did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642164347

Information Hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers

by ; ;
  • ISBN13:

    9783642164347

  • ISBN10:

    364216434X

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-11-10
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $89.99
We're Sorry.
No Options Available at This Time.

Summary

This book constitutes the refereed proceedings of the 12th International Conference on Information Hiding, IH 2010, held in Calgary, AB, Canada, in June 2010.The 18 revised full papers presented were carefully reviewed and selected from 39 submissions.

Table of Contents

FPGA Time-Bounded Unclonable Authenticationp. 1
A Unified Submodular Framework for Multimodal IC Trojan Detectionp. 17
A Secure and Robust Approach to Software Tamper Resistancep. 33
Security with Noisy Data (Extended Abstract of Invited Talk)p. 48
Detection of Copy-Rotate-Move Forgery Using Zernike Momentsp. 51
Scene Illumination as an Indicator of Image Manipulationp. 66
Capacity of Collusion Secure Fingerprinting - A Tradeoff Between Rate and Efficiency (Extended Abstract of Invited Talk)p. 81
Short Collusion-Secure Fingerprint Codes Against Three Piratesp. 86
Tardos's Fingerprinting Code over AWGN Channelp. 103
Steganalysis Using Partially Ordered Markov Modelsp. 118
The Influence of the Image Basis on Modeling and Steganalysis Performancep. 133
The Square Root Law in Stegosystems with Imperfect Informationp. 145
Using High-Dimensional Image Models to Perform Highly Undetectable Steganographyp. 161
Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectabilityp. 178
Robust and Undetectable Steganographic Timing Channels for i.i.d. Trafficp. 193
STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganographyp. 208
The Reverse Statistical Disclosure Attackp. 221
Security Analysis of ISS Watermarking Using Natural Scene Statisticsp. 235
Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Frameworkp. 249
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustnessp. 262
Author Indexp. 277
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program