top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital Watermarking [[electronic resource] ] : 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers / / edited by Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni
Digital Watermarking [[electronic resource] ] : 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers / / edited by Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (X, 317 p. 140 illus., 60 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Information storage and retrieval
Computer graphics
Optical data processing
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Information Storage and Retrieval
Computer Graphics
Image Processing and Computer Vision
ISBN 3-642-18405-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466062903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 337 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Information storage and retrieval
Computer graphics
Optical data processing
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Information Storage and Retrieval
Computer Graphics
Image Processing and Computer Vision
Soggetto genere / forma Guildford (2009)
Kongress.
ISBN 3-642-03688-0
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
Record Nr. UNISA-996465561103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 337 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Information storage and retrieval
Computer graphics
Optical data processing
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Information Storage and Retrieval
Computer Graphics
Image Processing and Computer Vision
Soggetto genere / forma Guildford (2009)
Kongress.
ISBN 3-642-03688-0
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
Record Nr. UNINA-9910484839803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 492 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Multimedia information systems
Computers and civilization
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Multimedia Information Systems
Computers and Society
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.
Record Nr. UNISA-996465375903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 492 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Multimedia information systems
Computers and civilization
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Multimedia Information Systems
Computers and Society
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.
Record Nr. UNINA-9910484048803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IInformation fusion in distributed sensor networks with Byzantines / / Andrea Abrardo [et al.]
IInformation fusion in distributed sensor networks with Byzantines / / Andrea Abrardo [et al.]
Autore Abrardo Andrea
Edizione [1st edition 2021.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (XIX, 109 p. 26 illus., 15 illus. in color.)
Disciplina 006.25
Collana Signals and Communication Technology
Soggetto topico Signal processing
Image processing
Speech processing systems
Computer security
System safety
ISBN 981-329-001-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions.
Record Nr. UNINA-9910484226603321
Abrardo Andrea  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Application software
Multimedia information systems
Computer communication systems
Cryptology
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Computer Communication Networks
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces -- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images -- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers -- Theory -- Efficient Steganography with Provable Security Guarantees -- Information-Theoretic Analysis of Security in Side-Informed Data Hiding -- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis -- Watermark Attacks -- How to Combat Block Replacement Attacks? -- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes -- Steganography -- Pre-processing for Adding Noise Steganography -- Efficient Wet Paper Codes -- Hiding in Unusual Content -- Translation-Based Steganography -- ID Modulation: Embedding Sensor Data in an RFID Timeseries -- Embedding Covert Channels into TCP/IP -- Steganalysis -- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions -- Assessment of Steganalytic Methods Using Multiple Regression Models -- A General Framework for Structural Steganalysis of LSB Replacement -- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography -- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography -- Software Watermarking -- Self-validating Branch-Based Software Watermarking -- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance -- Dither Modulation Watermarking of Dynamic Memory Traces -- Fingerprinting -- A Family of Collusion 2-Secure Codes -- Best Security Index for Digital Fingerprinting.
Record Nr. UNISA-996465833303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Application software
Multimedia information systems
Computer communication systems
Cryptology
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Computer Communication Networks
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces -- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images -- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers -- Theory -- Efficient Steganography with Provable Security Guarantees -- Information-Theoretic Analysis of Security in Side-Informed Data Hiding -- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis -- Watermark Attacks -- How to Combat Block Replacement Attacks? -- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes -- Steganography -- Pre-processing for Adding Noise Steganography -- Efficient Wet Paper Codes -- Hiding in Unusual Content -- Translation-Based Steganography -- ID Modulation: Embedding Sensor Data in an RFID Timeseries -- Embedding Covert Channels into TCP/IP -- Steganalysis -- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions -- Assessment of Steganalytic Methods Using Multiple Regression Models -- A General Framework for Structural Steganalysis of LSB Replacement -- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography -- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography -- Software Watermarking -- Self-validating Branch-Based Software Watermarking -- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance -- Dither Modulation Watermarking of Dynamic Memory Traces -- Fingerprinting -- A Family of Collusion 2-Secure Codes -- Best Security Index for Digital Fingerprinting.
Record Nr. UNINA-9910483338403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui