Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3727 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk
- On Joint Coding for Watermarking and Encryption
- Anonymity
- Compulsion Resistant Anonymous Communications
- Provable Anonymity for Networks of Mixes
- On Blending Attacks for Mixes with Memory
- Pervasive Random Beacon in the Internet for Covert Coordination
- Censorship Resistance Revisited
- Watermarking
- Optimal Embedding for Watermarking in Discrete Data Spaces
- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images
- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers
- Theory
- Efficient Steganography with Provable Security Guarantees
- Information-Theoretic Analysis of Security in Side-Informed Data Hiding
- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
- Watermark Attacks
- How to Combat Block Replacement Attacks?
- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes
- Steganography
- Pre-processing for Adding Noise Steganography
- Efficient Wet Paper Codes
- Hiding in Unusual Content
- Translation-Based Steganography
- ID Modulation: Embedding Sensor Data in an RFID Timeseries
- Embedding Covert Channels into TCP/IP
- Steganalysis
- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions
- Assessment of Steganalytic Methods Using Multiple Regression Models
- A General Framework for Structural Steganalysis of LSB Replacement
- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography
- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography
- Software Watermarking
- Self-validating Branch-Based Software Watermarking
- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
- Dither Modulation Watermarking of Dynamic Memory Traces
- Fingerprinting
- A Family of Collusion 2-Secure Codes
- Best Security Index for Digital Fingerprinting.