Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
2016
|
Schriftenreihe: | IEEE Press Series on Information and Communication Networks Security
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 FHI01 FHN01 Volltext |
Zusammenfassung: | Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland |
Beschreibung: | Description based upon print version of record ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols |
Beschreibung: | 1 online resource (325 pages) |
ISBN: | 9781119081715 1119081718 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043738327 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160826s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781119081715 |9 978-1-119-08171-5 | ||
020 | |a 1119081718 |9 1-119-08171-8 | ||
024 | 7 | |a 10.1002/9781119081715 |2 doi | |
035 | |a (ZDB-35-WIC)ocn940438314 | ||
035 | |a (OCoLC)940438314 | ||
035 | |a (DE-599)BVBBV043738327 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-573 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Information hiding in communication networks |b fundamentals, mechanisms, applications, and countermeasures |c Wojciech Mazurczyk...[et al.] |
264 | 1 | |a Hoboken, N.J. |b Wiley |c 2016 | |
300 | |a 1 online resource (325 pages) | ||
490 | 0 | |a IEEE Press Series on Information and Communication Networks Security | |
500 | |a Description based upon print version of record | ||
500 | |a ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols | ||
520 | |a Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks / Security measures | |
700 | 1 | |a Mazurczyk, Wojciech |e Sonstige |4 oth | |
700 | 1 | |a Wendzel, Steffen |e Sonstige |4 oth | |
700 | 1 | |a Zander, Sebastian |e Sonstige |4 oth | |
700 | 1 | |a Houmansadr, Amir |e Sonstige |4 oth | |
700 | 1 | |a Szczypiorski, Krzysztof |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029150104 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879 |l FHI01 |p ZDB-35-WEL |x Aggregator |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879 |l FHN01 |p ZDB-35-WEL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176537819283456 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043738327 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn940438314 (OCoLC)940438314 (DE-599)BVBBV043738327 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03316nmm a2200493zc 4500</leader><controlfield tag="001">BV043738327</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160826s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119081715</subfield><subfield code="9">978-1-119-08171-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119081718</subfield><subfield code="9">1-119-08171-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119081715</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn940438314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)940438314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043738327</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information hiding in communication networks</subfield><subfield code="b">fundamentals, mechanisms, applications, and countermeasures</subfield><subfield code="c">Wojciech Mazurczyk...[et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (325 pages)</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press Series on Information and Communication Networks Security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wendzel, Steffen</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zander, Sebastian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Houmansadr, Amir</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Szczypiorski, Krzysztof</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029150104</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043738327 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:46Z |
institution | BVB |
isbn | 9781119081715 1119081718 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029150104 |
oclc_num | 940438314 |
open_access_boolean | |
owner | DE-861 DE-573 DE-92 |
owner_facet | DE-861 DE-573 DE-92 |
physical | 1 online resource (325 pages) |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Wiley |
record_format | marc |
series2 | IEEE Press Series on Information and Communication Networks Security |
spelling | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures Wojciech Mazurczyk...[et al.] Hoboken, N.J. Wiley 2016 1 online resource (325 pages) IEEE Press Series on Information and Communication Networks Security Description based upon print version of record ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland Computer networks / Security measures fast Data protection fast Data protection Computer networks / Security measures Mazurczyk, Wojciech Sonstige oth Wendzel, Steffen Sonstige oth Zander, Sebastian Sonstige oth Houmansadr, Amir Sonstige oth Szczypiorski, Krzysztof Sonstige oth https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures Computer networks / Security measures fast Data protection fast Data protection Computer networks / Security measures |
title | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures |
title_auth | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures |
title_exact_search | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures |
title_full | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures Wojciech Mazurczyk...[et al.] |
title_fullStr | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures Wojciech Mazurczyk...[et al.] |
title_full_unstemmed | Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures Wojciech Mazurczyk...[et al.] |
title_short | Information hiding in communication networks |
title_sort | information hiding in communication networks fundamentals mechanisms applications and countermeasures |
title_sub | fundamentals, mechanisms, applications, and countermeasures |
topic | Computer networks / Security measures fast Data protection fast Data protection Computer networks / Security measures |
topic_facet | Computer networks / Security measures Data protection |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119081715 |
work_keys_str_mv | AT mazurczykwojciech informationhidingincommunicationnetworksfundamentalsmechanismsapplicationsandcountermeasures AT wendzelsteffen informationhidingincommunicationnetworksfundamentalsmechanismsapplicationsandcountermeasures AT zandersebastian informationhidingincommunicationnetworksfundamentalsmechanismsapplicationsandcountermeasures AT houmansadramir informationhidingincommunicationnetworksfundamentalsmechanismsapplicationsandcountermeasures AT szczypiorskikrzysztof informationhidingincommunicationnetworksfundamentalsmechanismsapplicationsandcountermeasures |