LEADER 05597nam 22008055 450 001 9910483338403321 005 20200704161346.0 024 7 $a10.1007/11558859 035 $a(CKB)1000000000213270 035 $a(SSID)ssj0000318251 035 $a(PQKBManifestationID)11205756 035 $a(PQKBTitleCode)TC0000318251 035 $a(PQKBWorkID)10308618 035 $a(PQKB)11493044 035 $a(DE-He213)978-3-540-31481-3 035 $a(MiAaPQ)EBC3068406 035 $a(PPN)123097703 035 $a(EXLCZ)991000000000213270 100 $a20100319d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Hiding$b[electronic resource] $e7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers /$fedited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 420 p.) 225 1 $aSecurity and Cryptology ;$v3727 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31481-4 311 $a3-540-29039-7 320 $aIncludes bibliographic references and author index. 327 $aInvited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces -- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images -- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers -- Theory -- Efficient Steganography with Provable Security Guarantees -- Information-Theoretic Analysis of Security in Side-Informed Data Hiding -- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis -- Watermark Attacks -- How to Combat Block Replacement Attacks? -- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes -- Steganography -- Pre-processing for Adding Noise Steganography -- Efficient Wet Paper Codes -- Hiding in Unusual Content -- Translation-Based Steganography -- ID Modulation: Embedding Sensor Data in an RFID Timeseries -- Embedding Covert Channels into TCP/IP -- Steganalysis -- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions -- Assessment of Steganalytic Methods Using Multiple Regression Models -- A General Framework for Structural Steganalysis of LSB Replacement -- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography -- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography -- Software Watermarking -- Self-validating Branch-Based Software Watermarking -- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance -- Dither Modulation Watermarking of Dynamic Memory Traces -- Fingerprinting -- A Family of Collusion 2-Secure Codes -- Best Security Index for Digital Fingerprinting. 410 0$aSecurity and Cryptology ;$v3727 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aApplication software 606 $aMultimedia information systems 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aMultimedia information systems. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aMultimedia Information Systems. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aBarni$b Mauro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHerrera Joancomartí$b Jordi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatzenbeisser$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPérez-González$b Fernando$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483338403321 996 $aInformation Hiding$9772148 997 $aUNINA