Transactions on Data Hiding and Multimedia Security III

This volume contains two papers dealing with digital watermarking and data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze th...

Full description

Saved in:
Bibliographic Details
Main Author: Shi, Yun Q.
Format: Book
Language:English
Published: Springer 2017
Subjects:
Online Access:http://repository.vnu.edu.vn/handle/VNU_123/28514
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Vietnam National University, Hanoi
Language: English
id oai:112.137.131.14:VNU_123-28514
record_format dspace
spelling oai:112.137.131.14:VNU_123-285142020-06-25T02:59:41Z Transactions on Data Hiding and Multimedia Security III Shi, Yun Q. Multimedia systems ; Data encryption (Computer science) 005.8 This volume contains two papers dealing with digital watermarking and data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze the performance of additive attacks against quantization-based data-hiding methods. 2017-04-14T03:16:23Z 2017-04-14T03:16:23Z 2008 Book http://repository.vnu.edu.vn/handle/VNU_123/28514 en 99 p. application/pdf Springer
institution Vietnam National University, Hanoi
building VNU Library & Information Center
country Vietnam
collection VNU Digital Repository
language English
topic Multimedia systems ; Data encryption (Computer science)
005.8
spellingShingle Multimedia systems ; Data encryption (Computer science)
005.8
Shi, Yun Q.
Transactions on Data Hiding and Multimedia Security III
description This volume contains two papers dealing with digital watermarking and data hiding. In the fourth paper, Venturini introduces and analyzes a new covert channel, called the timing channel, and proposes counter measures to reduce its capacity. Finally, in the fifth paper, Vila-Forcén et al. analyze the performance of additive attacks against quantization-based data-hiding methods.
format Book
author Shi, Yun Q.
author_facet Shi, Yun Q.
author_sort Shi, Yun Q.
title Transactions on Data Hiding and Multimedia Security III
title_short Transactions on Data Hiding and Multimedia Security III
title_full Transactions on Data Hiding and Multimedia Security III
title_fullStr Transactions on Data Hiding and Multimedia Security III
title_full_unstemmed Transactions on Data Hiding and Multimedia Security III
title_sort transactions on data hiding and multimedia security iii
publisher Springer
publishDate 2017
url http://repository.vnu.edu.vn/handle/VNU_123/28514
_version_ 1680966348146999296