LEADER 03756nam 2200637 a 450 001 9910768165203321 005 20200520144314.0 010 $a3-540-69019-0 024 7 $a10.1007/978-3-540-69019-1 035 $a(CKB)1000000000440614 035 $a(SSID)ssj0000320472 035 $a(PQKBManifestationID)11238884 035 $a(PQKBTitleCode)TC0000320472 035 $a(PQKBWorkID)10247639 035 $a(PQKB)11367752 035 $a(DE-He213)978-3-540-69019-1 035 $a(MiAaPQ)EBC3068629 035 $a(PPN)127048340 035 $a(EXLCZ)991000000000440614 100 $a20080423d2008 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aTransactions on data hiding and multimedia security III /$fYun Q. Shi (ed.) 205 $a1st ed. 2008. 210 $aBerlin $cSpringer$d2008 215 $a1 online resource (IX, 91 p.) 225 1 $aLecture notes in computer science. Journal subline,$x1861-3043 ;$v4920 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-69016-6 320 $aIncludes bibliographical references and index. 327 $aConstructing Good Covering Codes for Applications in Steganography -- On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems -- Secure Steganography Using Gabor Filter and Neural Networks -- Oracle Channels -- Quantization-Based Methods: Additive Attacks Performance Analysis. 330 $aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods. 410 0$aLecture notes in computer science.$pJournal subline ;$v4920. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aData hiding and multimedia security III 517 3 $aTransactions on data hiding and multimedia security 3 517 3 $aData hiding and multimedia security 3 606 $aMultimedia systems$xSecurity measures 606 $aData encryption (Computer science) 606 $aWatermarks 615 0$aMultimedia systems$xSecurity measures. 615 0$aData encryption (Computer science) 615 0$aWatermarks. 676 $a005.8 701 $aShi$b Yun Q$0600623 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910768165203321 996 $aTransactions on data hiding and multimedia security III$94186798 997 $aUNINA