Information Hiding Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings /

The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio a...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Aucsmith, David (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1998.
Έκδοση:1st ed. 1998.
Σειρά:Lecture Notes in Computer Science, 1525
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05643nam a2200589 4500
001 978-3-540-49380-8
003 DE-He213
005 20191023222653.0
007 cr nn 008mamaa
008 121227s1998 gw | s |||| 0|eng d
020 |a 9783540493808  |9 978-3-540-49380-8 
024 7 |a 10.1007/3-540-49380-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D335 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Information Hiding  |h [electronic resource] :  |b Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings /  |c edited by David Aucsmith. 
250 |a 1st ed. 1998. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1998. 
300 |a IX, 369 p. 129 illus., 35 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1525 
505 0 |a Steganography -- Information Hiding to Foil the Casual Counterfeiter -- Fingerprinting Digital Circuits on Programmable Hardware -- Steganography in a Video Conferencing System -- Reliable Blind Information Hiding for Images -- Cerebral Cryptography -- Other Applications -- The Steganographic File System -- Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System -- Biometric yet Privacy Protecting Person Authentication -- On Software Protection via Function Hiding -- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations -- Copyright Marking -- Robust Digital Watermarking Based on Key-Dependent Basis Functions -- Intellectual Property Protection Systems and Digital Watermarking -- Secure Copyright Protection Techniques for Digital Images -- Shedding More Light on Image Watermarks -- Continuous Steganographic Data Transmission Using Uncompressed Audio -- Attack -- Attacks on Copyright Marking Systems -- Testing Digital Watermark Resistance to Destruction -- Analysis of the Sensitivity Attack against Electronic Watermarks in Images -- Steganalysis of Images Created Using Current Steganography Software -- Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks -- Theory -- An Information-Theoretic Model for Steganography -- Steganalysis and Game Equilibria -- Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks -- Modeling the Security of Steganographic Systems -- On Public-Key Steganography in the Presence of an Active Warden. 
520 |a The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in 'stray' communication channels, such as those which arise via shared resourcesin operating systems or the physical le- age of information through radio frequency emissions; and n ally, many workers in these elds drew inspiration from 'classical' hidden communication methods such as steganography and spread-spectrum radio. The rst international workshop on this new emergent discipline of inf- mation hiding was organised by Ross Anderson and held at the Isaac Newton Institute, Cambridge, from the 30th May to the 1st June 1996, and was judged by attendees to be a successful and signi cant event. In addition to a number of research papers, we had invited talks from David Kahn on the history of steganography and from Gus Simmons on the history of subliminal channels. We also had a number of discussion sessions, culminating in a series of votes on common terms and de nitions. These papers and talks, together with minutes of the discussion, can be found in the proceedings, which are published in this series as Volume 1174. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Operating systems (Computers). 
650 0 |a Computer communication systems. 
650 0 |a Multimedia information systems. 
650 1 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Multimedia Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I18059 
700 1 |a Aucsmith, David.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540653868 
776 0 8 |i Printed edition:  |z 9783662195871 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1525 
856 4 0 |u https://doi.org/10.1007/3-540-49380-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)