Information Hiding
Springer Berlin (Verlag)
978-3-540-77369-6 (ISBN)
New Steganographic Schemes.- MPSteg-color: A New Steganographic Technique for Color Images.- YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.- Steganographic Communication with Quantum Information.- Watermarking Schemess.- Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.- Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.- Computer Security.- A Graph Game Model for Software Tamper Protection.- Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.- Space-Efficient Kleptography Without Random Oracles.- Steganography and Code Theory.- How Can Reed-Solomon Codes Improve Steganographic Schemes?.- Reducing the Complexity of Syndrome Coding for Embedding.- Watermarking Security.- Exploiting Security Holes in Lattice Data Hiding.- Practical Security Analysis of Dirty Paper Trellis Watermarking.- Security of Invertible Media Authentication Schemes Revisited.- Steganalysis.- A Fusion of Maximum Likelihood and Structural Steganalysis.- Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.- Watermarking and Re-synchronization.- Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.- Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.- A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.- Fingerprinting.- Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.- Combining Tardos Fingerprinting Codes and Fingercasting.- Forensics.- Exposing Digital Forgeries Through Specular Highlights on the Eye.- Tamper Hiding: Defeating Image Forensics.- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.- Steganalysis.- Pros and Consof Mel-cepstrum Based Audio Steganalysis Using SVM Classification.- Generalised Category Attack-Improving Histogram-Based Attack on JPEG LSB Embedding.
Erscheint lt. Verlag | 14.1.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 396 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 615 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • Code • Communication • cryptography • data hiding • digital fingerprinting • digital forensics • Digital rights management • digital signature • digital watermarking • Elliptic Curve • Encryption • Fingerprinting • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Hiding • kleptography • Optimization • Oracle • privacy • secrecy • security • Semantic • software watermarking • source code watermarking • steganalysis • Steganography • subliminal communication • traffic analysis • watermark attacks • Watermarking |
ISBN-10 | 3-540-77369-X / 354077369X |
ISBN-13 | 978-3-540-77369-6 / 9783540773696 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich