Sciweavers

18 search results - page 3 / 4
» ih 2005
Sort
View
IH
2005
Springer
14 years 3 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
IH
2005
Springer
14 years 3 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
IH
2005
Springer
14 years 3 months ago
Translation-Based Steganography
This paper investigates the possibilities of steganographically embedding information in the \noise" created by automatic translation of natural language documents. Because th...
Christian Grothoff, Krista Grothoff, Ludmila Alkhu...
IH
2005
Springer
14 years 3 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
IH
2005
Springer
14 years 3 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis