Information hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2007
|
Schriftenreihe: | Lecture notes in computer science
4437 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 387 S. Ill., graph. Darst. |
ISBN: | 9783540741237 3540741232 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV022884598 | ||
003 | DE-604 | ||
005 | 20161209 | ||
007 | t| | ||
008 | 071016s2007 gw ad|| |||| 10||| eng d | ||
015 | |a 07,N37,0032 |2 dnb | ||
016 | 7 | |a 98538283X |2 DE-101 | |
020 | |a 9783540741237 |c : ca. EUR 55.64 (freier Pr.), ca. sfr 91.00 (freier Pr.) |9 978-3-540-74123-7 | ||
020 | |a 3540741232 |c : ca. EUR 55.64 (freier Pr.), ca. sfr 91.00 (freier Pr.) |9 3-540-74123-2 | ||
024 | 3 | |a 9783540741237 | |
028 | 5 | 2 | |a 12104833 |
035 | |a (OCoLC)633089876 | ||
035 | |a (DE-599)DNB98538283X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-91G |a DE-706 |a DE-355 |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 450f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 252f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information hiding |b 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |c Jan Camenisch ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2007 | |
300 | |a VIII, 387 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 4437 | |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2006 |z Alexandria Va. |2 gnd-content | |
689 | 0 | 0 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Camenisch, Jan |e Sonstige |4 oth | |
711 | 2 | |a IH |n 8 |d 2006 |c Alexandria, Va. |j Sonstige |0 (DE-588)6067701-6 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 4437 |w (DE-604)BV000000607 |9 4437 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016089522&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016089522 |
Datensatz im Suchindex
_version_ | 1820875017879027712 |
---|---|
adam_text |
Table
of
Contents
Hamiltonian
Mechanics
Natural Watermarking: A Secure Spread Spectrum Technique for
WO A
. 1
Patrick
Bas
and
François Cayre
An Improved Asymmetric Watermarking System Using Matrix
Embedding
. 15
Scott Craver
A Cryptographic Method for Secure Watermark Detection
. 26
Michael Malkin and Ton
Kalker
Steganographic Communication in Ordered Channels
. 42
R.C. Chakinala, A. Kumamsubramanian, R. Manokaran, G. Noubir,
C.
Pandu
Rangan,
and
R.
Sundaram
Analyzing Network-Aware Active Wardens in
IPv6. 58
Grzegorz Lewandowski, Norka
В.
Lučena,
and Steve
J.
Chapín
Video Watermarking by Using Geometic Warping
Without Visible Artifacts
Video Watermarking by Using Geometric Warping Without Visible
Artifacts
. 78
Dima Prò'frock,
Mathias Schlauweg, and Erika Müller
Time-Scale
Invariant Audio
Watermarking Based on the Statistical
Features in Time Domain
. 93
Shijun Xiang,
Лит
Huang, and
Rui Yang
Content-Aware Steganography: About Lazy Prisoners and
Narrow-Minded Wardens
. 109
Richard Bergmair and Stefan Katzenbeisser
Noisy Timing Channels with Binary Inputs and Outputs
. 124
Keye Martin and Ira S. Moskowitz
A Computational Model for Watermark Robustness
. 145
André
Adehbach, Stefan Katzenbeisser, and Ahmad-Reza Sadeghi
Hiding Information Hiding
. 161
Adam Young and
Moti
Yung
VIII Table of
Contents
Reversible
Watermarking of NURBS-Based
CAD Models. 172
Wolfgang Funk
A High-Capacity Data Hiding Method for Polygonal Meshes
. 188
Hao-tian Wu and Yiu-ming Cheung
Steganography for Radio Amateurs
—
A DSSS Based Approach for Slow
Scan Television
. 201
Andreas
Westfeld
Delayed and Controlled Failures in Tamper-Resistant Software
. 216
Gang Tan, Yuqun Chen, and
Mariusz
H.
Jakubowski
A Model for Self-Modifying Code
. 232
Bertrand
Anckaert, Matias Madou, and
Koen
De Bosschere
A Markov Process Based Approach to Effective Attacking JPEG
Steganography
. 249
Yun Q. Shi, Chunhua Chen, and Wen Chen
Batch Steganography and Pooled
Steganalysis
. 265
Andrew
D. Ker
On Steganographic Embedding Efficiency
. 282
Jessica
Fridrich, Petr Lisoněk,
and David
Soukal
Bandwidth Optimal Steganography Secure Against Adaptive Chosen
Stegotext
Attacks
. 297
ΊΗ
Van
Le
and Kaoru Kurosawa
Modified Matrix Encoding Technique for Minimal Distortion
Steganography
. 314
Younhee Kim,
Zoran
Duric, and Dana Richards
Statistically Secure Anti-Collusion Code Design for Median Attack
Robustness for Practical Fingerprinting
. 328
Jae-Min Seol and Seong- Whan Kim
A Collusion-Resistant Video Watermarking Scheme
. 343
Amir Houmansadr and Shahrokh Ghaemmaghami
An Elliptic Curve Backdoor Algorithm for RSASSA
. 355
Adam Young and
Moti
Yung
A Subliminal-Free Variant of ECDSA
. 375
Jens-Matthias Bohli, Maria Isabel Gonzalez
Vasco,
and
Rainer Steinwandt
Author Index
. 389 |
adam_txt |
Table
of
Contents
Hamiltonian
Mechanics
Natural Watermarking: A Secure Spread Spectrum Technique for
WO A
. 1
Patrick
Bas
and
François Cayre
An Improved Asymmetric Watermarking System Using Matrix
Embedding
. 15
Scott Craver
A Cryptographic Method for Secure Watermark Detection
. 26
Michael Malkin and Ton
Kalker
Steganographic Communication in Ordered Channels
. 42
R.C. Chakinala, A. Kumamsubramanian, R. Manokaran, G. Noubir,
C.
Pandu
Rangan,
and
R.
Sundaram
Analyzing Network-Aware Active Wardens in
IPv6. 58
Grzegorz Lewandowski, Norka
В.
Lučena,
and Steve
J.
Chapín
Video Watermarking by Using Geometic Warping
Without Visible Artifacts
Video Watermarking by Using Geometric Warping Without Visible
Artifacts
. 78
Dima Prò'frock,
Mathias Schlauweg, and Erika Müller
Time-Scale
Invariant Audio
Watermarking Based on the Statistical
Features in Time Domain
. 93
Shijun Xiang,
Лит
Huang, and
Rui Yang
Content-Aware Steganography: About Lazy Prisoners and
Narrow-Minded Wardens
. 109
Richard Bergmair and Stefan Katzenbeisser
Noisy Timing Channels with Binary Inputs and Outputs
. 124
Keye Martin and Ira S. Moskowitz
A Computational Model for Watermark Robustness
. 145
André
Adehbach, Stefan Katzenbeisser, and Ahmad-Reza Sadeghi
Hiding Information Hiding
. 161
Adam Young and
Moti
Yung
VIII Table of
Contents
Reversible
Watermarking of NURBS-Based
CAD Models. 172
Wolfgang Funk
A High-Capacity Data Hiding Method for Polygonal Meshes
. 188
Hao-tian Wu and Yiu-ming Cheung
Steganography for Radio Amateurs
—
A DSSS Based Approach for Slow
Scan Television
. 201
Andreas
Westfeld
Delayed and Controlled Failures in Tamper-Resistant Software
. 216
Gang Tan, Yuqun Chen, and
Mariusz
H.
