Amazon cover image
Image from Amazon.com
Image from Google Jackets

Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / edited by Andreas Pfitzmann.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 1768Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000Description: VIII, 492 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540465140
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK5811

Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India