This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
Artikelnr. des Verlages: 12760275, 978-3-642-04430-4
2009
Seitenzahl: 288
Erscheinungstermin: 23. September 2009
Englisch
Abmessung: 235mm x 155mm x 16mm
Gewicht: 441g
ISBN-13: 9783642044304
ISBN-10: 3642044301
Artikelnr.: 26986735
Herstellerkennzeichnung
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Prof. Dr. techn. Stefan Katzenbeisser, Dipl. Informatiker, Diplom an der TU Wien (2001), Promotion an der TU München (2005), Senior Scientist, Philips Research Europe, Information and System Security Group (2005-2007), Juniorprofessor für Security Engineering (2007 - 2011), seit 2011 Universitätsprofessor für Security Engineering der TU Darmstadt, Forschungsschwerpunkte in Cryptographic protocols (design, analysis), Cryptographic techniques for noisy and fuzzy data, Privacy Enhancing, Technologies, Software Security, Watermarking, Digital Rights Management, Copyright Protection, Malicious Code Detection.
Inhaltsangabe
Steganography. Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. An Epistemological Approach to Steganography. Fisher Information Determines Capacity of ? Secure Steganography. Fast BCH Syndrome Coding for Steganography. Steganalysis. Embedding Ratio Estimating for Each Bit Plane of Image. Estimating Steganographic Fisher Information in Real Images. Watermarking. Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS 2. A Phase Modulation Audio Watermarking Technique. Forensic Tracking Watermarking against In theater Piracy. Self recovery Fragile Watermarking Using Block Neighborhood Tampering Characterization. Perception Based Audio Authentication Watermarking in the Time Frequency Domain. Fingerprinting. An Improvement of Short 2 Secure Fingerprint Codes Strongly Avoiding False Positive. Estimating the Minimal Length of Tardos Code. Hiding in Unusual Content, Novel Applications. Roughness Adaptive 3D Watermarking of Polygonal Meshes. Hardware Based Public Key Cryptography with Public Physically Unclonable Functions. SVD Based Ghost Circuitry Detection. Forensics. Microphone Classification Using Fourier Coefficients. Detect Digital Image Splicing with Visual Cues. Feature Based Camera Model Identification Works in Practice.
Steganography. Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. An Epistemological Approach to Steganography. Fisher Information Determines Capacity of ? Secure Steganography. Fast BCH Syndrome Coding for Steganography. Steganalysis. Embedding Ratio Estimating for Each Bit Plane of Image. Estimating Steganographic Fisher Information in Real Images. Watermarking. Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS 2. A Phase Modulation Audio Watermarking Technique. Forensic Tracking Watermarking against In theater Piracy. Self recovery Fragile Watermarking Using Block Neighborhood Tampering Characterization. Perception Based Audio Authentication Watermarking in the Time Frequency Domain. Fingerprinting. An Improvement of Short 2 Secure Fingerprint Codes Strongly Avoiding False Positive. Estimating the Minimal Length of Tardos Code. Hiding in Unusual Content, Novel Applications. Roughness Adaptive 3D Watermarking of Polygonal Meshes. Hardware Based Public Key Cryptography with Public Physically Unclonable Functions. SVD Based Ghost Circuitry Detection. Forensics. Microphone Classification Using Fourier Coefficients. Detect Digital Image Splicing with Visual Cues. Feature Based Camera Model Identification Works in Practice.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826