Data Hiding and Its Applications : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi |
Autore | Megías David |
Pubbl/distr/stampa | Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022 |
Descrizione fisica | 1 online resource (234 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer security - Management |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Data Hiding and Its Applications |
Record Nr. | UNINA-9910674393303321 |
Megías David | ||
Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
MazurczykWojciech
WendzelSteffen ZanderSebastian HoumansadrAmir SzczypiorskiKrzysztof |
Collana | IEEE Press Series on Information and Communication Networks Security |
Soggetto topico | Computer networks - Security measures |
ISBN |
1-119-08171-8
1-119-08183-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement |
Record Nr. | UNINA-9910136810303321 |
Hoboken, New Jersey : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
MazurczykWojciech
WendzelSteffen ZanderSebastian HoumansadrAmir SzczypiorskiKrzysztof |
Collana | IEEE Press Series on Information and Communication Networks Security |
Soggetto topico | Computer networks - Security measures |
ISBN |
1-119-08171-8
1-119-08183-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement |
Record Nr. | UNINA-9910819813003321 |
Hoboken, New Jersey : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 762 p. 214 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Management information systems Computer science Software engineering Application software Systems and Data Security Computer Communication Networks Cryptology Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-319-64701-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . |
Record Nr. | UNISA-996466456903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network and System Security : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 762 p. 214 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer networks Cryptography Data encryption (Computer science) Electronic data processing - Management Software engineering Application software Data and Information Security Computer Communication Networks Cryptology IT Operations Software Engineering Computer and Information Systems Applications |
ISBN | 3-319-64701-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . |
Record Nr. | UNINA-9910484446003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions |
Autore | Abd El-Latif Ahmed A |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2021 |
Descrizione fisica | 1 online resource (283 pages) |
Altri autori (Persone) |
Abd-El-AttyBassem
Venegas-AndracaSalvador E MazurczykWojciech GuptaBrij B |
Collana | Studies in Big Data Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 3-030-85428-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910502978403321 |
Abd El-Latif Ahmed A | ||
Cham : , : Springer International Publishing AG, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|