My Account Log in

1 option

Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / edited by Andreas Pfitzmann.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Pfitzmann, Andreas, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 1768.
Lecture Notes in Computer Science, 0302-9743 ; 1768
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Management information systems.
Computer science.
Multimedia systems.
Application software.
Cryptology.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Local Subjects:
Cryptology.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Physical Description:
1 online resource (VIII, 492 pages).
Edition:
First edition 2000.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
System Details:
text file PDF
Contents:
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking
One-Time Hash Steganography
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks
Secure Steganographic Methods for Palette Images
Attacks on Steganographic Systems
Beyond Symmetric Steganography
Developments in Steganography
An Asymmetric Public Detection Watermarking Technique
Zero Knowledge Watermark Detection
Watermarking: Proving Ownership
Proving Ownership of Digital Content
Error- and Collusion-Secure Fingerprinting for Digital Data
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection
Optimum Decoding of Non-additive Full Frame DFT Watermarks
Watermark Detection after Quantization Attacks
Content-Based Watermarking for Image Authentication
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks
A Stochastic Approach to Content Adaptive Digital Image Watermarking
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation
Recovery of Watermarks from Distorted Images
Cocktail Watermarking on Images
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions
Robust Object Watermarking: Application to Code
Software DisEngineering: Program Hiding Architecture and Experiments
The Difficulty of Separating Private and Public Information
Chaffing at the Bit
An Entropy-Based Framework for Database Inference
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System
StegFS: A Steganographic File System for Linux
Nonbinary Audio Cryptography.
Other Format:
Printed edition:
ISBN:
978-3-540-46514-0
9783540465140
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account