Sciweavers

18 search results - page 2 / 4
» ih 2005
Sort
View
IH
2005
Springer
14 years 3 months ago
On Blending Attacks for Mixes with Memory
Blending attacks are a general class of traffic-based attacks, exemplified by the (n − 1)-attack. Adding memory or pools to mixes mitigates against such attacks, however there ...
Luke O'Connor
IH
2005
Springer
14 years 3 months ago
Efficient Wet Paper Codes
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
IH
2005
Springer
14 years 3 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
IH
2005
Springer
14 years 3 months ago
Dither Modulation Watermarking of Dynamic Memory Traces
We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking techniqu...
Alan J. Larkin, Félix Balado, Neil J. Hurle...
IH
2005
Springer
14 years 3 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker