|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Teddy Furon , François Cayre , Gwenaël DoërrG , Patrick BasPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 4567 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 0.623kg ISBN: 9783540773696ISBN 10: 354077369 Pages: 396 Publication Date: 14 January 2008 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsNew Steganographic Schemes.- MPSteg-color: A New Steganographic Technique for Color Images.- YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.- Steganographic Communication with Quantum Information.- Watermarking Schemess.- Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.- Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.- Computer Security.- A Graph Game Model for Software Tamper Protection.- Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.- Space-Efficient Kleptography Without Random Oracles.- Steganography and Code Theory.- How Can Reed-Solomon Codes Improve Steganographic Schemes?.- Reducing the Complexity of Syndrome Coding for Embedding.- Watermarking Security.- Exploiting Security Holes in Lattice Data Hiding.- Practical Security Analysis of Dirty Paper Trellis Watermarking.- Security of Invertible Media Authentication Schemes Revisited.- Steganalysis.- A Fusion of Maximum Likelihood and Structural Steganalysis.- Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.- Watermarking and Re-synchronization.- Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.- Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.- A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.- Fingerprinting.- Optimization of Tardos’s Fingerprinting Codes in a Viewpoint of Memory Amount.- Combining Tardos Fingerprinting Codes and Fingercasting.- Forensics.- Exposing Digital Forgeries Through Specular Highlights on the Eye.- Tamper Hiding: Defeating Image Forensics.- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.- Steganalysis.- Pros and Consof Mel-cepstrum Based Audio Steganalysis Using SVM Classification.- Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |