Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Barni, Mauro (Επιμελητής έκδοσης), Herrera-Joancomartí, Jordi (Επιμελητής έκδοσης), Katzenbeisser, Stefan (Επιμελητής έκδοσης), Pérez-González, Fernando (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3727
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk
  • On Joint Coding for Watermarking and Encryption
  • Anonymity
  • Compulsion Resistant Anonymous Communications
  • Provable Anonymity for Networks of Mixes
  • On Blending Attacks for Mixes with Memory
  • Pervasive Random Beacon in the Internet for Covert Coordination
  • Censorship Resistance Revisited
  • Watermarking
  • Optimal Embedding for Watermarking in Discrete Data Spaces
  • A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images
  • A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers
  • Theory
  • Efficient Steganography with Provable Security Guarantees
  • Information-Theoretic Analysis of Security in Side-Informed Data Hiding
  • Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
  • Watermark Attacks
  • How to Combat Block Replacement Attacks?
  • On the Intractability of Inverting Geometric Distortions in Watermarking Schemes
  • Steganography
  • Pre-processing for Adding Noise Steganography
  • Efficient Wet Paper Codes
  • Hiding in Unusual Content
  • Translation-Based Steganography
  • ID Modulation: Embedding Sensor Data in an RFID Timeseries
  • Embedding Covert Channels into TCP/IP
  • Steganalysis
  • Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions
  • Assessment of Steganalytic Methods Using Multiple Regression Models
  • A General Framework for Structural Steganalysis of LSB Replacement
  • New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography
  • An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography
  • Software Watermarking
  • Self-validating Branch-Based Software Watermarking
  • Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
  • Dither Modulation Watermarking of Dynamic Memory Traces
  • Fingerprinting
  • A Family of Collusion 2-Secure Codes
  • Best Security Index for Digital Fingerprinting.