close
1.

図書

図書
Ping Wah Wong, Edward J. Delp, chairs/editors ; sponsored by IS&T--the Society for Imaging Science and Technology [and] SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Washington : SPIE, c2001  xi, 698 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 4314
所蔵情報: loading…
2.

図書

図書
Edward J. Delp III, Ping Wah Wong, chairs/editors ; sponsored by IS&T--the Society for Imaging Science and Technology [and] SPIE--the International Society for Optical Engineering ; published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Washington : SPIE, c2002  xi, 712 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 4675
所蔵情報: loading…
3.

図書

図書
Edward J. Delp III, Ping Wah Wong, chairs/editors ; sponsored and published by IS&T--the Society for Imaging Science and Technology [and] SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE , Springfield, Va. : IS&T, c2005  xiv, 802 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5681
Proceedings of Electronic Imaging Science and Technology
所蔵情報: loading…
4.

図書

図書
Edward J. Delp III, Ping Wah Wong, chairs/editors ; sponsored and published by IS&T--the Society for Imaging Science and Technology [and] SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE , Springfield, Va. : IS&T, c2006  1 v. (various pagings) ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 6072
Proceedings of Electronic Imaging Science and Technology
所蔵情報: loading…
5.

図書

図書
Andreas Pfitzmann (ed.)
出版情報: Berlin : Springer, c2000  ix, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1768
所蔵情報: loading…
目次情報: 続きを見る
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks / Elke Franz ; Andreas Pfitzmann
Secure Steganographic Methods for Palette Images / Jiri Fridrich ; Rui Du
Attacks on Steganographic Systems / Andreas Westfeld
Beyond Symmetric Steganography
Developments in Steganography / Joshua R. Smith ; Chris Dodge
An Asymmetric Public Detection Watermarking Technique / Teddy Furon ; Pierre Duhamel
Zero Knowledge Watermark Detection / Scott Craver
Watermarking: Proving Ownership
Proving Ownership of Digital Content / André Adelsbach ; Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Error- and Collusion-Secure Fingerprinting for Digital Data / Hans-Jürgen Guth
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection / Matt L. Miller ; Jeffrey A. Bloom
Optimum Decoding of Non-additive Full Frame DFT Watermarks / Alessia De Rosa ; Mauro Barni ; Franco Bartolini ; Vito Cappellini ; Alessandro Piva
Watermark Detection after Quantization Attacks / Joachim J. Eggers ; Bernd Girod
Content-Based Watermarking for Image Authentication / Pedro Lamy ; José Martinho ; Tiago Rosa ; Maria Paula Queluz
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks / Shelby Pereira ; Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Nazanin Baumgaertner
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation / Martin Kutter
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales / Jean-Paul Linnartz ; Geert Depovere ; Ton Kalker
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking / Gabriella Csurka ; Frédéric Deguillaume ; Joseph J. K. Ó Ruanaidh
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware / John Lach ; William H. Mangione-Smith ; Miodrag Potkonjak
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation / Sebastiano Battiato ; Dario Catalano ; Giovanni Gallo ; Rosario Gennaro
Recovery of Watermarks from Distorted Images / Neil F. Johnson ; Zoran Duric ; Sushil Jajodia
Cocktail Watermarking on Images / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions / Gang Qu
Robust Object Watermarking: Application to Code / Julien P. Stern ; Gaël Hachez ; François Koeune ; Jean-Jacques Quisquater
Software DisEngineering: Program Hiding Architecture and Experiments / Enriquillo Valdez ; Moti Yung
The Difficulty of Separating Private and Public Information
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest / John McHugh
An Entropy-Based Framework for Database Inference / Ira S. Moskowitz ; LiWu Chang
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms / Talat Mert DoGu ; Anthony Ephremides
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast / Frank Stajano ; Ross Anderson
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System / W. P. R. Mitchell
StegFS: A Steganographic File System for Linux / Andrew D. McDonald ; Markus G. Kuhn
Nonbinary Audio Cryptography / Yvo Desmedt ; Tri V. Le
Author Index
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
6.

図書

図書
Ed Dawson, Andrew Clark, Colin Boyd (eds.)
出版情報: Berlin : Springer, c2000  xii, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1841
所蔵情報: loading…
7.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c2000  ix, 256 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Message from the Program Chairs
Symposium Committee
Program Committee
Access Control I
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers / A. Herzberg ; Y. Mass ; J. Mihaeli ; D. Naor ; Y. Ravid
A Security Infrastructure for Distributed Java Applications / D. Balfanz ; D. Dean ; M. Spreitzer
A Practically Implementable and Tractable Delegation Logic / N. Li ; B. Grosof ; J. Feigenbaum
Applications of Cryptography
Practical Techniques for Searches on Encrypted Data / D. Song ; D. Wagner ; A. Perrig
Efficient Authentication and Signing of Multicast Streams over Lossy Channels / R. Canetti ; D. Tygar
Panel: Is Electronic Privacy Achievable?
Is Electronic Privacy Achievable? / C. Irvine ; T. Levin
Privacy Technology Lessons from Healthcare / R. Anderson
Protocol Analysis and Design
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols / J. Clark ; J. Jacob
Authentication Tests / J. Guttman ; F. Thayer
Protocol-Independent Secrecy / J. Millen ; H. Ruess
Panel: Will Open Source Really Improve System Security?
Robust Nonproprietary Software / P. Neumann
Security and Source Code Access: Issues and Realities / S. Lipner
Open Source in Security: Visiting the Bizarre / F. Schneider
Will Openish Source Really Improve Security / G. McGraw
Intrusion Detection
Using Conservation of Flow as a Security Mechanism in Network Protocols / J. Hughes ; T. Aura ; M. Bishop
Logic Induction of Valid Behavior Specifications for Intrusion Detection / C. Ko
Assurance
Using Model Checking to Analyze Network Vulnerabilities / R. Ritchey ; P. Ammann
Verifying the EROS Confinement Mechanism / J. Shapiro ; S. Weber
Fang: A Firewall Analysis Engine / A. Mayer ; A. Wool ; E. Ziskind
Key Management
A More Efficient Use of Delta-CRLs / D. Cooper
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure / A. Levi ; M. Caglayan
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast / S. Setia ; S. Koussih ; S. Jajodia ; E. Harder
Access Control II
LOMAC: Low Water-Mark Integrity Protection for COTS Environments / T. Fraser
IRM Enforcement of Java Stack Inspection / U. Erlingsson
Author Index
Message from the Program Chairs
Symposium Committee
Program Committee
8.

