000 04541nam a22006255i 4500
001 978-3-540-46514-0
003 DE-He213
005 20240423132458.0
007 cr nn 008mamaa
008 121227s2000 gw | s |||| 0|eng d
020 _a9783540465140
_9978-3-540-46514-0
024 7 _a10.1007/10719724
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation Hiding
_h[electronic resource] :
_bThird International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings /
_cedited by Andreas Pfitzmann.
250 _a1st ed. 2000.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2000.
300 _aVIII, 492 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1768
505 0 _aFundamentals of Steganography -- An Information-Theoretic Approach to Steganography and Watermarking -- One-Time Hash Steganography -- Steganography: Paradigms and Examples -- Steganography Secure against Cover-Stego-Attacks -- Secure Steganographic Methods for Palette Images -- Attacks on Steganographic Systems -- Beyond Symmetric Steganography -- Developments in Steganography -- An Asymmetric Public Detection Watermarking Technique -- Zero Knowledge Watermark Detection -- Watermarking: Proving Ownership -- Proving Ownership of Digital Content -- Error- and Collusion-Secure Fingerprinting for Digital Data -- Watermarking: Detection and Decoding -- Computing the Probability of False Watermark Detection -- Optimum Decoding of Non-additive Full Frame DFT Watermarks -- Watermark Detection after Quantization Attacks -- Content-Based Watermarking for Image Authentication -- Watermarking: Embedding Techniques -- Fast Robust Template Matching for Affine Resistant Image Watermarks -- A Stochastic Approach to Content Adaptive Digital Image Watermarking -- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation -- Watermarking: New Designs and Applications -- On the Design of a Watermarking System: Considerations and Rationales -- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking -- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware -- Watermarking: Improving Robustness -- Robust Watermarking for Images Based on Color Manipulation -- Recovery of Watermarks from Distorted Images -- Cocktail Watermarking on Images -- Watermarking and Software Protection -- Hiding Signatures in Graph Coloring Solutions -- Robust Object Watermarking: Application to Code -- Software DisEngineering: Program Hiding Architecture and Experiments -- The Difficulty of Separating Private and Public Information -- Chaffing at the Bit -- An Entropy-Based Framework for Database Inference -- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms -- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast -- Stego-Engineering -- Protecting Secret Keys in a Compromised Computational System -- StegFS: A Steganographic File System for Linux -- Nonbinary Audio Cryptography.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aElectronic data processing
_xManagement.
650 0 _aMultimedia systems.
650 0 _aApplication software.
650 1 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aIT Operations.
650 2 4 _aMultimedia Information Systems.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aPfitzmann, Andreas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540671824
776 0 8 _iPrinted edition:
_z9783662173114
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1768
856 4 0 _uhttps://doi.org/10.1007/10719724
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188196
_d188196