Verkauf durch Sack Fachmedien

Pfitzmann

Information Hiding

Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

Medium: Buch
ISBN: 978-3-540-67182-4
Verlag: Springer Berlin Heidelberg
Erscheinungstermin: 23.02.2000
Lieferfrist: bis zu 10 Tage

This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999.
The 33 revised full papers presented were carefully reviewed and selected from a total of 68 submissions. The dominating topic, dealt with in various contexts, is watermarking. The papers are organized in sections on fundamentals of steganography, paradigms and examples, beyond symmetric steganography; watermarking: proving ownership, detection and decoding, embedding techniques, new designs and applications, improving robustness, software protection; separating private and public information; and stego-engineering.


Produkteigenschaften


  • Artikelnummer: 9783540671824
  • Medium: Buch
  • ISBN: 978-3-540-67182-4
  • Verlag: Springer Berlin Heidelberg
  • Erscheinungstermin: 23.02.2000
  • Sprache(n): Englisch
  • Auflage: 2000
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 1560 g
  • Seiten: 492
  • Format (B x H x T): 155 x 235 x 28 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Stochastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.