Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /

Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.

Saved in:
Bibliographic Details
Main Authors: Pfitzmann, Andreas. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Multimedia information systems., Management information systems., Computer Science., Data Encryption., Computer Communication Networks., Management of Computing and Information Systems., Multimedia Information Systems., Information Systems Applications (incl. Internet).,
Online Access:http://dx.doi.org/10.1007/10719724
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:183837
record_format koha
spelling KOHA-OAI-TEST:1838372018-07-30T23:05:15ZInformation Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings / Pfitzmann, Andreas. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2000.engFundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.Computer science.Computer communication systems.Data encryption (Computer science).Multimedia information systems.Management information systems.Computer Science.Data Encryption.Computer Communication Networks.Management of Computing and Information Systems.Multimedia Information Systems.Information Systems Applications (incl. Internet).Springer eBookshttp://dx.doi.org/10.1007/10719724URN:ISBN:9783540465140
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data encryption (Computer science).
Multimedia information systems.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Computer science.
Computer communication systems.
Data encryption (Computer science).
Multimedia information systems.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
spellingShingle Computer science.
Computer communication systems.
Data encryption (Computer science).
Multimedia information systems.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Computer science.
Computer communication systems.
Data encryption (Computer science).
Multimedia information systems.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Pfitzmann, Andreas. editor.
SpringerLink (Online service)
Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
description Fundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.
format Texto
topic_facet Computer science.
Computer communication systems.
Data encryption (Computer science).
Multimedia information systems.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Management of Computing and Information Systems.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
author Pfitzmann, Andreas. editor.
SpringerLink (Online service)
author_facet Pfitzmann, Andreas. editor.
SpringerLink (Online service)
author_sort Pfitzmann, Andreas. editor.
title Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
title_short Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
title_full Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
title_fullStr Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
title_full_unstemmed Information Hiding [electronic resource] : Third International Workshop, IH’99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
title_sort information hiding [electronic resource] : third international workshop, ih’99, dresden, germany, september 29 - october 1, 1999 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2000
url http://dx.doi.org/10.1007/10719724
work_keys_str_mv AT pfitzmannandreaseditor informationhidingelectronicresourcethirdinternationalworkshopih99dresdengermanyseptember29october11999proceedings
AT springerlinkonlineservice informationhidingelectronicresourcethirdinternationalworkshopih99dresdengermanyseptember29october11999proceedings
_version_ 1756265152373587968