Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings: Lecture Notes in Computer Science, cartea 1768
Editat de Andreas Pfitzmannen Limba Engleză Paperback – 23 feb 2000
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 667.38 lei
Preț vechi: 785.16 lei
-15% Nou
Puncte Express: 1001
Preț estimativ în valută:
127.74€ • 132.85$ • 107.04£
127.74€ • 132.85$ • 107.04£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540671824
ISBN-10: 354067182X
Pagini: 508
Ilustrații: VIII, 492 p.
Dimensiuni: 155 x 233 x 27 mm
Greutate: 1.17 kg
Ediția:2000
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354067182X
Pagini: 508
Ilustrații: VIII, 492 p.
Dimensiuni: 155 x 233 x 27 mm
Greutate: 1.17 kg
Ediția:2000
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Stochastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.
Caracteristici
Includes supplementary material: sn.pub/extras