Cargando…

Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Barni, Mauro (Editor ), Herrera Joancomartí, Jordi (Editor ), Katzenbeisser, Stefan (Editor ), Pérez-González, Fernando (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3727
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talk
  • On Joint Coding for Watermarking and Encryption
  • Anonymity
  • Compulsion Resistant Anonymous Communications
  • Provable Anonymity for Networks of Mixes
  • On Blending Attacks for Mixes with Memory
  • Pervasive Random Beacon in the Internet for Covert Coordination
  • Censorship Resistance Revisited
  • Watermarking
  • Optimal Embedding for Watermarking in Discrete Data Spaces
  • A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images
  • A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers
  • Theory
  • Efficient Steganography with Provable Security Guarantees
  • Information-Theoretic Analysis of Security in Side-Informed Data Hiding
  • Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
  • Watermark Attacks
  • How to Combat Block Replacement Attacks?
  • On the Intractability of Inverting Geometric Distortions in Watermarking Schemes
  • Steganography
  • Pre-processing for Adding Noise Steganography
  • Efficient Wet Paper Codes
  • Hiding in Unusual Content
  • Translation-Based Steganography
  • ID Modulation: Embedding Sensor Data in an RFID Timeseries
  • Embedding Covert Channels into TCP/IP
  • Steganalysis
  • Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions
  • Assessment of Steganalytic Methods Using Multiple Regression Models
  • A General Framework for Structural Steganalysis of LSB Replacement
  • New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography
  • An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography
  • Software Watermarking
  • Self-validating Branch-Based Software Watermarking
  • Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
  • Dither Modulation Watermarking of Dynamic Memory Traces
  • Fingerprinting
  • A Family of Collusion 2-Secure Codes
  • Best Security Index for Digital Fingerprinting.