ti.\*:("IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)")
Results 1 to 25 of 26
Selection :
IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)Fridrich, Jessica.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-24207-4, IX, 369 p, isbn 3-540-24207-4Conference Proceedings
Threading software watermarksNAGRA, Jasvir; THOMBORSON, Clark.Lecture notes in computer science. 2004, pp 208-223, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
An implementation of, and attacks on, zero-knowledge watermarkingCRAVER, Scott; LIU, Bede; WOLF, Wayne et al.Lecture notes in computer science. 2004, pp 1-12, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
Empirical and theoretical evaluation of active probing attacks and their countermeasuresXINWEN FU; GRAHAM, Bryan; DONG XUAN et al.Lecture notes in computer science. 2004, pp 266-281, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Covert channels for collusion in online computer gamesMURDOCH, Steven J; ZIELINSKI, Piotr.Lecture notes in computer science. 2004, pp 355-369, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Exploiting preserved statistics for steganalysisBÖHME, Rainer; WESTFELD, Andreas.Lecture notes in computer science. 2004, pp 82-96, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Statistical tools for digital forensicsPOPESCU, Alin C; FARID, Hany.Lecture notes in computer science. 2004, pp 128-147, issn 0302-9743, isbn 3-540-24207-4, 20 p.Conference Paper
The hitting set attack on anonymity protocolsKESDOGAN, Dogan; PIMENIDIS, Lexi.Lecture notes in computer science. 2004, pp 326-339, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
On the possibility of non-invertible watermarking schemesQIMING LI; CHANG, Ee-Chien.Lecture notes in computer science. 2004, pp 13-24, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
Improved detection of LSB steganography in grayscale imagesKER, Andrew D.Lecture notes in computer science. 2004, pp 97-115, issn 0302-9743, isbn 3-540-24207-4, 19 p.Conference Paper
Information hiding in finite state machineLIN YUAN; GANG QU.Lecture notes in computer science. 2004, pp 340-354, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Relative generic computational forensic techniquesWONG, Jennifer L; POTKONJAK, Miodrag.Lecture notes in computer science. 2004, pp 148-163, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Syntax and semantics-preserving application-layer protocol steganographyLUCENA, Norka B; PEASE, James; YADOLLAHPOUR, Payman et al.Lecture notes in computer science. 2004, pp 164-179, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Graph Theoretic Software watermarks: Implementation, analysis, and attacksCOLLBERG, Christian; HUNTWORK, Andrew; CARTER, Edward et al.Lecture notes in computer science. 2004, pp 192-207, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Soft IP protection: Watermarking HDL codesLIN YUAN; PARI, Pushkin R; GANG QU et al.Lecture notes in computer science. 2004, pp 224-238, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
An asymmetric security mechanism for navigation signalsKUHN, Markus G.Lecture notes in computer science. 2004, pp 239-252, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
Reversing global and local geometrical distortions in image watermarkingBOGUMIŁ, Dariusz.Lecture notes in computer science. 2004, pp 25-37, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper
Statistical disclosure or intersection attacks on anonymity systemsDANEZIS, George; SERJANTOV, Andrei.Lecture notes in computer science. 2004, pp 293-308, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Reasoning about the anonymity provided by pool mixes that generate dummy trafficDIAZ, Claudia; PRENEEL, Bart.Lecture notes in computer science. 2004, pp 309-325, issn 0302-9743, isbn 3-540-24207-4, 17 p.Conference Paper
A method of linguistic steganography based on collocationally-verified synonymyBOLSHAKOV, Igor A.Lecture notes in computer science. 2004, pp 180-191, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
An improved sample pairs method for detection of LSB embeddingPEIZHONG LU; XIANGYANG LUO; QINGYANG TANG et al.Lecture notes in computer science. 2004, pp 116-127, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
On achievable regions of public multiple-access Gaussian watermarking systemsWEI SUN; YANG, En-Hui.Lecture notes in computer science. 2004, pp 38-51, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ringMURATANI, Hirofumi.Lecture notes in computer science. 2004, pp 282-292, issn 0302-9743, isbn 3-540-24207-4, 11 p.Conference Paper
Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting schemeCHOI, Jae-Gwi; PARK, Ji-Hwan; KWON, Ki-Ryong et al.Lecture notes in computer science. 2004, pp 253-265, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemesFRIDRICH, Jessica.Lecture notes in computer science. 2004, pp 67-81, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper