Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Camenisch, Jan L. (Επιμελητής έκδοσης), Collberg, Christian S. (Επιμελητής έκδοσης), Johnson, Neil F. (Επιμελητής έκδοσης), Sallee, Phil (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4437
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Hamiltonian Mechanics
  • Natural Watermarking: A Secure Spread Spectrum Technique for WOA
  • An Improved Asymmetric Watermarking System Using Matrix Embedding
  • A Cryptographic Method for Secure Watermark Detection
  • Steganographic Communication in Ordered Channels
  • Analyzing Network-Aware Active Wardens in IPv6
  • Video Watermarking by Using Geometic Warping Without Visible Artifacts
  • Video Watermarking by Using Geometric Warping Without Visible Artifacts
  • Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain
  • Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
  • Noisy Timing Channels with Binary Inputs and Outputs
  • A Computational Model for Watermark Robustness
  • Hiding Information Hiding
  • Reversible Watermarking of NURBS-Based CAD Models
  • A High-Capacity Data Hiding Method for Polygonal Meshes
  • Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television
  • Delayed and Controlled Failures in Tamper-Resistant Software
  • A Model for Self-Modifying Code
  • A Markov Process Based Approach to Effective Attacking JPEG Steganography
  • Batch Steganography and Pooled Steganalysis
  • On Steganographic Embedding Efficiency
  • Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks
  • Modified Matrix Encoding Technique for Minimal Distortion Steganography
  • Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting
  • A Collusion-Resistant Video Watermarking Scheme
  • An Elliptic Curve Backdoor Algorithm for RSASSA
  • A Subliminal-Free Variant of ECDSA.