top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communications and Multimedia Security [[electronic resource] ] : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / / edited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
Communications and Multimedia Security [[electronic resource] ] : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / / edited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Multimedia information systems
Application software
Management information systems
Computer science
Computers and civilization
Cryptology
Computer Communication Networks
Multimedia Information Systems
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computers and Society
ISBN 3-540-31978-6
3-540-28791-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle – A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph–Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management– Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Record Nr. UNISA-996465434103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / / edited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
Communications and Multimedia Security [[electronic resource] ] : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / / edited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Multimedia information systems
Application software
Management information systems
Computer science
Computers and civilization
Cryptology
Computer Communication Networks
Multimedia Information Systems
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computers and Society
ISBN 3-540-31978-6
3-540-28791-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle – A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph–Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management– Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Record Nr. UNINA-9910483203803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Compilation for secure multi-party computation / / by Niklas Büscher, Stefan Katzenbeisser
Compilation for secure multi-party computation / / by Niklas Büscher, Stefan Katzenbeisser
Autore Büscher Niklas
Pubbl/distr/stampa Cham : , : Springer, , [2017]
Descrizione fisica 1 online resource : illustrations
Disciplina 005.8
Collana SpringerBriefs in Computer Science
Soggetto topico Computer security
Data structures (Computer science)
Electronic circuits
Systems and Data Security
Data Structures and Information Theory
Circuits and Systems
ISBN 3-319-67522-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Motivation -- 2 Related Work -- 3 Introduction into MPC Protocols -- 4 A general framework to compile circuits for MPC -- 5 Compiling size-optimized circuits for MPC protocols with constant rounds -- 6 Compiling depth-optimized circuits for round-based MPC protocols -- 7 Compiling parallel circuits for MPC protocols -- 8 Appendix.
Record Nr. UNINA-9910254840703321
Büscher Niklas  
Cham : , : Springer, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers / / edited by Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T. S. Ho
Digital Watermarking [[electronic resource] ] : 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers / / edited by Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T. S. Ho
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 472 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Optical data processing
Computer graphics
Data structures (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Cryptology
Image Processing and Computer Vision
Computer Graphics
Data Structures and Information Theory
Coding and Information Theory
Discrete Mathematics in Computer Science
ISBN 3-642-04438-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Robust Watermarking Scheme for H.264 -- Detection of Double MPEG Compression Based on First Digit Statistics -- A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking -- A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection -- Reversible Data Hiding Based On H.264/AVC Intra Prediction -- Scalability Evaluation of Blind Spread-Spectrum Image Watermarking -- Run-Length and Edge Statistics Based Approach for Image Splicing Detection -- Scale-Space Feature Based Image Watermarking in Contourlet Domain -- A Practical Print-and-Scan Resilient Watermarking for High Resolution Images -- Adaptive SVD-Based Digital Image Watermarking -- Robust Audio Watermarking Based on Log-Polar Frequency Index -- Adaptive Threshold Based Robust Watermark Detection Method -- A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering -- Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient -- Exposure Time Change Attack on Image Watermarking Systems -- Steganalysis Based on Difference Image -- A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching -- A Novel Approach for JPEG Steganography -- A High Capacity Steganographic Algorithm in Color Images -- A Novel Method for Block Size Forensics Based on Morphological Operations -- Non-malleable Schemes Resisting Adaptive Adversaries -- An Algorithm for Modeling Print and Scan Operations Used for Watermarking -- Space Time Block Coding for Spread Spectrum Watermarking Systems -- Formal Analysis of Two Buyer-Seller Watermarking Protocols -- Detection of Hidden Information in Webpage Based on Higher-Order Statistics -- Secret Sharing Based Video Watermark Algorithm for Multiuser -- GSM Based Security Analysis for Add-SS Watermarking -- Video Watermarking Based on Spatio-temporal JND Profile -- On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography -- Balanced Multiwavelets Based Digital Image Watermarking -- A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking -- Multiple Watermarking with Side Information -- Content Sharing Based on Personal Information in Virtually Secured Space -- Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models -- A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework -- An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption -- First Digit Law and Its Application to Digital Forensics -- Digital Camera Identification from Images – Estimating False Acceptance Probability -- Design of Collusion-Resistant Fingerprinting Systems: Review and New Results.
Record Nr. UNISA-996465628003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers / / edited by Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T. S. Ho
Digital Watermarking [[electronic resource] ] : 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers / / edited by Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T. S. Ho
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 472 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Optical data processing
Computer graphics
Data structures (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Cryptology
Image Processing and Computer Vision
Computer Graphics
Data Structures and Information Theory
Coding and Information Theory
Discrete Mathematics in Computer Science
ISBN 3-642-04438-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Robust Watermarking Scheme for H.264 -- Detection of Double MPEG Compression Based on First Digit Statistics -- A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking -- A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection -- Reversible Data Hiding Based On H.264/AVC Intra Prediction -- Scalability Evaluation of Blind Spread-Spectrum Image Watermarking -- Run-Length and Edge Statistics Based Approach for Image Splicing Detection -- Scale-Space Feature Based Image Watermarking in Contourlet Domain -- A Practical Print-and-Scan Resilient Watermarking for High Resolution Images -- Adaptive SVD-Based Digital Image Watermarking -- Robust Audio Watermarking Based on Log-Polar Frequency Index -- Adaptive Threshold Based Robust Watermark Detection Method -- A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering -- Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient -- Exposure Time Change Attack on Image Watermarking Systems -- Steganalysis Based on Difference Image -- A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching -- A Novel Approach for JPEG Steganography -- A High Capacity Steganographic Algorithm in Color Images -- A Novel Method for Block Size Forensics Based on Morphological Operations -- Non-malleable Schemes Resisting Adaptive Adversaries -- An Algorithm for Modeling Print and Scan Operations Used for Watermarking -- Space Time Block Coding for Spread Spectrum Watermarking Systems -- Formal Analysis of Two Buyer-Seller Watermarking Protocols -- Detection of Hidden Information in Webpage Based on Higher-Order Statistics -- Secret Sharing Based Video Watermark Algorithm for Multiuser -- GSM Based Security Analysis for Add-SS Watermarking -- Video Watermarking Based on Spatio-temporal JND Profile -- On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography -- Balanced Multiwavelets Based Digital Image Watermarking -- A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking -- Multiple Watermarking with Side Information -- Content Sharing Based on Personal Information in Virtually Secured Space -- Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models -- A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework -- An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption -- First Digit Law and Its Application to Digital Forensics -- Digital Camera Identification from Images – Estimating False Acceptance Probability -- Design of Collusion-Resistant Fingerprinting Systems: Review and New Results.
Record Nr. UNINA-9910484694603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNISA-996465399003316
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNINA-9910484691103321
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Systems Security and Privacy Protection [[electronic resource] ] : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings / / edited by Jaap-Henk Hoepman, Stefan Katzenbeisser
ICT Systems Security and Privacy Protection [[electronic resource] ] : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings / / edited by Jaap-Henk Hoepman, Stefan Katzenbeisser
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 414 p. 82 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Data encryption (Computer science)
Computers and civilization
Computer communication systems
Application software
Systems and Data Security
Cryptology
Computers and Society
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-33630-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Coercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA -- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware -- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries -- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor -- Deducing User Presence from Inter-Message Intervals in Home Automation Systems -- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies -- A Trustless Privacy-Preserving Reputation System.
Record Nr. UNINA-9910254994703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 277 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Computers
Law and legislation
Coding theory
Information theory
Computer security
Cryptology
Data Storage Representation
Legal Aspects of Computing
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Darmstadt (2009)
Kongress.
ISBN 3-642-04431-X
Classificazione DAT 450f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice.
Record Nr. UNISA-996465312503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 277 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Computers
Law and legislation
Coding theory
Information theory
Computer security
Cryptology
Data Storage Representation
Legal Aspects of Computing
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Darmstadt (2009)
Kongress.
ISBN 3-642-04431-X
Classificazione DAT 450f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice.
Record Nr. UNINA-9910484694203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui