Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers: Lecture Notes in Computer Science, cartea 2578
Editat de Fabien A. P. Petitcolasen Limba Engleză Paperback – 21 ian 2003
Din seria Lecture Notes in Computer Science
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 554.59 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 969.58 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 782.28 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 550.29 lei
- 20% Preț: 560.32 lei
- 20% Preț: 319.10 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 256.27 lei
- 20% Preț: 172.69 lei
- 20% Preț: 548.35 lei
- 20% Preț: 315.19 lei
- 20% Preț: 611.22 lei
- 20% Preț: 315.78 lei
- 20% Preț: 552.64 lei
- 20% Preț: 722.40 lei
- 20% Preț: 722.90 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 552.25 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 723.99 lei
- 20% Preț: 552.25 lei
- 15% Preț: 549.48 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 375.82 lei
Nou
Puncte Express: 564
Preț estimativ în valută:
71.95€ • 78.13$ • 60.51£
71.95€ • 78.13$ • 60.51£
Carte tipărită la comandă
Livrare economică 14-28 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540004219
ISBN-10: 3540004211
Pagini: 444
Ilustrații: X, 430 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.62 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540004211
Pagini: 444
Ilustrații: X, 430 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.62 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Information Hiding and Networking.- Hiding Intrusions: From the Abnormal to the Normal and Beyond.- Eliminating Steganography in Internet Traffic with Active Wardens.- Anonymity.- From a Trickle to a Flood: Active Attacks on Several Mix Types.- Limits of Anonymity in Open Environments.- Chaffinch: Confidentiality in the Face of Legal Threats.- Watermarking Fundamentals.- Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.- Robustness and Efficiency of Non-linear Side-Informed Watermarking.- Security of Public Watermarking Schemes for Binary Sequences.- Watermarking Algorithms I.- Direct Embedding and Detection of RST Invariant Watermarks.- Robust Image Watermark Using Radon Transform and Bispectrum Invariants.- Audio Watermark Robustness to Desynchronization via Beat Detection.- Watermarking Algorithms II.- Robust Watermarking and Affine Registration of 3D Meshes.- Natural Language Watermarking and Tamperproofing.- Attacks on Watermarking Algorithms.- Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.- Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.- Detectors for Echo Hiding Systems.- Steganography Algorithms.- A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.- Steganography Preserving Statistical Properties.- Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression.- Steganalysis I.- Steganalysis of JPEG Images: Breaking the F5 Algorithm.- Detecting Low Embedding Rates.- Steganalysis II.- Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.- Detection of LSB Steganography via Sample Pair Analysis.- Hiding Information in Unusual Content I.- Hiding Data in DNA.- Tracing the Source of a Shredded Document.- Hiding Information in Unusual Content II.- Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.- Practical Oblivious Transfer Protocols.
Caracteristici
Includes supplementary material: sn.pub/extras