark Robustness to Desynchronization via Beat Detection.- Watermarking Algorithms II.- Robust Watermarking and Affine Registration of 3D Meshes.- Natural Language Watermarking and Tamperproofing.- Attacks on Watermarking Algorithms.- Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.- Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.- Detectors for Echo Hiding Systems.- Steganography Algorithms.- A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.- Steganography Preserving Statistical Properties.- Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression.- Steganalysis I.- Steganalysis of JPEG Images: Breaking the F5 Algorithm.- Detecting Low Embedding Rates.- Steganalysis II.- Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.- Detection of LSB Steganography via Sample Pair Analysis.- Hiding Information in Unusual Content I.- Hiding Data in DNA.- Tracing the Source of a Shredded Document.- Hiding Information in Unusual Content II.- Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.- Practical Oblivious Transfer Protocols.
Caracteristici
Includes supplementary material: sn.pub/extras