7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
De som köpt den här boken har ofta också köpt Sound and Recording av Francis Rumsey (häftad).
Köp båda 2 för 1618 krInvited Talk.- On Joint Coding for Watermarking and Encryption.- Anonymity.- Compulsion Resistant Anonymous Communications.- Provable Anonymity for Networks of Mixes.- On Blending Attacks for Mixes with Memory.- Pervasive Random Beacon in the Internet for Covert Coordination.- Censorship Resistance Revisited.- Watermarking.- Optimal Embedding for Watermarking in Discrete Data Spaces.- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images.- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.- Theory.- Efficient Steganography with Provable Security Guarantees.- Information-Theoretic Analysis of Security in Side-Informed Data Hiding.- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.- Watermark Attacks.- How to Combat Block Replacement Attacks?.- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes.- Steganography.- Pre-processing for Adding Noise Steganography.- Efficient Wet Paper Codes.- Hiding in Unusual Content.- Translation-Based Steganography.- ID Modulation: Embedding Sensor Data in an RFID Timeseries.- Embedding Covert Channels into TCP/IP.- Steganalysis.- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.- Assessment of Steganalytic Methods Using Multiple Regression Models.- A General Framework for Structural Steganalysis of LSB Replacement.- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.- Software Watermarking.- Self-validating Branch-Based Software Watermarking.- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.- Dither Modulation Watermarking of Dynamic Memory Traces.- Fingerprinting.- A Family of Collusion 2-Secure Codes.- Best Security Index for Digital Fingerprinting.