Information Hiding
Springer Berlin (Verlag)
978-3-540-00421-9 (ISBN)
Information Hiding and Networking.- Hiding Intrusions: From the Abnormal to the Normal and Beyond.- Eliminating Steganography in Internet Traffic with Active Wardens.- Anonymity.- From a Trickle to a Flood: Active Attacks on Several Mix Types.- Limits of Anonymity in Open Environments.- Chaffinch: Confidentiality in the Face of Legal Threats.- Watermarking Fundamentals.- Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.- Robustness and Efficiency of Non-linear Side-Informed Watermarking.- Security of Public Watermarking Schemes for Binary Sequences.- Watermarking Algorithms I.- Direct Embedding and Detection of RST Invariant Watermarks.- Robust Image Watermark Using Radon Transform and Bispectrum Invariants.- Audio Watermark Robustness to Desynchronization via Beat Detection.- Watermarking Algorithms II.- Robust Watermarking and Affine Registration of 3D Meshes.- Natural Language Watermarking and Tamperproofing.- Attacks on Watermarking Algorithms.- Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.- Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.- Detectors for Echo Hiding Systems.- Steganography Algorithms.- A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.- Steganography Preserving Statistical Properties.- Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression.- Steganalysis I.- Steganalysis of JPEG Images: Breaking the F5 Algorithm.- Detecting Low Embedding Rates.- Steganalysis II.- Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.- Detection of LSB Steganography via Sample Pair Analysis.- Hiding Information in Unusual Content I.- Hiding Data in DNA.- Tracing the Source of a Shredded Document.- Hiding Information in Unusual Content II.- Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.- Practical Oblivious Transfer Protocols.
Erscheint lt. Verlag | 21.1.2003 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 430 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 152 x 229 mm |
Gewicht | 666 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | anonymity • anonymous communication • authentication • digital fingerprinting • digital watermarking • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Hiding • Intellectual Property Protection • intrusion hiding • message hiding • privacy • steganalysis • Steganography |
ISBN-10 | 3-540-00421-1 / 3540004211 |
ISBN-13 | 978-3-540-00421-9 / 9783540004219 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich