Information Hiding
Springer Berlin (Verlag)
978-3-540-24207-9 (ISBN)
Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware).- An Implementation of, and Attacks on, Zero-Knowledge Watermarking.- On the Possibility of Non-invertible Watermarking Schemes.- Reversing Global and Local Geometrical Distortions in Image Watermarking.- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems.- Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.- Session 2 - Steganalysis Session Chair: Mauro Barni (University of Siena).- Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.- Exploiting Preserved Statistics for Steganalysis.- Improved Detection of LSB Steganography in Grayscale Images.- An Improved Sample Pairs Method for Detection of LSB Embedding.- Session 3 - Forensic Applications Session Chair: Scott Craver (Princeton University).- Statistical Tools for Digital Forensics.- Relative Generic Computational Forensic Techniques.- Session 4 - Steganography Session Chair: Andreas Westfeld (Dresden University of Technology).- Syntax and Semantics-Preserving Application-Layer Protocol Steganography.- A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy.- Session 5 - Software Watermarking Session Chair: John McHugh (SEI/CERT).- Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks.- Threading Software Watermarks.- Soft IP Protection: Watermarking HDL Codes.- Session 6 - Security and Privacy Session Chair: Ross Anderson (University of Cambridge).- An Asymmetric Security Mechanism for Navigation Signals.- Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme.- Empirical and Theoretical Evaluation of ActiveProbing Attacks and Their Countermeasures.- Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring.- Session 7 - Anonymity Session Chair: Andreas Pfitzmann (Dresden University of Technology).- Statistical Disclosure or Intersection Attacks on Anonymity Systems.- Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.- The Hitting Set Attack on Anonymity Protocols.- Session 8 - Data Hiding in Unusual Content Session Chair: Christian Collberg (University of Arizona).- Information Hiding in Finite State Machine.- Covert Channels for Collusion in Online Computer Games.
Erscheint lt. Verlag | 17.12.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | IX, 371 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 575 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | anonymity • anonymity protocols • Code • Datenschutz • Datensicherung • digital fingerprinting • digital forensics • digital watermarking • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Image Watermarking • Information • Information Hiding • Optimization • privacy • security • session • source code watermarking • Steganography • zero-knowledge watermarking |
ISBN-10 | 3-540-24207-4 / 3540242074 |
ISBN-13 | 978-3-540-24207-9 / 9783540242079 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich