Transactions on Data Hiding and Multimedia Security III
This volume contains two papers dealing with digital watermarking and data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze th...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Springer
2017
|
Subjects: | |
Online Access: | http://repository.vnu.edu.vn/handle/VNU_123/28514 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Vietnam National University, Hanoi |
Language: | English |
id |
oai:112.137.131.14:VNU_123-28514 |
---|---|
record_format |
dspace |
spelling |
oai:112.137.131.14:VNU_123-285142020-06-25T02:59:41Z Transactions on Data Hiding and Multimedia Security III Shi, Yun Q. Multimedia systems ; Data encryption (Computer science) 005.8 This volume contains two papers dealing with digital watermarking and data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze the performance of additive attacks against quantization-based data-hiding methods. 2017-04-14T03:16:23Z 2017-04-14T03:16:23Z 2008 Book http://repository.vnu.edu.vn/handle/VNU_123/28514 en 99 p. application/pdf Springer |
institution |
Vietnam National University, Hanoi |
building |
VNU Library & Information Center |
country |
Vietnam |
collection |
VNU Digital Repository |
language |
English |
topic |
Multimedia systems ; Data encryption (Computer science) 005.8 |
spellingShingle |
Multimedia systems ; Data encryption (Computer science) 005.8 Shi, Yun Q. Transactions on Data Hiding and Multimedia Security III |
description |
This volume contains two papers dealing with digital watermarking and
data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze the performance of additive attacks against quantization-based data-hiding methods. |
format |
Book |
author |
Shi, Yun Q. |
author_facet |
Shi, Yun Q. |
author_sort |
Shi, Yun Q. |
title |
Transactions on Data Hiding and Multimedia Security III |
title_short |
Transactions on Data Hiding and Multimedia Security III |
title_full |
Transactions on Data Hiding and Multimedia Security III |
title_fullStr |
Transactions on Data Hiding and Multimedia Security III |
title_full_unstemmed |
Transactions on Data Hiding and Multimedia Security III |
title_sort |
transactions on data hiding and multimedia security iii |
publisher |
Springer |
publishDate |
2017 |
url |
http://repository.vnu.edu.vn/handle/VNU_123/28514 |
_version_ |
1680966348146999296 |