Information Hiding 信息隐藏

Information Hiding  信息隐藏
分享
扫描下方二维码分享到微信
打开微信,点击右上角”+“,
使用”扫一扫“即可将网页分享到朋友圈。
作者:
2001-12
版次: 1
ISBN: 9783540427339
定价: 661.98
装帧: 平装
开本: 其他
纸张: 胶版纸
页数: 412页
  • The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.
      
      
      The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes.
      
      
      —proceedings (published in time for the respective conference)
      
      
      —post-proceedings (consisting of thoroughly revised final full papers)
      
      
      —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.). Trustworthy Paper Documents

    An Implementation of Key-Based Digital Signal Steganography

    Distortion-Free Dtat Embedding for Images

    Information Hiding through Noisy Channels

    A Perceptual Audio Hashing Algorithm:A Tool for Robust Audio Identification and Information Hiding 

    Computational Forensic Techniques for Intellectual Property Protection

    Intellectual Property Metering

    Keyless Public Watermarking for Intellectual Property Authentication 

    Efficiency Improvements of the Private Message Service

    A Reputation System to Increase MIX-Net Reliability

    Neural Networks Functions for Public Key Watermarking

    A Graph Theoretic Approach to Software Watermarking

    CoiN-Video:A Model for the Dissemination

    Natural Language Watermarking:Design Analysis and  a Proof-of-Concept Implementation

     Digital Watermarking of Chemical Structure Sets

    The Strong Eternity Service

    Real World Patterns of Failure in Anonymity Systems

    Traffic Analysis Attacks and Trade-Offs In Anonymity Providing Systems

    Automatic Detection of A Watemarked Document Using a Private Key

    Zero-Knowledge Watermark Detection and Proof of Ownership

    F5-A Steganographic Algorithm:High Capacity Despite Better Steganalysis

    A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and ITs Random-Error Resilience

    Practical Capacity o Digital Watermarks

    Blur/Deblur Attack against Docment Protection Systems Based on digital Watermarking

    Ssecond Generation Benchmarking and Applicatuion Oriented Evaluation

    Robust Covert Communication over a Public Audio Channel Using Spread Spectrum

    Hiding Association Rules by Using Confidence and Support

    How to Break a Semi-anonymous Fingerprinting Scheme

    An Analysis of One kf the SDMI Candidates

    Author Index
  • 内容简介:
    The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.
      
      
      The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes.
      
      
      —proceedings (published in time for the respective conference)
      
      
      —post-proceedings (consisting of thoroughly revised final full papers)
      
      
      —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).
  • 目录:
    Trustworthy Paper Documents

    An Implementation of Key-Based Digital Signal Steganography

    Distortion-Free Dtat Embedding for Images

    Information Hiding through Noisy Channels

    A Perceptual Audio Hashing Algorithm:A Tool for Robust Audio Identification and Information Hiding 

    Computational Forensic Techniques for Intellectual Property Protection

    Intellectual Property Metering

    Keyless Public Watermarking for Intellectual Property Authentication 

    Efficiency Improvements of the Private Message Service

    A Reputation System to Increase MIX-Net Reliability

    Neural Networks Functions for Public Key Watermarking

    A Graph Theoretic Approach to Software Watermarking

    CoiN-Video:A Model for the Dissemination

    Natural Language Watermarking:Design Analysis and  a Proof-of-Concept Implementation

     Digital Watermarking of Chemical Structure Sets

    The Strong Eternity Service

    Real World Patterns of Failure in Anonymity Systems

    Traffic Analysis Attacks and Trade-Offs In Anonymity Providing Systems

    Automatic Detection of A Watemarked Document Using a Private Key

    Zero-Knowledge Watermark Detection and Proof of Ownership

    F5-A Steganographic Algorithm:High Capacity Despite Better Steganalysis

    A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and ITs Random-Error Resilience

    Practical Capacity o Digital Watermarks

    Blur/Deblur Attack against Docment Protection Systems Based on digital Watermarking

    Ssecond Generation Benchmarking and Applicatuion Oriented Evaluation

    Robust Covert Communication over a Public Audio Channel Using Spread Spectrum

    Hiding Association Rules by Using Confidence and Support

    How to Break a Semi-anonymous Fingerprinting Scheme

    An Analysis of One kf the SDMI Candidates

    Author Index
查看详情
相关图书 / 更多
Information Hiding  信息隐藏
Industrial Clusters, Institutions and Poverty in Nigeria: The Otigba Information and Communications Technology Cluster
Oyeyinka;Oyebanke
Information Hiding  信息隐藏
Intuitive Health Workbook
安徽省交通建设工程质量监督局
Information Hiding  信息隐藏
Incest
Angot;Christine;Lewis;Tess
Information Hiding  信息隐藏
Interpretation of Nietzsche\'s Second Untimely Meditation
Heidegger;Martin;Haase;Ullrich
Information Hiding  信息隐藏
Investigations on the Theory of the Brownian Movement
Albert Einstein
Information Hiding  信息隐藏
InAs/AlSb异质结型射频场效应晶体管技术
关赫
Information Hiding  信息隐藏
Introduction to Probability
Freund;John E
Information Hiding  信息隐藏
Introduction to Seismology
Peter M. Shearer
Information Hiding  信息隐藏
In the Heart of the Sea (Young Readers Edition) The True Story of the Whaleship Essex
Philbrick;Nathaniel
Information Hiding  信息隐藏
IntroductiontoFinanReporting(财务报告导论)
薄澜;张微微
Information Hiding  信息隐藏
Introduction to the Finite-Difference Time-Domain (Fdtd) Method for Electromagnetics
Gedney;Stephen D
Information Hiding  信息隐藏
Introduction to the Theory of Relativity
Bergmann;Peter G
您可能感兴趣 / 更多
Information Hiding  信息隐藏
Processing:Creative Coding and Generative Art in Processing, 2nd Edition
Ira Greenberg、Dianna Xu、Deepak Kumar 著
Information Hiding  信息隐藏
NegotiationatWork:MaximizeYourTeam'sSkillswith60High-ImpactActivities
Ira G. Asherman 著
Information Hiding  信息隐藏
The Cambridge Companion to Ezra Pound
Ira B. Nadel
Information Hiding  信息隐藏
The Stepford Wives
Ira Levin
Information Hiding  信息隐藏
The Essential Guide to Processing for Flash Developers
Ira Greenberg
Information Hiding  信息隐藏
Physical Chemistry
Ira Levine
Information Hiding  信息隐藏
The New Kings of Nonfiction
Ira Glass
Information Hiding  信息隐藏
Processing: Creative Coding and Computational Art
Ira Greenberg
Information Hiding  信息隐藏
量子化学
Ira N. Levine
Information Hiding  信息隐藏
Political Science: State of the Discipline
Ira Katznelson&Helen V.Milner
Information Hiding  信息隐藏
Physical Chemistry
Ira N. Levine
Information Hiding  信息隐藏
Quantum Chemistry (5th Edition)
Ira N. Levine