ISBN-10:
3540242074
ISBN-13:
9783540242079
Pub. Date:
02/14/2005
Publisher:
Springer Berlin Heidelberg
Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers / Edition 1

Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers / Edition 1

by Jessica Fridrich

Paperback

Current price is , Original price is $99.99. You
Select a Purchase Option (2005)
  • purchase options
    $67.40 $99.99 Save 33% Current price is $67.4, Original price is $99.99. You Save 33%.
  • purchase options

Product Details

ISBN-13: 9783540242079
Publisher: Springer Berlin Heidelberg
Publication date: 02/14/2005
Series: Lecture Notes in Computer Science , #3200
Edition description: 2005
Pages: 371
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware).- An Implementation of, and Attacks on, Zero-Knowledge Watermarking.- On the Possibility of Non-invertible Watermarking Schemes.- Reversing Global and Local Geometrical Distortions in Image Watermarking.- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems.- Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.- Session 2 - Steganalysis Session Chair: Mauro Barni (University of Siena).- Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.- Exploiting Preserved Statistics for Steganalysis.- Improved Detection of LSB Steganography in Grayscale Images.- An Improved Sample Pairs Method for Detection of LSB Embedding.- Session 3 - Forensic Applications Session Chair: Scott Craver (Princeton University).- Statistical Tools for Digital Forensics.- Relative Generic Computational Forensic Techniques.- Session 4 - Steganography Session Chair: Andreas Westfeld (Dresden University of Technology).- Syntax and Semantics-Preserving Application-Layer Protocol Steganography.- A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy.- Session 5 - Software Watermarking Session Chair: John McHugh (SEI/CERT).- Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks.- Threading Software Watermarks.- Soft IP Protection: Watermarking HDL Codes.- Session 6 - Security and Privacy Session Chair: Ross Anderson (University of Cambridge).- An Asymmetric Security Mechanism for Navigation Signals.- Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme.- Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.- Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring.- Session 7 - Anonymity Session Chair: Andreas Pfitzmann (Dresden University of Technology).- Statistical Disclosure or Intersection Attacks on Anonymity Systems.- Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.- The Hitting Set Attack on Anonymity Protocols.- Session 8 - Data Hiding in Unusual Content Session Chair: Christian Collberg (University of Arizona).- Information Hiding in Finite State Machine.- Covert Channels for Collusion in Online Computer Games.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews