Sciweavers

IH
2004
Springer
14 years 26 days ago
Exploiting Preserved Statistics for Steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Rainer Böhme, Andreas Westfeld
IH
2004
Springer
14 years 26 days ago
Reversing Global and Local Geometrical Distortions in Image Watermarking
A new method improving watermark robustness against both global and local geometrical distortions is presented in this article. The proposed approach is based on a self-reference c...
Dariusz Bogumil
IH
2004
Springer
14 years 26 days ago
The Hitting Set Attack on Anonymity Protocols
Dogan Kesdogan, Lexi Pimenidis
IH
2004
Springer
14 years 26 days ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
IH
2004
Springer
14 years 26 days ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
IH
2004
Springer
14 years 26 days ago
Covert Channels for Collusion in Online Computer Games
Steven J. Murdoch, Piotr Zielinski