Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellec...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | Advances in Information Security
1 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry |
Beschreibung: | 1 Online-Ressource (XX, 137 p) |
ISBN: | 9781461543756 |
DOI: | 10.1007/978-1-4615-4375-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064226 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9781461543756 |9 978-1-4615-4375-6 | ||
024 | 7 | |a 10.1007/978-1-4615-4375-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-4375-6 | ||
035 | |a (OCoLC)1227482719 | ||
035 | |a (DE-599)BVBBV047064226 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Johnson, Neil F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information Hiding: Steganography and Watermarking-Attacks and Countermeasures |b Steganography and Watermarking - Attacks and Countermeasures |c by Neil F. Johnson, Zoran Duric, Sushil Jajodia |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer US |c 2001 | |
300 | |a 1 Online-Ressource (XX, 137 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 1 | |
520 | |a Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. | ||
520 | |a The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. | ||
520 | |a Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry | ||
650 | 4 | |a Computer Science, general | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Natural Language Processing (NLP) | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Computer science | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Natural language processing (Computer science) | |
650 | 4 | |a E-commerce | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 1 | 1 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |D s |
689 | 2 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 1 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Duric, Zoran |4 aut | |
700 | 1 | |a Jajodia, Sushil |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461369677 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792372042 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461543763 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-4375-6 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471338 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-4375-6 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061969309696 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Johnson, Neil F. Duric, Zoran Jajodia, Sushil |
author_facet | Johnson, Neil F. Duric, Zoran Jajodia, Sushil |
author_role | aut aut aut |
author_sort | Johnson, Neil F. |
author_variant | n f j nf nfj z d zd s j sj |
building | Verbundindex |
bvnumber | BV047064226 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-4375-6 (OCoLC)1227482719 (DE-599)BVBBV047064226 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-4375-6 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05516nmm a2200841zcb4500</leader><controlfield tag="001">BV047064226</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461543756</subfield><subfield code="9">978-1-4615-4375-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-4375-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-4375-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227482719</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064226</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnson, Neil F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Hiding: Steganography and Watermarking-Attacks and Countermeasures</subfield><subfield code="b">Steganography and Watermarking - Attacks and Countermeasures</subfield><subfield code="c">by Neil F. Johnson, Zoran Duric, Sushil Jajodia</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 137 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">1</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Natural Language Processing (NLP)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Natural language processing (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Duric, Zoran</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461369677</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792372042</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461543763</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-4375-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471338</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-4375-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064226 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781461543756 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471338 |
oclc_num | 1227482719 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XX, 137 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Johnson, Neil F. Verfasser aut Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures by Neil F. Johnson, Zoran Duric, Sushil Jajodia 1st ed. 2001 New York, NY Springer US 2001 1 Online-Ressource (XX, 137 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 1 Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry Computer Science, general Management of Computing and Information Systems Data Structures and Information Theory Computer Communication Networks Natural Language Processing (NLP) e-Commerce/e-business Computer science Management information systems Data structures (Computer science) Computer communication systems Natural language processing (Computer science) E-commerce Datensicherung (DE-588)4011144-1 gnd rswk-swf Geheimnisprinzip (DE-588)4437501-3 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Elektronisches Wasserzeichen (DE-588)4572344-8 s Datensicherung (DE-588)4011144-1 s DE-604 Steganographie (DE-588)4617648-2 s Geheimnisprinzip (DE-588)4437501-3 s Duric, Zoran aut Jajodia, Sushil aut Erscheint auch als Druck-Ausgabe 9781461369677 Erscheint auch als Druck-Ausgabe 9780792372042 Erscheint auch als Druck-Ausgabe 9781461543763 https://doi.org/10.1007/978-1-4615-4375-6 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Johnson, Neil F. Duric, Zoran Jajodia, Sushil Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures Computer Science, general Management of Computing and Information Systems Data Structures and Information Theory Computer Communication Networks Natural Language Processing (NLP) e-Commerce/e-business Computer science Management information systems Data structures (Computer science) Computer communication systems Natural language processing (Computer science) E-commerce Datensicherung (DE-588)4011144-1 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Steganographie (DE-588)4617648-2 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4437501-3 (DE-588)4617648-2 (DE-588)4572344-8 (DE-588)4033329-2 |
title | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures |
title_auth | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures |
title_exact_search | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures |
title_exact_search_txtP | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures |
title_full | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures by Neil F. Johnson, Zoran Duric, Sushil Jajodia |
title_fullStr | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures by Neil F. Johnson, Zoran Duric, Sushil Jajodia |
title_full_unstemmed | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures by Neil F. Johnson, Zoran Duric, Sushil Jajodia |
title_short | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures |
title_sort | information hiding steganography and watermarking attacks and countermeasures steganography and watermarking attacks and countermeasures |
title_sub | Steganography and Watermarking - Attacks and Countermeasures |
topic | Computer Science, general Management of Computing and Information Systems Data Structures and Information Theory Computer Communication Networks Natural Language Processing (NLP) e-Commerce/e-business Computer science Management information systems Data structures (Computer science) Computer communication systems Natural language processing (Computer science) E-commerce Datensicherung (DE-588)4011144-1 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Steganographie (DE-588)4617648-2 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer Science, general Management of Computing and Information Systems Data Structures and Information Theory Computer Communication Networks Natural Language Processing (NLP) e-Commerce/e-business Computer science Management information systems Data structures (Computer science) Computer communication systems Natural language processing (Computer science) E-commerce Datensicherung Geheimnisprinzip Steganographie Elektronisches Wasserzeichen Kryptologie |
url | https://doi.org/10.1007/978-1-4615-4375-6 |
work_keys_str_mv | AT johnsonneilf informationhidingsteganographyandwatermarkingattacksandcountermeasuressteganographyandwatermarkingattacksandcountermeasures AT duriczoran informationhidingsteganographyandwatermarkingattacksandcountermeasuressteganographyandwatermarkingattacksandcountermeasures AT jajodiasushil informationhidingsteganographyandwatermarkingattacksandcountermeasuressteganographyandwatermarkingattacksandcountermeasures |