did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540741237

Information Hiding

by ; ; ;
  • ISBN13:

    9783540741237

  • ISBN10:

    3540741232

  • Format: Paperback
  • Copyright: 2007-10-23
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.99 Save up to $71.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006. The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Table of Contents

Hamiltonian Mechanics
Natural Watermarking: A Secure Spread Spectrum Technique for WOAp. 1
An Improved Asymmetric Watermarking System Using Matrix Embeddingp. 15
A Cryptographic Method for Secure Watermark Detectionp. 26
Steganographic Communication in Ordered Channelsp. 42
Analyzing Network-Aware Active Wardens in IPv6p. 58
Video Watermarking by Using Geometic Warping Without Visible Artifacts
Video Watermarking by Using Geometric Warping Without Visible Artifactsp. 78
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domainp. 93
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardensp. 109
Noisy Timing Channels with Binary Inputs and Outputsp. 124
A Computational Model for Watermark Robustnessp. 145
Hiding Information Hidingp. 161
Reversible Watermarking of NURBS-Based CAD Modelsp. 172
A High-Capacity Data Hiding Method for Polygonal Meshesp. 188
Steganography for Radio Amateurs-A DSSS Based Approach for Slow Scan Televisionp. 201
Delayed and Controlled Failures in Tamper-Resistant Softwarep. 216
A Model for Self-Modifying Codep. 232
A Markov Process Based Approach to Effective Attacking JPEG Steganographyp. 249
Batch Steganography and Pooled Steganalysisp. 265
On Steganographic Embedding Efficiencyp. 282
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacksp. 297
Modified Matrix Encoding Technique for Minimal Distortion Steganographyp. 314
Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprintingp. 328
A Collusion-Resistant Video Watermarking Schemep. 343
An Elliptic Curve Backdoor Algorithm for RSASSAp. 355
A Subliminal-Free Variant of ECDSAp. 375
Author Indexp. 389
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program