Jakubowski
A Model for Self-Modifying Code
. 232
Bertrand
Anckaert, Matias Madou, and
Koen
De Bosschere
A Markov Process Based Approach to Effective Attacking JPEG
Steganography
. 249
Yun Q. Shi, Chunhua Chen, and Wen Chen
Batch Steganography and Pooled
Steganalysis
. 265
Andrew
D. Ker
On Steganographic Embedding Efficiency
. 282
Jessica
Fridrich, Petr Lisoněk,
and David
Soukal
Bandwidth Optimal Steganography Secure Against Adaptive Chosen
Stegotext
Attacks
. 297
ΊΗ
Van
Le
and Kaoru Kurosawa
Modified Matrix Encoding Technique for Minimal Distortion
Steganography
. 314
Younhee Kim,
Zoran
Duric, and Dana Richards
Statistically Secure Anti-Collusion Code Design for Median Attack
Robustness for Practical Fingerprinting
. 328
Jae-Min Seol and Seong- Whan Kim
A Collusion-Resistant Video Watermarking Scheme
. 343
Amir Houmansadr and Shahrokh Ghaemmaghami
An Elliptic Curve Backdoor Algorithm for RSASSA
. 355
Adam Young and
Moti
Yung
A Subliminal-Free Variant of ECDSA
. 375
Jens-Matthias Bohli, Maria Isabel Gonzalez
Vasco,
and
Rainer Steinwandt
Author Index
. 389 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022884598 |
classification_rvk | ST 276 |
classification_tum | DAT 450f DAT 252f DAT 465f |
ctrlnum | (OCoLC)633089876 (DE-599)DNB98538283X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV022884598</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161209</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">071016s2007 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N37,0032</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">98538283X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540741237</subfield><subfield code="c">: ca. EUR 55.64 (freier Pr.), ca. sfr 91.00 (freier Pr.)</subfield><subfield code="9">978-3-540-74123-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540741232</subfield><subfield code="c">: ca. EUR 55.64 (freier Pr.), ca. sfr 91.00 (freier Pr.)</subfield><subfield code="9">3-540-74123-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540741237</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12104833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)633089876</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB98538283X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 450f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information hiding</subfield><subfield code="b">8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers</subfield><subfield code="c">Jan Camenisch ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 387 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">4437</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2006</subfield><subfield code="z">Alexandria Va.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Camenisch, Jan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IH</subfield><subfield code="n">8</subfield><subfield code="d">2006</subfield><subfield code="c">Alexandria, Va.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6067701-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">4437</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">4437</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016089522&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016089522</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2006 Alexandria Va. gnd-content |
genre_facet | Konferenzschrift 2006 Alexandria Va. |
id | DE-604.BV022884598 |
illustrated | Illustrated |
index_date | 2024-07-02T18:51:33Z |
indexdate | 2025-01-10T15:08:57Z |
institution | BVB |
institution_GND | (DE-588)6067701-6 |
isbn | 9783540741237 3540741232 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016089522 |
oclc_num | 633089876 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-355 DE-BY-UBR DE-83 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-355 DE-BY-UBR DE-83 DE-11 |
physical | VIII, 387 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers Jan Camenisch ... (ed.) Berlin [u.a.] Springer 2007 VIII, 387 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 4437 Steganographie (DE-588)4617648-2 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Geheimnisprinzip (DE-588)4437501-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2006 Alexandria Va. gnd-content Geheimnisprinzip (DE-588)4437501-3 s DE-604 Elektronisches Wasserzeichen (DE-588)4572344-8 s Steganographie (DE-588)4617648-2 s Kryptoanalyse (DE-588)4830502-9 s Camenisch, Jan Sonstige oth IH 8 2006 Alexandria, Va. Sonstige (DE-588)6067701-6 oth Lecture notes in computer science 4437 (DE-604)BV000000607 4437 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016089522&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers Lecture notes in computer science Steganographie (DE-588)4617648-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Geheimnisprinzip (DE-588)4437501-3 gnd |
subject_GND | (DE-588)4617648-2 (DE-588)4830502-9 (DE-588)4572344-8 (DE-588)4437501-3 (DE-588)1071861417 |
title | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |
title_auth | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |
title_exact_search | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |
title_exact_search_txtP | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |
title_full | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers Jan Camenisch ... (ed.) |
title_fullStr | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers Jan Camenisch ... (ed.) |
title_full_unstemmed | Information hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers Jan Camenisch ... (ed.) |
title_short | Information hiding |
title_sort | information hiding 8th international workshop ih 2006 alexandria va usa july 10 12 2006 revised selected papers |
title_sub | 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers |
topic | Steganographie (DE-588)4617648-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Geheimnisprinzip (DE-588)4437501-3 gnd |
topic_facet | Steganographie Kryptoanalyse Elektronisches Wasserzeichen Geheimnisprinzip Konferenzschrift 2006 Alexandria Va. |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016089522&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT camenischjan informationhiding8thinternationalworkshopih2006alexandriavausajuly10122006revisedselectedpapers AT ihalexandriava informationhiding8thinternationalworkshopih2006alexandriavausajuly10122006revisedselectedpapers |