000 | 04288nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-642-36373-3 | ||
003 | DE-He213 | ||
005 | 20240730180727.0 | ||
007 | cr nn 008mamaa | ||
008 | 130220s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642363733 _9978-3-642-36373-3 |
||
024 | 7 |
_a10.1007/978-3-642-36373-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation Hiding _h[electronic resource] : _b14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers / _cedited by Matthias Kirchner, Dipak Ghosal. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aX, 285 p. 100 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7692 |
|
505 | 0 | _aMultimedia Forensics and Counter-Forensics -- Blind Median Filtering Detection Using Statistics in Difference Domain -- Robustness of Color Interpolation Identification against Anti-forensic Operations -- Steganalyis -- Steganalysis of LSB Replacement Using Parity-Aware Features -- Statistical Detection of LSB Matching Using Hypothesis Testing Theory -- Textural Features for Steganalysis -- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts -- Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface -- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data -- Steganography A Game-Theoretic Approach to Content-Adaptive Steganography -- Key-Efficient Steganography -- Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations -- Anonymity and Privacy Lower Bounds for Private Broadcast Encryption -- The Dangers of Composing Anonymous Channels -- Watermarking A New Measure of Watermarking Security Applied on QIM -- Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking -- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking -- Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model -- Bias Equalizer for Binary Probabilistic Fingerprinting Codes. | |
520 | _aThis book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aMultimedia systems. _911575 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9121543 |
|
650 | 0 |
_aComputer vision. _9121544 |
|
650 | 0 |
_aComputer graphics. _94088 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aMultimedia Information Systems. _931575 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputer Vision. _9121545 |
650 | 2 | 4 |
_aComputer Graphics. _94088 |
700 | 1 |
_aKirchner, Matthias. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121546 |
|
700 | 1 |
_aGhosal, Dipak. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121547 |
|
710 | 2 |
_aSpringerLink (Online service) _9121548 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642363726 |
776 | 0 | 8 |
_iPrinted edition: _z9783642363740 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7692 _9121549 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-36373-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90475 _d90475 |