LEADER 04831nam 22007815 450 001 996465610603316 005 20200629162051.0 010 $a3-540-69019-0 024 7 $a10.1007/978-3-540-69019-1 035 $a(CKB)1000000000440614 035 $a(SSID)ssj0000320472 035 $a(PQKBManifestationID)11238884 035 $a(PQKBTitleCode)TC0000320472 035 $a(PQKBWorkID)10247639 035 $a(PQKB)11367752 035 $a(DE-He213)978-3-540-69019-1 035 $a(MiAaPQ)EBC3068629 035 $a(PPN)127048340 035 $a(EXLCZ)991000000000440614 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTransactions on Data Hiding and Multimedia Security III$b[electronic resource] /$fedited by Yun Q. Shi 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (IX, 91 p.) 225 1 $aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v4920 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-69016-6 320 $aIncludes bibliographical references and index. 327 $aConstructing Good Covering Codes for Applications in Steganography -- On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems -- Secure Steganography Using Gabor Filter and Neural Networks -- Oracle Channels -- Quantization-Based Methods: Additive Attacks Performance Analysis. 330 $aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods. 410 0$aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v4920 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aMultimedia information systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aMultimedia information systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aMultimedia Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465610603316 996 $aTransactions on Data Hiding and Multimedia Security III$9774337 997 $aUNISA