Willkommen, schön sind Sie da!
Logo Ex Libris

Information Hiding

  • Kartonierter Einband
  • 420 Seiten
(0) Erste Bewertung abgeben
Bewertungen & Rezensionen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
It is our pleasure to present in this volume the proceedings of the 7th Inter- tional Workshopon InformationHiding (IH 2005),held ... Weiterlesen
20%
135.00 CHF 108.00
Sie sparen CHF 27.00
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

It is our pleasure to present in this volume the proceedings of the 7th Inter- tional Workshopon InformationHiding (IH 2005),held in Barcelona,Catalonia, Spain, during June 6 8, 2005. The workshop was organized by the Department of Computer Science and Multimedia, Universitat Oberta de Catalunya (UOC). Continuing the tradition of previous workshops, we sought a balanced p- gram, containing talks on various aspects of data hiding, anonymous commu- cation, steganalysis, and watermarking.Although the protection of digital int- lectual property has up to now motivated most of our research, there are many other upcoming ?elds of application. We were delighted to see that this year s workshop presented numerous new and unconventional approaches to infor- tion hiding. The selection of the program was a very challenging task. In total, we - ceived 90 submissions from 21 countries. At this point we want to thank all authors who submitted their latest work to IH 2005 and thus assured that the Information Hiding Workshop continues to be the top forum of our community.

Autorentext
Prof. Dr. techn. Stefan Katzenbeisser, Dipl. Informatiker, Diplom an der TU Wien (2001), Promotion an der TU München (2005), Senior Scientist, Philips Research Europe, Information and System Security Group (2005-2007), Juniorprofessor für Security Engineering (2007 - 2011), seit 2011 Universitätsprofessor für Security Engineering der TU Darmstadt, Forschungsschwerpunkte in Cryptographic protocols (design, analysis), Cryptographic techniques for noisy and fuzzy data, Privacy Enhancing, Technologies, Software Security, Watermarking, Digital Rights Management, Copyright Protection, Malicious Code Detection.

Inhalt
Invited Talk.- On Joint Coding for Watermarking and Encryption.- Anonymity.- Compulsion Resistant Anonymous Communications.- Provable Anonymity for Networks of Mixes.- On Blending Attacks for Mixes with Memory.- Pervasive Random Beacon in the Internet for Covert Coordination.- Censorship Resistance Revisited.- Watermarking.- Optimal Embedding for Watermarking in Discrete Data Spaces.- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images.- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.- Theory.- Efficient Steganography with Provable Security Guarantees.- Information-Theoretic Analysis of Security in Side-Informed Data Hiding.- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.- Watermark Attacks.- How to Combat Block Replacement Attacks?.- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes.- Steganography.- Pre-processing for Adding Noise Steganography.- Efficient Wet Paper Codes.- Hiding in Unusual Content.- Translation-Based Steganography.- ID Modulation: Embedding Sensor Data in an RFID Timeseries.- Embedding Covert Channels into TCP/IP.- Steganalysis.- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.- Assessment of Steganalytic Methods Using Multiple Regression Models.- A General Framework for Structural Steganalysis of LSB Replacement.- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.- Software Watermarking.- Self-validating Branch-Based Software Watermarking.- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.- Dither Modulation Watermarking of Dynamic Memory Traces.- Fingerprinting.- A Family of Collusion 2-Secure Codes.- Best Security Index for Digital Fingerprinting.

Produktinformationen

Titel: Information Hiding
Untertitel: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
Editor:
EAN: 9783540290391
ISBN: 978-3-540-29039-1
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 420
Gewicht: 664g
Größe: H232mm x B232mm x T155mm
Jahr: 2005
Untertitel: Englisch
Auflage: 2005. 2005

Weitere Produkte aus der Reihe "Security and Cryptology"