Information Hiding
Editat de Jessica Fridrichen Limba Engleză Paperback – 17 dec 2004
Preț: 325.69 lei
Preț vechi: 407.10 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.63€ • 67.58$ • 50.61£
57.63€ • 67.58$ • 50.61£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540242079
ISBN-10: 3540242074
Pagini: 388
Ilustrații: IX, 371 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.59 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540242074
Pagini: 388
Ilustrații: IX, 371 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.59 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware).- An Implementation of, and Attacks on, Zero-Knowledge Watermarking.- On the Possibility of Non-invertible Watermarking Schemes.- Reversing Global and Local Geometrical Distortions in Image Watermarking.- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems.- Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.- Session 2 - Steganalysis Session Chair: Mauro Barni (University of Siena).- Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.- Exploiting Preserved Statistics for Steganalysis.- Improved Detection of LSB Steganography in Grayscale Images.- An Improved Sample Pairs Method for Detection of LSB Embedding.- Session 3 - Forensic Applications Session Chair: Scott Craver (Princeton University).- Statistical Tools for Digital Forensics.- Relative Generic Computational Forensic Techniques.- Session 4 - Steganography Session Chair: Andreas Westfeld (Dresden University of Technology).- Syntax and Semantics-Preserving Application-Layer Protocol Steganography.- A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy.- Session 5 - Software Watermarking Session Chair: John McHugh (SEI/CERT).- Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks.- Threading Software Watermarks.- Soft IP Protection: Watermarking HDL Codes.- Session 6 - Security and Privacy Session Chair: Ross Anderson (University of Cambridge).- An Asymmetric Security Mechanism for Navigation Signals.- Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme.- Empirical and Theoretical Evaluation of ActiveProbing Attacks and Their Countermeasures.- Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring.- Session 7 - Anonymity Session Chair: Andreas Pfitzmann (Dresden University of Technology).- Statistical Disclosure or Intersection Attacks on Anonymity Systems.- Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.- The Hitting Set Attack on Anonymity Protocols.- Session 8 - Data Hiding in Unusual Content Session Chair: Christian Collberg (University of Arizona).- Information Hiding in Finite State Machine.- Covert Channels for Collusion in Online Computer Games.
Caracteristici
Includes supplementary material: sn.pub/extras