Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008602654/catalog> ?p ?o. }
Showing items 1 to 28 of
28
with 100 items per page.
- catalog abstract ""Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents important research contributions in three fundamental areas: investigation of data hiding and labeling techniques (steganography and watermarking), attacks against steganography and watermarked information, and countermeasures to such attacks. With the proliferation of multimedia and concerns of privacy on the Internet, such research has become even more pressing. Information is collected by numerous organizations and the nature of digital media allows for the exact duplication of material with no notification that the material has been copied. The more information placed in the public's reach on the Internet, the more owners of such information need to protect themselves from unwanted surveillance, theft, and false representation and reproduction. Systems to analyze techniques for uncovering hidden information and recovering seemingly destroyed information are thus of great importance to many groups, including law enforcement authorities in computer forensics and digital traffic analysis." "Techniques for hiding information have existed for centuries. Methods include communication via invisible inks, microdots, covert channels, and spread spectrum channels. The techniques explored by the authors involved embedding information within digital media, specifically digital images. The authors analyze the limitations of these digital methods, which can in turn be used to devise attacks. The goal of these attacks is to expose the existence of a secret message or to render a digital watermark unusable. Finally, in assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of these methods will allow the construction of more robust methods that can better survive manipulations and attacks." "Information Hiding: Steganography and Watermarking - Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry."--Jacket.".
- catalog contributor b12042981.
- catalog contributor b12042982.
- catalog contributor b12042983.
- catalog created "c2001.".
- catalog date "2001".
- catalog date "c2001.".
- catalog dateCopyrighted "c2001.".
- catalog description ""Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents important research contributions in three fundamental areas: investigation of data hiding and labeling techniques (steganography and watermarking), attacks against steganography and watermarked information, and countermeasures to such attacks. With the proliferation of multimedia and concerns of privacy on the Internet, such research has become even more pressing. Information is collected by numerous organizations and the nature of digital media allows for the exact duplication of material with no notification that the material has been copied.".
- catalog description ""Techniques for hiding information have existed for centuries. Methods include communication via invisible inks, microdots, covert channels, and spread spectrum channels. The techniques explored by the authors involved embedding information within digital media, specifically digital images. The authors analyze the limitations of these digital methods, which can in turn be used to devise attacks. The goal of these attacks is to expose the existence of a secret message or to render a digital watermark unusable. Finally, in assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.".
- catalog description "Includes bibliographical references (p. [123]-127) and index.".
- catalog description "Steganography: Hiding Information -- Steganography throughout History -- Methods for Hiding Information -- Hiding in Text -- Hiding in Disk Space -- Hiding in Network Packets -- Hiding in Software and Circuitry -- Hiding in Audio and Images -- Attacks against Hidden Information -- Detection -- Distortion and Removal -- Countermeasures Against Attacks -- Contributions and Future Work -- Organization of the Book -- Exploring Steganography -- Digital Images -- Hiding Information in Images -- Hiding Data in the Noise -- Watermarking Techniques -- Issues in Information Hiding -- Level of Visibility: Perceptible or Imperceptible -- Robustness vs. Payload -- Spatial or transform domain -- File Format Dependence -- Image Modeling -- Summary of Hiding Techniques -- Examples of Digital Image Steganography Software -- StegoDos -- White Noise Storm -- S-Tools -- Comments on Other Software -- Summary of Tools -- Comments on Steganography -- Steganalysis: Attacks Against Hidden Data -- Detection: Seeing the Unseen -- Techniques for Detecting Hidden Information -- Examples of Detecting Signatures in Stego-Images -- S-Tools -- Mandelsteg -- Hide and Seek -- Hide4PGP -- EzStego, Stego On-line -- Jsteg-Jpeg -- Distortion: Disabling Steganography and Watermarks -- Techniques for Distorting Embedded Data -- Examples of Distorting Embedded Information -- Application of Steganalysis: Forensic Investigation -- Comments on Steganalysis -- Countermeasures to Attacks -- Countermeasures to Distortion -- Stronger Watermarks.".
- catalog description "The more information placed in the public's reach on the Internet, the more owners of such information need to protect themselves from unwanted surveillance, theft, and false representation and reproduction. Systems to analyze techniques for uncovering hidden information and recovering seemingly destroyed information are thus of great importance to many groups, including law enforcement authorities in computer forensics and digital traffic analysis."".
- catalog description "Understanding the limitations of these methods will allow the construction of more robust methods that can better survive manipulations and attacks." "Information Hiding: Steganography and Watermarking - Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry."--Jacket.".
- catalog extent "xx, 137 p. :".
- catalog identifier "0792372042 (alk. paper)".
- catalog isPartOf "Advances in information security ; 1".
- catalog issued "2001".
- catalog issued "c2001.".
- catalog language "eng".
- catalog publisher "Boston : Kluwer Academic,".
- catalog subject "005.8 21".
- catalog subject "Computer security.".
- catalog subject "Data protection.".
- catalog subject "QA76.9.A25 J25 2001".
- catalog tableOfContents "Steganography: Hiding Information -- Steganography throughout History -- Methods for Hiding Information -- Hiding in Text -- Hiding in Disk Space -- Hiding in Network Packets -- Hiding in Software and Circuitry -- Hiding in Audio and Images -- Attacks against Hidden Information -- Detection -- Distortion and Removal -- Countermeasures Against Attacks -- Contributions and Future Work -- Organization of the Book -- Exploring Steganography -- Digital Images -- Hiding Information in Images -- Hiding Data in the Noise -- Watermarking Techniques -- Issues in Information Hiding -- Level of Visibility: Perceptible or Imperceptible -- Robustness vs. Payload -- Spatial or transform domain -- File Format Dependence -- Image Modeling -- Summary of Hiding Techniques -- Examples of Digital Image Steganography Software -- StegoDos -- White Noise Storm -- S-Tools -- Comments on Other Software -- Summary of Tools -- Comments on Steganography -- Steganalysis: Attacks Against Hidden Data -- Detection: Seeing the Unseen -- Techniques for Detecting Hidden Information -- Examples of Detecting Signatures in Stego-Images -- S-Tools -- Mandelsteg -- Hide and Seek -- Hide4PGP -- EzStego, Stego On-line -- Jsteg-Jpeg -- Distortion: Disabling Steganography and Watermarks -- Techniques for Distorting Embedded Data -- Examples of Distorting Embedded Information -- Application of Steganalysis: Forensic Investigation -- Comments on Steganalysis -- Countermeasures to Attacks -- Countermeasures to Distortion -- Stronger Watermarks.".
- catalog title "Information hiding : steganography and watermarking : attacks and countermeasures / by Neil F. Johnson, Zoran Duric, Sushil Jajodia.".
- catalog type "text".