Fr. 69.00

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

List of contents

Hamiltonian Mechanics.- Natural Watermarking: A Secure Spread Spectrum Technique for WOA.- An Improved Asymmetric Watermarking System Using Matrix Embedding.- A Cryptographic Method for Secure Watermark Detection.- Steganographic Communication in Ordered Channels.- Analyzing Network-Aware Active Wardens in IPv6.- Video Watermarking by Using Geometic Warping Without Visible Artifacts.- Video Watermarking by Using Geometric Warping Without Visible Artifacts.- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens.- Noisy Timing Channels with Binary Inputs and Outputs.- A Computational Model for Watermark Robustness.- Hiding Information Hiding.- Reversible Watermarking of NURBS-Based CAD Models.- A High-Capacity Data Hiding Method for Polygonal Meshes.- Steganography for Radio Amateurs- A DSSS Based Approach for Slow Scan Television.- Delayed and Controlled Failures in Tamper-Resistant Software.- A Model for Self-Modifying Code.- A Markov Process Based Approach to Effective Attacking JPEG Steganography.- Batch Steganography and Pooled Steganalysis.- On Steganographic Embedding Efficiency.- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.- Modified Matrix Encoding Technique for Minimal Distortion Steganography.- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting.- A Collusion-Resistant Video Watermarking Scheme.- An Elliptic Curve Backdoor Algorithm for RSASSA.- A Subliminal-Free Variant of ECDSA.

Summary

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Additional text

Aus den Rezensionen:

"… Der … vorliegende Sammelband enthält 25 ausgewählte wissenschaftliche Arbeiten … Young und Yung präsentieren … ein Anwendungskonzept, das eine asymmetrische Verschlüsselung aufgrund eines möglicherweise absichtlich falschen öffentlichen Schlüssels unbeweisbar machen soll. Bodenständiger geht es da schon zu, wenn Chakinala und seine Kollegen sich der steganografischen Kommunikation über einen geordneten Kanal widmen - das TCP-Protokoll als Medium für den geheimen Informationskanal gibt ein einleuchtendes Beispiel. Wegweisend ist der Beitrag von Bergmair und Katzenbeisser zu inhaltssensitiver Steganografie …" (Tobias Engler/fm, in: c't - Magazin für Computer-Technik, 2007, Issue 26, S. 218)

Report

Aus den Rezensionen:

"... Der ... vorliegende Sammelband enthält 25 ausgewählte wissenschaftliche Arbeiten ... Young und Yung präsentieren ... ein Anwendungskonzept, das eine asymmetrische Verschlüsselung aufgrund eines möglicherweise absichtlich falschen öffentlichen Schlüssels unbeweisbar machen soll. Bodenständiger geht es da schon zu, wenn Chakinala und seine Kollegen sich der steganografischen Kommunikation über einen geordneten Kanal widmen - das TCP-Protokoll als Medium für den geheimen Informationskanal gibt ein einleuchtendes Beispiel. Wegweisend ist der Beitrag von Bergmair und Katzenbeisser zu inhaltssensitiver Steganografie ..." (Tobias Engler/fm, in: c't - Magazin für Computer-Technik, 2007, Issue 26, S. 218)

Product details

Assisted by Jan Camenisch (Editor), Christia Collberg (Editor), Christian Collberg (Editor), Christian S. Collberg (Editor), Neil F Johnson et al (Editor), Neil F. Johnson (Editor), Phil Sallee (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 14.04.2009
 
EAN 9783540741237
ISBN 978-3-540-74123-7
No. of pages 392
Dimensions 155 mm x 21 mm x 235 mm
Weight 610 g
Illustrations VIII, 392 p.
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.