Patrick Bas, François Cayre (auth.), Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, Phil Sallee (eds.)3540741232, 9783540741237
Twenty-five full papers are presented. Each one was carefully reviewed by the editors to ensure accuracy, thoroughness, and readability.
The papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.
Table of contents :
Front Matter….Pages –
Natural Watermarking: A Secure Spread Spectrum Technique for WOA….Pages 1-14
An Improved Asymmetric Watermarking System Using Matrix Embedding….Pages 15-25
A Cryptographic Method for Secure Watermark Detection….Pages 26-41
Steganographic Communication in Ordered Channels….Pages 42-57
Analyzing Network-Aware Active Wardens in IPv6….Pages 58-77
Video Watermarking by Using Geometric Warping Without Visible Artifacts….Pages 78-92
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain….Pages 93-108
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens….Pages 109-123
Noisy Timing Channels with Binary Inputs and Outputs….Pages 124-144
A Computational Model for Watermark Robustness….Pages 145-160
Hiding Information Hiding….Pages 161-171
Reversible Watermarking of NURBS-Based CAD Models….Pages 172-187
A High-Capacity Data Hiding Method for Polygonal Meshes….Pages 188-200
Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television….Pages 201-215
Delayed and Controlled Failures in Tamper-Resistant Software….Pages 216-231
A Model for Self-Modifying Code….Pages 232-248
A Markov Process Based Approach to Effective Attacking JPEG Steganography….Pages 249-264
Batch Steganography and Pooled Steganalysis….Pages 265-281
On Steganographic Embedding Efficiency….Pages 282-296
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks….Pages 297-313
Modified Matrix Encoding Technique for Minimal Distortion Steganography….Pages 314-327
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting….Pages 328-342
A Collusion-Resistant Video Watermarking Scheme….Pages 343-354
An Elliptic Curve Backdoor Algorithm for RSASSA….Pages 355-374
A Subliminal-Free Variant of ECDSA….Pages 375-387
Back Matter….Pages –
Reviews
There are no reviews yet.