1 option
Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / edited by Andreas Pfitzmann.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 1768.
- Lecture Notes in Computer Science, 0302-9743 ; 1768
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer networks.
- Management information systems.
- Computer science.
- Multimedia systems.
- Application software.
- Cryptology.
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Multimedia Information Systems.
- Information Systems Applications (incl. Internet).
- Local Subjects:
- Cryptology.
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Multimedia Information Systems.
- Information Systems Applications (incl. Internet).
- Physical Description:
- 1 online resource (VIII, 492 pages).
- Edition:
- First edition 2000.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
- System Details:
- text file PDF
- Contents:
- Fundamentals of Steganography
- An Information-Theoretic Approach to Steganography and Watermarking
- One-Time Hash Steganography
- Steganography: Paradigms and Examples
- Steganography Secure against Cover-Stego-Attacks
- Secure Steganographic Methods for Palette Images
- Attacks on Steganographic Systems
- Beyond Symmetric Steganography
- Developments in Steganography
- An Asymmetric Public Detection Watermarking Technique
- Zero Knowledge Watermark Detection
- Watermarking: Proving Ownership
- Proving Ownership of Digital Content
- Error- and Collusion-Secure Fingerprinting for Digital Data
- Watermarking: Detection and Decoding
- Computing the Probability of False Watermark Detection
- Optimum Decoding of Non-additive Full Frame DFT Watermarks
- Watermark Detection after Quantization Attacks
- Content-Based Watermarking for Image Authentication
- Watermarking: Embedding Techniques
- Fast Robust Template Matching for Affine Resistant Image Watermarks
- A Stochastic Approach to Content Adaptive Digital Image Watermarking
- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
- Watermarking: New Designs and Applications
- On the Design of a Watermarking System: Considerations and Rationales
- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware
- Watermarking: Improving Robustness
- Robust Watermarking for Images Based on Color Manipulation
- Recovery of Watermarks from Distorted Images
- Cocktail Watermarking on Images
- Watermarking and Software Protection
- Hiding Signatures in Graph Coloring Solutions
- Robust Object Watermarking: Application to Code
- Software DisEngineering: Program Hiding Architecture and Experiments
- The Difficulty of Separating Private and Public Information
- Chaffing at the Bit
- An Entropy-Based Framework for Database Inference
- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
- Stego-Engineering
- Protecting Secret Keys in a Compromised Computational System
- StegFS: A Steganographic File System for Linux
- Nonbinary Audio Cryptography.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-46514-0
- 9783540465140
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.