図書

図書
Edward J. Delp III, Ping Wah Wong, chairs/editors
出版情報: Bellingham, Wash. : SPIE , Springfield, Va. : IS&T, c2003  xiv, 742 p. ; 28 cm
シリーズ名: Proceedings of Electronic Imaging Science and Technology
Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5020
所蔵情報: loading…
9.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
10.

図書

図書
Fabien A.P. Petitcolas (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  ix, 426 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2578
所蔵情報: loading…
目次情報: 続きを見る
Information Hiding and Networking / Neil JohnsonSession 1:
Hiding Intrusions: From the Abnormal to the Normal and Beyond / Kymie Tan ; John McHugh ; Kevin Killourhy
Eliminating Steganography in Internet Traffic with Active Wardens / Gina Fisk ; Mike Fisk ; Christos Papadopoulos ; Joshua Neil
Anonymity / Andreas PfitzmannSession 2:
From a Trickle to a Flood: Active Attacks on Several Mix Types / Andrei Serjantov ; Roger Dingledine ; Paul Syverson
Limits of Anonymity in Open Environments / Dogan Kedogan ; Dakshi Agrawal ; Stefan Penz
Chaffinch: Confidentiality in the Face of Legal Threats / Richard Clayton ; George Danezis
Watermarking Fundamentals / Job OostveenSession 3:
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation / Fernando Pérez-González ; Félix Balado
Robustness and Efficiency of Non-linear Side-Informed Watermarking / Guénolé C.M. Silvestre ; Neil J. Hurley ; Teddy Furon
Security of Public Watermarking Schemes for Binary Sequences / Qiming Li ; Ee-Chien Chang
Watermarking Algorithms I / Hyoung Joong KimSession 4:
Direct Embedding and Detection of RST Invariant Watermarks / Peter A. Fletcher ; Kieran G. Larkin
Robust Image Watermark Using Radon Transform and Bispectrum Invariants / Hyung-Shin Kim ; Yunju Baek ; Heung-Kyu Lee ; Young-Ho Suh
Audio Watermark Robustness to Desynchronization via Beat Detection / Darko Kirovski ; Hagai Attias
Watermarking Algorithms II / Ton KalkerSession 5:
Robust Watermarking and Affine Registration of 3D Meshes / Oliver Benedens
Natural Language Watermarking and Tamperproofing / Mikhail J. Atallah ; Victor Raskin ; Christian F. Hempelmann ; Mercan Karahan ; Radu Sion ; Umut Topkara ; Katrina E. Triezenberg
Attacks on Watermarking Algorithms / Fabien A. P. PetitcolasSession 6:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection / Tri Van Le ; Yvo Desmedt
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks / M. Kivanc Mihcak ; Ramarathnam Venkatesan ; Mustafa Kesal
Detectors for Echo Hiding Systems / Scott Craver ; Bede Liu ; Wayne Wolf
Steganography Algorithms / Jessica FridrichSession 7:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis / Richard E. Newman ; Ira S. Moskowitz ; LiWu Chang ; Murali M. Brahmadesam
Steganography Preserving Statistical Properties / Elke Franz
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression / Hideki Noda ; Jeremiah Spaulding ; Mahdad N. Shirazi ; Michiharu Niimi ; Eiji Kawaguchi
Steganalysis I / Session 8:
Steganalysis of JPEG Images: Breaking the F5 Algorithm / Miroslav Goljan ; Dorin Hogea
Detecting Low Embedding Rates / Andreas Westfeld
Steganalysis II / Session 9:
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines / Siwei Lyu ; Hany Farid
Detection of LSB Steganography via Sample Pair Analysis / Sorina Dumitrescu ; Xiaolin Wu ; Zhe Wang
Hiding Information in Unusual Content I / Christian S. CollbergSession 10:
Hiding Data in DNA / Boris Shimanovsky ; Jessica Feng ; Miodrag Potkonjak
Tracing the Source of a Shredded Document / Jack Brassil
Hiding Information in Unusual Content II / Caroline FontaineSession 11:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive / Yuqun Chen ; Matthew Cary ; Ruoming Pang ; Saurabh Sinha ; Mariusz H. Jakubowski
Practical Oblivious Transfer Protocols / Christian Tobias
Author Index
Information Hiding and Networking / Neil JohnsonSession 1:
Hiding Intrusions: From the Abnormal to the Normal and Beyond / Kymie Tan ; John McHugh ; Kevin Killourhy
Eliminating Steganography in Internet Traffic with Active Wardens / Gina Fisk ; Mike Fisk ; Christos Papadopoulos ; Joshua Neil
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