標題: Titlebook: Information Hiding; 13th International C Tomá? Filler,Tomá? Pevny,Andrew Ker Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidel [打印本頁] 作者: ARRAY 時間: 2025-3-21 18:45
書目名稱Information Hiding影響因子(影響力)
書目名稱Information Hiding影響因子(影響力)學科排名
書目名稱Information Hiding網絡公開度
書目名稱Information Hiding網絡公開度學科排名
書目名稱Information Hiding被引頻次
書目名稱Information Hiding被引頻次學科排名
書目名稱Information Hiding年度引用
書目名稱Information Hiding年度引用學科排名
書目名稱Information Hiding讀者反饋
書目名稱Information Hiding讀者反饋學科排名
作者: 王得到 時間: 2025-3-21 22:57
Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithmrobability of false positive is controlled thanks to a rare event estimator. We describe a fast implementation supporting millions of users and compare our results with two recent fingerprinting codes.作者: 欺騙世家 時間: 2025-3-22 03:04
An Asymmetric Fingerprinting Scheme Based on Tardos Codeshat is only known to the Provider. This knowledge allows an untrustworthy Provider to attack traditional asymmetric fingerprinting protocols. We describe this attack, and then propose a new asymmetric fingerprinting protocol, specifically designed for Tardos codes.作者: 青少年 時間: 2025-3-22 07:31
Anonymity Attacks on Mix Systems: A Formal Analysisation, KLSD, and Min-entropy) which revealed interesting findings about some mix variants. This paper tries to bridge the gap between theory and practice in the field of anonymous communication systems.作者: MAIZE 時間: 2025-3-22 12:10 作者: 講個故事逗他 時間: 2025-3-22 15:33 作者: Contort 時間: 2025-3-22 19:58
Conference proceedings 2011 in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest..作者: 男學院 時間: 2025-3-22 22:46
Asymptotic Fingerprinting Capacity for Non-binary Alphabets 2ln .). Our proof technique does not reveal the optimal attack or bias distribution. The fact that the capacity is an increasing function of . shows that there is a real gain in going to non-binary alphabets.作者: Consensus 時間: 2025-3-23 03:58 作者: V切開 時間: 2025-3-23 07:10 作者: 無可非議 時間: 2025-3-23 12:16 作者: vascular 時間: 2025-3-23 17:46 作者: 出血 時間: 2025-3-23 20:38 作者: 溝通 時間: 2025-3-23 22:31 作者: Morose 時間: 2025-3-24 02:33 作者: CRAMP 時間: 2025-3-24 08:44 作者: 才能 時間: 2025-3-24 11:34
Differentially Private Billing with Rebatesvacy framework. Second, we propose a cryptographic protocol for oblivious billing that ensures any additional expenditure, aimed at protecting privacy, can be tracked and reclaimed in the future, thus minimising its cost. Our proposals can be used together or separately and are backed by provable guarantees of security.作者: saphenous-vein 時間: 2025-3-24 14:49 作者: carbohydrate 時間: 2025-3-24 22:51
Jessica Fridrich,Jan Kodovsky,Vojtěch Holub,Miroslav Goljan作者: 五行打油詩 時間: 2025-3-25 02:14 作者: micronized 時間: 2025-3-25 03:59 作者: 為敵 時間: 2025-3-25 11:07
Rémi Cogranne,Cathel Zitzmann,Lionel Fillatre,Florent Retraint,Igor Nikiforov,Philippe Cornu作者: Insubordinate 時間: 2025-3-25 15:25
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Mffine portions parametrized by a new embedding parameter . used to maximize the robusness of Soft-SCS. As a consequence, the achievable rates of Soft-SCS for low . regimes for both its secure and robust implementations are higher than for SCS. Our conclusions are that (1) the loss of performance bet作者: 貿易 時間: 2025-3-25 17:38 作者: Pseudoephedrine 時間: 2025-3-25 22:31 作者: 榨取 時間: 2025-3-26 02:27
Patrick Basmatik noch sehr begrenzt ist. So gibt es zwar allgemeine Erkenntnisse aus der Kommunikationswissenschaft, die jedoch nicht immer auf das spezifische Untersuchungsanliegen innerhalb des Führungsprozesses zugeschnitten sind. Recht schwach ist die empirische Fundierung im gekennzeichneten Untersuchungskontext. S978-3-8349-1768-3978-3-8349-8273-5作者: 使乳化 時間: 2025-3-26 07:11 作者: 共和國 時間: 2025-3-26 11:33 作者: idiopathic 時間: 2025-3-26 16:40
Weiming Zhang,Biao Chen,Nenghai Yurner initiieren Organisationen wie Verb?nde (z.?B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z.?B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: 愚笨 時間: 2025-3-26 16:59 作者: mettlesome 時間: 2025-3-26 21:14 作者: 膝蓋 時間: 2025-3-27 01:28
Patrick Basührungskraft geh?rt. Es wird gesch?tzt, dass 60 bis 80% der Aktivit?ten von Führungspersonen der Kommunikation zuzuordnen sind. In Folge der neuen technologischen Entwicklungen stehen den Managern bedeutende M?gli- keiten zur Intensivierung und Ausdehnung ihrer Kommunikationsprozesse zur Verfügung. 作者: indignant 時間: 2025-3-27 09:03
Michael Arnold,Xiao-Ming Chen,Peter G. Baum,Gwena?l Do?rr, die als eigenst?ndige Bereiche r?umlich au?erhalb von Konzernzentralen und Firmenniederlassungen etabliert worden sind. In dieser ersten Gruppe von Beispielen der Unternehmen Xerox, Google/Alphabet, Cisco Systems, BASF, Merck, Ikea, Procter & Gamble und SAP überwiegen die gestaltenden Think Tanks,作者: Brocas-Area 時間: 2025-3-27 12:36
Jutta H?mmerle-Uhl,Karl Raab,Andreas Uhl, die als eigenst?ndige Bereiche r?umlich au?erhalb von Konzernzentralen und Firmenniederlassungen etabliert worden sind. In dieser ersten Gruppe von Beispielen der Unternehmen Xerox, Google/Alphabet, Cisco Systems, BASF, Merck, Ikea, Procter & Gamble und SAP überwiegen die gestaltenden Think Tanks,作者: cravat 時間: 2025-3-27 16:00
