Cargando…

Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Camenisch, Jan (Editor ), Collberg, Christian (Editor ), Johnson, Neil F. (Editor ), Sallee, Phil (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4437
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Hamiltonian Mechanics
  • Natural Watermarking: A Secure Spread Spectrum Technique for WOA
  • An Improved Asymmetric Watermarking System Using Matrix Embedding
  • A Cryptographic Method for Secure Watermark Detection
  • Steganographic Communication in Ordered Channels
  • Analyzing Network-Aware Active Wardens in IPv6
  • Video Watermarking by Using Geometic Warping Without Visible Artifacts
  • Video Watermarking by Using Geometric Warping Without Visible Artifacts
  • Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain
  • Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
  • Noisy Timing Channels with Binary Inputs and Outputs
  • A Computational Model for Watermark Robustness
  • Hiding Information Hiding
  • Reversible Watermarking of NURBS-Based CAD Models
  • A High-Capacity Data Hiding Method for Polygonal Meshes
  • Steganography for Radio Amateurs- A DSSS Based Approach for Slow Scan Television
  • Delayed and Controlled Failures in Tamper-Resistant Software
  • A Model for Self-Modifying Code
  • A Markov Process Based Approach to Effective Attacking JPEG Steganography
  • Batch Steganography and Pooled Steganalysis
  • On Steganographic Embedding Efficiency
  • Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks
  • Modified Matrix Encoding Technique for Minimal Distortion Steganography
  • Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting
  • A Collusion-Resistant Video Watermarking Scheme
  • An Elliptic Curve Backdoor Algorithm for RSASSA
  • A Subliminal-Free Variant of ECDSA.