Daniel Gruhl, Walter Bender (auth.)9783540653868, 3-540-65386-4
Table of contents :
Information Hiding to Foil the Casual Counterfeiter….Pages 1-15
Fingerprinting Digital Circuits on Programmable Hardware….Pages 16-31
Steganography in a Video Conferencing System….Pages 32-47
Reliable Blind Information Hiding for Images….Pages 48-61
Cerebral Cryptography….Pages 62-72
The Steganographic File System….Pages 73-82
Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System….Pages 83-98
Biometric yet Privacy Protecting Person Authentication….Pages 99-110
On Software Protection via Function Hiding….Pages 111-123
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations….Pages 124-142
Robust Digital Watermarking Based on Key-Dependent Basis Functions….Pages 143-157
Intellectual Property Protection Systems and Digital Watermarking….Pages 158-168
Secure Copyright Protection Techniques for Digital Images….Pages 169-190
Shedding More Light on Image Watermarks….Pages 191-207
Continuous Steganographic Data Transmission Using Uncompressed Audio….Pages 208-217
Attacks on Copyright Marking Systems….Pages 218-238
Testing Digital Watermark Resistance to Destruction….Pages 239-257
Analysis of the Sensitivity Attack against Electronic Watermarks in Images….Pages 258-272
Steganalysis of Images Created Using Current Steganography Software….Pages 273-289
Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks….Pages 290-305
An Information-Theoretic Model for Steganography….Pages 306-318
Steganalysis and Game Equilibria….Pages 319-328
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks….Pages 329-343
Modeling the Security of Steganographic Systems….Pages 344-354
On Public-Key Steganography in the Presence of an Active Warden….Pages 355-368
Reviews
There are no reviews yet.