Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : IH'98 (1998 ; Portland, Or.)
Goos, Gerhard
Titre(s) : Information hiding [Texte électronique] : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings / David Aucsmith (ed.)
Publication : Berlin ; New York : Springer, cop. 1998
Description matérielle : 1 online resource (ix, 368 pages)
Collection : Lecture notes in computer science ; 1525
Note(s) : Includes bibliographical references and index
English.
This book constitutes the thoroughly refereed post-workshop proceedings of the Second
International Workshop on Information Hiding, IH'98, held in Portland, Oregon, USA
in April 1998. The 25 revised full papers presented have gone through two rounds of
reviewing and revision and were selected from initially 41 submissions. The book documents
the state of the art in the area of information hiding research and development. The
papers are organized in sections on steganography, other applications, copyright marking,
attacks, and theory
Autre(s) auteur(s) : Aucsmith, David. Fonction indéterminée
Sujet(s) : Informatique
Systèmes d'exploitation (ordinateurs)
Systèmes informatiques -- Mesures de sûreté
Chiffrement (informatique)
Réseaux d'ordinateurs
Protection de l'information (informatique)
Multimédias
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9783540493808
Identifiant de la notice : ark:/12148/cb446933234
Notice n° :
FRBNF44693323
(notice reprise d'un réservoir extérieur)
Table des matières : Steganography ; Information Hiding to Foil the Casual Counterfeiter ; Fingerprinting
Digital Circuits on Programmable Hardware ; Steganography in a Video Conferencing
System ; Reliable Blind Information Hiding for Images ; Cerebral Cryptography ;
Other Applications ; The Steganographic File System ; Stop- and- Go-MIXes Providing
Probabilistic Anonymity in an Open System ; Biometric yet Privacy Protecting Person
Authentication ; On Software Protection via Function Hiding ; Soft Tempest: Hidden
Data Transmission Using Electromagnetic Emanations ; Copyright Marking ; Robust
Digital Watermarking Based on Key-Dependent Basis Functions ; Intellectual Property
Protection Systems and Digital Watermarking ; Secure Copyright Protection Techniques
for Digital Images ; Shedding More Light on Image Watermarks ; Continuous Steganographic
Data Transmission Using Uncompressed Audio ; Attack ; Attacks on Copyright Marking
Systems ; Testing Digital Watermark Resistance to Destruct