Scott Craver, Bede Liu, Wayne Wolf (auth.), Jessica Fridrich (eds.)3540242074, 9783540242079, 9783540301141
Table of contents :
Front Matter….Pages –
An Implementation of, and Attacks on, Zero-Knowledge Watermarking….Pages 1-12
On the Possibility of Non-invertible Watermarking Schemes….Pages 13-24
Reversing Global and Local Geometrical Distortions in Image Watermarking….Pages 25-37
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems….Pages 38-51
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking….Pages 52-66
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes….Pages 67-81
Exploiting Preserved Statistics for Steganalysis….Pages 82-96
Improved Detection of LSB Steganography in Grayscale Images….Pages 97-115
An Improved Sample Pairs Method for Detection of LSB Embedding….Pages 116-127
Statistical Tools for Digital Forensics….Pages 128-147
Relative Generic Computational Forensic Techniques….Pages 148-163
Syntax and Semantics-Preserving Application-Layer Protocol Steganography….Pages 164-179
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy….Pages 180-191
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks….Pages 192-207
Threading Software Watermarks….Pages 208-223
Soft IP Protection: Watermarking HDL Codes….Pages 224-238
An Asymmetric Security Mechanism for Navigation Signals….Pages 239-252
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme….Pages 253-265
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures….Pages 266-281
Optimization and Evaluation of Randomized c -Secure CRT Code Defined on Polynomial Ring….Pages 282-292
Statistical Disclosure or Intersection Attacks on Anonymity Systems….Pages 293-308
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic….Pages 309-325
The Hitting Set Attack on Anonymity Protocols….Pages 326-339
Information Hiding in Finite State Machine….Pages 340-354
Covert Channels for Collusion in Online Computer Games….Pages 355-369
Back Matter….Pages –
Reviews
There are no reviews yet.