Springer Book Archives
Trustworthy Paper Documents.- An Implementation of Key-Based Digital Signal Steganography.- Distortion-Free Data Embedding for Images.- Information Hiding through Noisy Channels.- A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.- Computational Forensic Techniques for Intellectual Property Protection.- Intellectual Property Metering.- Keyless Public Watermarking for Intellectual Property Authentication.- Efficiency Improvements of the Private Message Service.- A Reputation System to Increase MIX-Net Reliability.- Neural Networks Functions for Public Key Watermarking.- A Graph Theoretic Approach to Software Watermarking.- COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks.- Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.- Digital Watermarking of Chemical Structure Sets.- The Strong Eternity Service.- Real World Patterns of Failure in Anonymity Systems.- Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems.- Automatic Detection of a Watermarked Document Using a Private Key.- Zero-Knowledge Watermark Detection and Proof of Ownership.- F5—A Steganographic Algorithm.- A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience.- Practical Capacity of Digital Watermarks.- Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking.- Second Generation Benchmarking and Application Oriented Evaluation.- Robust Covert Communication over a Public Audio Channel Using Spread Spectrum.- Hiding Association Rules by Using Confidence and Support.- How to Break a Semi-anonymous Fingerprinting Scheme.- An Analysis of One of the SDMI Candidates.
Ask a Question About this Product More... |