Information Hiding
Springer Berlin (Verlag)
978-3-540-88960-1 (ISBN)
Anonymity and Privacy.- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes.- Hiding a Needle in a Haystack Using Negative Databases.- Information Leakage in Optimal Anonymized and Diversified Data.- Steganography I.- Perturbation Hiding and the Batch Steganography Problem.- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.- Forensics.- Detecting Re-projected Video.- Residual Information of Redacted Images Hidden in the Compression Artifacts.- Novel Technologies/Applications.- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.- Reversible Watermarking with Subliminal Channel.- Watermarking I.- Watermarking Security Incorporating Natural Scene Statistics.- Block-Chain Based Fragile Watermarking Scheme with Superior Localization.- Steganalysis.- Generic Adoption of Spatial Steganalysis to Transformed Domain.- Weighted Stego-Image Steganalysis for JPEG Covers.- Practical Insecurity for Effective Steganalysis.- Other hiding Domains I.- Authorship Proof for Textual Document.- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.- Steganography II.- A Data Mapping Method for Steganography and Its Application to Images.- Benchmarking for Steganography.- Other Hiding Domains II and Network Security.- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face.- A Supraliminal Channel in a Videoconferencing Application.- C-Mix: A Lightweight Anonymous Routing Approach.- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.
Erscheint lt. Verlag | 23.10.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 373 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 593 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | anonymity • authentication • cryptography • data hiding • digital fingerprinting • digital forensics • Digital rights management • digital signature • digital watermarking • distortion optimization • Encryption • Fingerprinting • first-order statistics • fragile watermarking • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Hiding • privacy • privacy-preserving • secrecy • security • Security models • semantic content • side channel attacks • software watermarking • source code watermarking • steganalysis • Steganography • subliminal communication • traffic analysis • watermark attacks • Watermarking |
ISBN-10 | 3-540-88960-4 / 3540889604 |
ISBN-13 | 978-3-540-88960-1 / 9783540889601 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich