Sold Out
Book Categories |
An implementation of, and attacks on, zero-knowledge watermarking | 1 | |
On the possibility of non-invertible watermarking schemes | 13 | |
Reversing global and local geometrical distortions in image watermarking | 25 | |
On achievable regions of public multiple-access Gaussian watermarking systems | 38 | |
Fixed-distortion orthogonal dirty paper coding for perceptual still image watermarking | 52 | |
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes | 67 | |
Exploiting preserved statistics for steganalysis | 82 | |
Improved detection of LSB steganography in grayscale images | 97 | |
An improved sample pairs method for detection of LSB embedding | 116 | |
Statistical tools for digital forensics | 128 | |
Relative generic computational forensic techniques | 148 | |
Syntax and semantics-preserving application-layer protocol steganography | 164 | |
A method of linguistic steganography based on collocationally-verified synonymy | 180 | |
Graph theoretic software watermarks : implementation, analysis, and attacks | 192 | |
Threading software watermarks | 208 | |
Soft IP protection : watermarking HDL codes | 224 | |
An asymmetric security mechanism for navigation signals | 239 | |
Analysis of COT-based fingerprinting schemes : new approach to design practical and secure fingerprinting scheme | 253 | |
Empirical and theoretical evaluation of active probing attacks and their countermeasures | 266 | |
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring | 282 | |
Statistical disclosure or intersection attacks on anonymity systems | 293 | |
Reasoning about the anonymity provided by pool mixes that generate dummy traffic | 309 | |
The hitting set attack on anonymity protocols | 326 | |
Information hiding in finite state machine | 340 | |
Covert channels for collusion in online computer games | 355 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Hiding
X
This Item is in Your InventoryInformation Hiding
X
You must be logged in to review the productsX
X
X
Add Information Hiding, This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Information Hiding, IH 2004, held in Toronto, Canada in August 2004. The 25 revised full papers presented were carefully selected during two rounds of r, Information Hiding to the inventory that you are selling on WonderClubX
X
Add Information Hiding, This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Information Hiding, IH 2004, held in Toronto, Canada in August 2004. The 25 revised full papers presented were carefully selected during two rounds of r, Information Hiding to your collection on WonderClub |