000 06353cam a2201165 a 4500
001 ocn669052779
003 OCoLC
005 20250703160127.0
006 m o d
007 cr |||||||||||
008 101007s2010 gw a ob 101 0 eng d
040 _aCUS
_beng
_epn
_cCUS
_dGW5XE
_dE7B
_dOUN
_dCEF
_dOCLCQ
_dWAU
_dIAD
_dOCLCQ
_dOCLCA
_dOCLCF
_dBEDGE
_dDKDLA
_dOHS
_dOCLCQ
_dOCLCO
_dYDXCP
_dNUI
_dOCL
_dOCLCO
_dEBLCP
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dMYUTM
_dDGU
_dUAB
_dESU
_dOCLCQ
_dIOG
_dNJR
_dOCLCA
_dBUF
_dOCLCO
_dMERER
_dOCLCO
_dCRU
_dOCLCQ
_dTFW
_dOCLCO
_dU3W
_dOCLCO
_dWYU
_dOCLCO
_dOCLCQ
_dWURST
_dOCLCQ
_dOCLCA
_dOCLCO
_dDCT
_dLUN
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCL
_dOCLCA
019 _a681891905
_a769768859
_a1204032502
020 _a9783642164354
020 _a3642164358
020 _z9783642164347
029 1 _aAU@
_b000048774557
029 1 _aAU@
_b000058161033
029 1 _aAU@
_b000060389278
029 1 _aNZ1
_b13647381
035 _a(OCoLC)669052779
_z(OCoLC)681891905
_z(OCoLC)769768859
_z(OCoLC)1204032502
037 _a978-3-642-16434-7
_bSpringer
_nhttp://www.springerlink.com
050 4 _aQA76.9.A25
060 4 _aQA 76.9.A25
072 7 _aQA
_2lcco
082 0 4 _a005.8/2
_222
049 _aMAIN
111 2 _aIH (Conference)
_n(12th :
_d2010 :
_cCalgary, Alta.)
_940117
245 1 0 _aInformation hiding :
_b12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
_cRainer Böhme, Philip W.L. Fong, Reihaneh Safavi-Naini (eds.).
246 3 0 _aIH 2010
260 _aBerlin :
_bSpringer,
_c2010.
300 _a1 online resource (x, 277 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v6387
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
504 _aIncludes bibliographical references and index.
520 _aThis book constitutes the refereed proceedings of the 12th International Conference on Information Hiding, IH 2010, held in Calgary, AB, Canada, in June 2010. The 18 revised full papers presented were carefully reviewed and selected from 39 submissions.
505 0 _aFPGA Time-Bounded Unclonable Authentication -- A Unified Submodular Framework for Multimodal IC Trojan Detection -- A Secure and Robust Approach to Software Tamper Resistance -- Security with Noisy Data -- Detection of Copy-Rotate-Move Forgery Using Zernike Moments -- Scene Illumination as an Indicator of Image Manipulation -- Capacity of Collusion Secure Fingerprinting -- A Tradeoff between Rate and Efficiency -- Short Collusion-Secure Fingerprint Codes against Three Pirates -- Tardos's Fingerprinting Code over AWGN Channel -- Steganalysis Using Partially Ordered Markov Models -- The Influence of the Image Basis on Modeling and Steganalysis Performance -- The Square Root Law in Stegosystems with Imperfect Information -- Using High-Dimensional Image Models to Perform Highly Undetectable Steganography -- Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability -- Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic -- STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography -- The Reverse Statistical Disclosure Attack -- Security Analysis of ISS Watermarking Using Natural Scene Statistics -- Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework -- A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
650 0 _aComputer security
_vCongresses.
_914968
650 0 _aData protection
_vCongresses.
_915989
650 0 _aComputer security.
_92191
650 2 _aComputer Security
_92191
650 2 _aSoftware
_916724
650 6 _aSécurité informatique
_vCongrès.
_917411
650 6 _aProtection de l'information (Informatique)
_vCongrès.
_917410
650 6 _aSécurité informatique.
_918600
650 6 _aLogiciels.
_926065
650 7 _asoftware.
_2aat
_916724
650 7 _aInformatique.
_2eclas
_914930
650 7 _aComputer security
_2fast
_92191
650 7 _aData protection
_2fast
_915990
650 7 _aGeheimnisprinzip
_2gnd
_928124
650 7 _aSteganographie
_2gnd
_928095
650 7 _aKryptoanalyse
_2gnd
_924022
650 7 _aComputerforensik
_2gnd
_935718
650 7 _aElektronisches Wasserzeichen
_2gnd
_919156
651 7 _aCalgary <2010>
_2swd
_940118
653 0 0 _aalgoritmen
653 0 0 _aalgorithms
653 0 0 _acomputeranalyse
653 0 0 _acomputer analysis
653 0 0 _ainformatiesystemen
653 0 0 _ainformation systems
653 0 0 _amassamedia
653 0 0 _amass media
653 0 0 _awiskunde
653 0 0 _amathematics
653 0 0 _abeeldverwerking
653 0 0 _aimage processing
653 0 0 _amachine vision
653 0 0 _acomputergrafie
653 0 0 _acomputer graphics
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aBöhme, Rainer,
_d1954-
_940119
700 1 _aFong, Philip W. L.
_940120
700 1 _aSafavi-Naini, Reihanah.
_921614
758 _ihas work:
_aInformation hiding (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFKyhP3X4XdXjHhPw7BRqP
_4https://id.oclc.org/worldcat/ontology/hasWork
773 0 _tSpringer eBooks
776 0 8 _iPrint version:
_aIH 2010 (2010 : Calgary, Alta.).
_tInformation hiding.
_dBerlin : Springer, 2010
_z9783642164347
_w(DLC) 2010936196
830 0 _aLecture notes in computer science ;
_v6387.
_x0302-9743
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-642-16435-4
938 _aProQuest Ebook Central
_bEBLB
_nEBL3065913
938 _aebrary
_bEBRY
_nebr10421197
938 _aYBP Library Services
_bYANK
_n3523298
994 _a92
_bATIST
999 _c640409
_d640409