Information Hiding
Editat de David Aucsmithen Limba Engleză Paperback – 30 noi 1998
Preț: 325.25 lei
Preț vechi: 406.57 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.55€ • 67.49$ • 50.54£
57.55€ • 67.49$ • 50.54£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540653868
ISBN-10: 3540653864
Pagini: 380
Ilustrații: IX, 369 p. 129 illus., 35 illus. in color.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:1998
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540653864
Pagini: 380
Ilustrații: IX, 369 p. 129 illus., 35 illus. in color.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:1998
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Steganography.- Information Hiding to Foil the Casual Counterfeiter.- Fingerprinting Digital Circuits on Programmable Hardware.- Steganography in a Video Conferencing System.- Reliable Blind Information Hiding for Images.- Cerebral Cryptography.- Other Applications.- The Steganographic File System.- Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System.- Biometric yet Privacy Protecting Person Authentication.- On Software Protection via Function Hiding.- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.- Copyright Marking.- Robust Digital Watermarking Based on Key-Dependent Basis Functions.- Intellectual Property Protection Systems and Digital Watermarking.- Secure Copyright Protection Techniques for Digital Images.- Shedding More Light on Image Watermarks.- Continuous Steganographic Data Transmission Using Uncompressed Audio.- Attack.- Attacks on Copyright Marking Systems.- Testing Digital Watermark Resistance to Destruction.- Analysis of the Sensitivity Attack against Electronic Watermarks in Images.- Steganalysis of Images Created Using Current Steganography Software.- Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks.- Theory.- An Information-Theoretic Model for Steganography.- Steganalysis and Game Equilibria.- Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks.- Modeling the Security of Steganographic Systems.- On Public-Key Steganography in the Presence of an Active Warden.