Information hiding : 9th international workshop, IH 2007, Saint Malo, France, June 11-13, 2007 : revised selected papers
著者
書誌事項
Information hiding : 9th international workshop, IH 2007, Saint Malo, France, June 11-13, 2007 : revised selected papers
(Lecture notes in computer science, 4567)
Springer, c2007
大学図書館所蔵 件 / 全5件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
"LNCS Sublibrary : SL 4 Security and Cryptology"--T.p. verso
内容説明・目次
内容説明
Researchers and professionals in the field will find the papers in this new volume essential reading. Topically arranged, they cover a multitude of subjects, from new steganographic schemes to computer security and from watermarking to fingerprinting. Complete with online files and updates, this fascinating book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.
目次
New Steganographic Schemes.- MPSteg-color: A New Steganographic Technique for Color Images.- YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.- Steganographic Communication with Quantum Information.- Watermarking Schemess.- Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.- Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.- Computer Security.- A Graph Game Model for Software Tamper Protection.- Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.- Space-Efficient Kleptography Without Random Oracles.- Steganography and Code Theory.- How Can Reed-Solomon Codes Improve Steganographic Schemes?.- Reducing the Complexity of Syndrome Coding for Embedding.- Watermarking Security.- Exploiting Security Holes in Lattice Data Hiding.- Practical Security Analysis of Dirty Paper Trellis Watermarking.- Security of Invertible Media Authentication Schemes Revisited.- Steganalysis.- A Fusion of Maximum Likelihood and Structural Steganalysis.- Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.- Watermarking and Re-synchronization.- Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.- Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.- A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.- Fingerprinting.- Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.- Combining Tardos Fingerprinting Codes and Fingercasting.- Forensics.- Exposing Digital Forgeries Through Specular Highlights on the Eye.- Tamper Hiding: Defeating Image Forensics.- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.- Steganalysis.- Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.- Generalised Category Attack-Improving Histogram-Based Attack on JPEG LSB Embedding.
「Nielsen BookData」 より