Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3727 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk
- On Joint Coding for Watermarking and Encryption
- Anonymity
- Compulsion Resistant Anonymous Communications
- Provable Anonymity for Networks of Mixes
- On Blending Attacks for Mixes with Memory
- Pervasive Random Beacon in the Internet for Covert Coordination
- Censorship Resistance Revisited
- Watermarking
- Optimal Embedding for Watermarking in Discrete Data Spaces
- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images
- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers
- Theory
- Efficient Steganography with Provable Security Guarantees
- Information-Theoretic Analysis of Security in Side-Informed Data Hiding
- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
- Watermark Attacks
- How to Combat Block Replacement Attacks?
- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes
- Steganography
- Pre-processing for Adding Noise Steganography
- Efficient Wet Paper Codes
- Hiding in Unusual Content
- Translation-Based Steganography
- ID Modulation: Embedding Sensor Data in an RFID Timeseries
- Embedding Covert Channels into TCP/IP
- Steganalysis
- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions
- Assessment of Steganalytic Methods Using Multiple Regression Models
- A General Framework for Structural Steganalysis of LSB Replacement
- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography
- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography
- Software Watermarking
- Self-validating Branch-Based Software Watermarking
- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
- Dither Modulation Watermarking of Dynamic Memory Traces
- Fingerprinting
- A Family of Collusion 2-Secure Codes
- Best Security Index for Digital Fingerprinting.