Buch, Englisch, 277 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 441 g
Reihe: Security and Cryptology
11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Buch, Englisch, 277 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 441 g
Reihe: Security and Cryptology
ISBN: 978-3-642-04430-4
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Steganography.- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.- An Epistemological Approach to Steganography.- Fisher Information Determines Capacity of ?-Secure Steganography.- Fast BCH Syndrome Coding for Steganography.- Steganalysis.- Embedding Ratio Estimating for Each Bit Plane of Image.- Estimating Steganographic Fisher Information in Real Images.- Watermarking.- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2.- A Phase Modulation Audio Watermarking Technique.- Forensic Tracking Watermarking against In-theater Piracy.- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization.- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain.- Fingerprinting.- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive.- Estimating the Minimal Length of Tardos Code.- Hiding in Unusual Content, Novel Applications.- Roughness-Adaptive 3D Watermarking of Polygonal Meshes.- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions.- SVD-Based Ghost Circuitry Detection.- Forensics.- Microphone Classification Using Fourier Coefficients.- Detect Digital Image Splicing with Visual Cues.- Feature-Based Camera Model Identification Works in Practice.