LEADER 05150nam 22008655 450 001 996465312503316 005 20200704101146.0 010 $a3-642-04431-X 024 7 $a10.1007/978-3-642-04431-1 035 $a(CKB)1000000000784731 035 $a(SSID)ssj0000318250 035 $a(PQKBManifestationID)11265152 035 $a(PQKBTitleCode)TC0000318250 035 $a(PQKBWorkID)10307538 035 $a(PQKB)10016055 035 $a(DE-He213)978-3-642-04431-1 035 $a(MiAaPQ)EBC3064508 035 $a(PPN)139955704 035 $a(EXLCZ)991000000000784731 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Hiding$b[electronic resource] $e11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers /$fedited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 277 p.) 225 1 $aSecurity and Cryptology ;$v5806 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04430-1 320 $aIncludes bibliographical references and index. 327 $aSteganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics. 410 0$aSecurity and Cryptology ;$v5806 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aComputers 606 $aLaw and legislation 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aData Storage Representation$3https://scigraph.springernature.com/ontologies/product-market-codes/I15025 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 608 $aDarmstadt (2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 14$aCryptology. 615 24$aData Storage Representation. 615 24$aLegal Aspects of Computing. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aSystems and Data Security. 676 $a005.8 686 $aDAT 450f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aKatzenbeisser$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSadeghi$b Ahmad-Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIH 2009 906 $aBOOK 912 $a996465312503316 996 $aInformation Hiding$9772148 997 $aUNISA