Runtime Verification Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Runtime Verification, RV 2012, held in Istanbul, Turkey, in September 2012. The 25 revised full papers presented together with 3 invited papers and  2 tutorials were carefully reviewed...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Qadeer, Shaz (Επιμελητής έκδοσης), Tasiran, Serdar (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Σειρά:Lecture Notes in Computer Science, 7687
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Multimedia Forensics and Counter-Forensics
  • Blind Median Filtering Detection Using Statistics in Difference Domain
  • Robustness of Color Interpolation Identification against Anti-forensic Operations
  • Steganalysis
  • Steganalysis of LSB Replacement Using Parity-Aware Features
  • Statistical Detection of LSB Matching Using Hypothesis Testing Theory
  • Textural Features for Steganalysis
  • JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts
  • Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface
  • Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data
  • Steganography A Game-Theoretic Approach to Content-Adaptive Steganography
  • Key-Efficient Steganography
  • Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations
  • Anonymity and Privacy Lower Bounds for Private Broadcast Encryption
  • The Dangers of Composing Anonymous Channels
  • Watermarking A New Measure of Watermarking Security Applied on QIM
  • Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking
  • Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking
  • Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model
  • Bias Equalizer for Binary Probabilistic Fingerprinting Codes.