Sciweavers

IH
2004
Springer
14 years 4 months ago
Exploiting Preserved Statistics for Steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Rainer Böhme, Andreas Westfeld
IH
2004
Springer
14 years 4 months ago
Reversing Global and Local Geometrical Distortions in Image Watermarking
A new method improving watermark robustness against both global and local geometrical distortions is presented in this article. The proposed approach is based on a self-reference c...
Dariusz Bogumil
IH
2004
Springer
14 years 4 months ago
The Hitting Set Attack on Anonymity Protocols
Dogan Kesdogan, Lexi Pimenidis
IH
2004
Springer
14 years 4 months ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
IH
2004
Springer
14 years 4 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
IH
2004
Springer
14 years 4 months ago
Covert Channels for Collusion in Online Computer Games
Steven J. Murdoch, Piotr Zielinski