The Resource Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings, David Aucsmith (ed.), (electronic resource)

Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings, David Aucsmith (ed.), (electronic resource)

Label
Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings
Title
Information hiding
Title remainder
Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings
Statement of responsibility
David Aucsmith (ed.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Information Hiding, IH'98, held in Portland, Oregon, USA in April 1998. The 25 revised full papers presented have gone through two rounds of reviewing and revision and were selected from initially 41 submissions. The book documents the state of the art in the area of information hiding research and development. The papers are organized in sections on steganography, other applications, copyright marking, attacks, and theory
Member of
Cataloging source
COO
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I48 1998
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
1998
http://bibfra.me/vocab/lite/meetingName
IH'98
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Aucsmith, David
Series statement
Lecture notes in computer science
Series volume
1525
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • Computer security
  • Data protection
  • Informatie
  • Geheimen
  • Computer security
  • Data protection
Label
Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings, David Aucsmith (ed.), (electronic resource)
Link
http://dx.doi.org/10.1007/3-540-49380-8
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online bron
Carrier category code
  • cr
Carrier MARC source
rdacarrier/dut
Content category
tekst
Content type code
  • txt
Content type MARC source
rdacontent/dut
Contents
Steganography -- Information Hiding to Foil the Casual Counterfeiter -- Fingerprinting Digital Circuits on Programmable Hardware -- Steganography in a Video Conferencing System -- Reliable Blind Information Hiding for Images -- Cerebral Cryptography -- Other Applications -- The Steganographic File System -- Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System -- Biometric yet Privacy Protecting Person Authentication -- On Software Protection via Function Hiding -- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations -- Copyright Marking -- Robust Digital Watermarking Based on Key-Dependent Basis Functions -- Intellectual Property Protection Systems and Digital Watermarking -- Secure Copyright Protection Techniques for Digital Images -- Shedding More Light on Image Watermarks -- Continuous Steganographic Data Transmission Using Uncompressed Audio -- Attack -- Attacks on Copyright Marking Systems -- Testing Digital Watermark Resistance to Destruction -- Analysis of the Sensitivity Attack against Electronic Watermarks in Images -- Steganalysis of Images Created Using Current Steganography Software -- Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks -- Theory -- An Information-Theoretic Model for Steganography -- Steganalysis and Game Equilibria -- Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks -- Modeling the Security of Steganographic Systems -- On Public-Key Steganography in the Presence of an Active Warden
Dimensions
unknown
Extent
1 online resource (ix, 368 p.)
Form of item
online
Isbn
9783540493808
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia/dut
Media type code
  • c
Other physical details
ill.
Specific material designation
remote
System control number
  • (OCoLC)213930845
  • (OCoLC)ocn213930845
Label
Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings, David Aucsmith (ed.), (electronic resource)
Link
http://dx.doi.org/10.1007/3-540-49380-8
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online bron
Carrier category code
  • cr
Carrier MARC source
rdacarrier/dut
Content category
tekst
Content type code
  • txt
Content type MARC source
rdacontent/dut
Contents
Steganography -- Information Hiding to Foil the Casual Counterfeiter -- Fingerprinting Digital Circuits on Programmable Hardware -- Steganography in a Video Conferencing System -- Reliable Blind Information Hiding for Images -- Cerebral Cryptography -- Other Applications -- The Steganographic File System -- Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System -- Biometric yet Privacy Protecting Person Authentication -- On Software Protection via Function Hiding -- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations -- Copyright Marking -- Robust Digital Watermarking Based on Key-Dependent Basis Functions -- Intellectual Property Protection Systems and Digital Watermarking -- Secure Copyright Protection Techniques for Digital Images -- Shedding More Light on Image Watermarks -- Continuous Steganographic Data Transmission Using Uncompressed Audio -- Attack -- Attacks on Copyright Marking Systems -- Testing Digital Watermark Resistance to Destruction -- Analysis of the Sensitivity Attack against Electronic Watermarks in Images -- Steganalysis of Images Created Using Current Steganography Software -- Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks -- Theory -- An Information-Theoretic Model for Steganography -- Steganalysis and Game Equilibria -- Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks -- Modeling the Security of Steganographic Systems -- On Public-Key Steganography in the Presence of an Active Warden
Dimensions
unknown
Extent
1 online resource (ix, 368 p.)
Form of item
online
Isbn
9783540493808
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia/dut
Media type code
  • c
Other physical details
ill.
Specific material designation
remote
System control number
  • (OCoLC)213930845
  • (OCoLC)ocn213930845

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...