Weiming Zhang,Biao Chen,Nenghai Yu, die als eigenst?ndige Bereiche r?umlich au?erhalb von Konzernzentralen und Firmenniederlassungen etabliert worden sind. In dieser ersten Gruppe von Beispielen der Unternehmen Xerox, Google/Alphabet, Cisco Systems, BASF, Merck, Ikea, Procter & Gamble und SAP überwiegen die gestaltenden Think Tanks,作者: 改良 時間: 2025-3-27 20:50
Sebastian Schrittwieser,Stefan Katzenbeisser, die als eigenst?ndige Bereiche r?umlich au?erhalb von Konzernzentralen und Firmenniederlassungen etabliert worden sind. In dieser ersten Gruppe von Beispielen der Unternehmen Xerox, Google/Alphabet, Cisco Systems, BASF, Merck, Ikea, Procter & Gamble und SAP überwiegen die gestaltenden Think Tanks,作者: HEED 時間: 2025-3-28 01:33
Asymptotic Fingerprinting Capacity for Non-binary Alphabetse binary case was found by Huang and Moulin. They showed that asymptotically, the capacity is 1/(.. 2ln 2), the interleaving attack is optimal and the arcsine distribution is the optimal bias distribution..In this paper we prove that the asymptotic capacity for general alphabet size . is (.???1)/(..作者: 圓錐體 時間: 2025-3-28 03:09 作者: GLEAN 時間: 2025-3-28 06:31
Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithmcoding. The first key idea is to iteratively prune the list of potential colluders to keep the computational effort tractable while going from single, to pair,…to .-subset joint decoding. At the same time, we include users accused in previous iterations as side-information to build a more discrimina作者: 先行 時間: 2025-3-28 12:07 作者: 顯示 時間: 2025-3-28 15:48 作者: chassis 時間: 2025-3-28 21:55 作者: 無能力之人 時間: 2025-3-29 00:54
Breaking HUGO – The Process Discoverybreaking HUGO – one of the most advanced steganographic systems ever published. We believe that researchers working in steganalysis of digital media and related fields will find it interesting, inspiring, and perhaps even entertaining to read about the details of our journey, including the dead ends作者: 松緊帶 時間: 2025-3-29 03:10
Steganalysis of Content-Adaptive Steganography in Spatial Domains. When combined with advanced coding techniques, adaptive steganographic methods can embed rather large payloads with low statistical detectability at least when measured using feature-based steganalyzers trained on a given cover source. The recently proposed steganographic algorithm HUGO is an exa作者: Exonerate 時間: 2025-3-29 08:05 作者: 一再煩擾 時間: 2025-3-29 11:35 作者: Inflated 時間: 2025-3-29 17:59 作者: Optic-Disk 時間: 2025-3-29 23:22
Video Steganography with Perturbed Motion Estimationmed domain of images or raw videos which are vulnerable to certain existing steganalyzers, our approach targets the internal dynamics of video compression. Inspired by Fridrich et al’s perturbed quantization (PQ) steganography, a technique called perturbed motion estimation (PME) is introduced to pe作者: Ceremony 時間: 2025-3-30 03:14
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Me AWGN channel. After recalling the principle of SCS we highlight its secure implementations regarding the Watermarked contents Only Attack, and we also describe the relations between the alphabet size and the secure embedding parameters. Since the gap between the achievable rates of secure-SCS and 作者: 依法逮捕 時間: 2025-3-30 04:21
Improving Tonality Measures for Audio Watermarking of the ear. The performances of such models in audio watermarking applications are tightly related to the determination of tonal and noise-like components. In this paper, we present an improved tonality estimation and its integration into a psychoacoustic model. Instead of conventional binary class作者: ineluctable 時間: 2025-3-30 10:24
Capacity-Approaching Codes for Reversible Data Hiding rate-distortion model for reversible data hiding, in which they proved the capacity bound and proposed a recursive code construction. In this paper we improve the recursive construction by designing a data embedding method for all-zero covers and a more efficient compression algorithm. We prove tha作者: Melanocytes 時間: 2025-3-30 12:33
Code Obfuscation against Static and Dynamic Reverse Engineering. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today’s obfuscation methods are targeted against static reverse engineering, where the attacker analyzes the code without actually executing it, they are still insecure against dynami作者: opportune 時間: 2025-3-30 17:41 作者: conjunctivitis 時間: 2025-3-30 22:17 作者: CHYME 時間: 2025-3-31 04:50 作者: 高度表 時間: 2025-3-31 08:31
978-3-642-24177-2Springer-Verlag GmbH Berlin Heidelberg 2011作者: 單調性 時間: 2025-3-31 12:45
Information Hiding978-3-642-24178-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: outrage 時間: 2025-3-31 14:23
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codesion steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on sufficient code lengths for this attack, and explain the abrupt transitions that occur in these results.作者: enlist 時間: 2025-3-31 18:27 作者: HAWK 時間: 2025-3-31 22:01 作者: 小丑 時間: 2025-4-1 01:53 作者: Musket 時間: 2025-4-1 07:15
Conference proceedings 2013ion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.