What people are saying - Write a review
We haven't found any reviews in the usual places.
Trustworthy Paper Documents
DistortionFree Data Embedding for Images
Information Hiding through Noisy Channels
21 other sections not shown
Other editions - View all
adversary algorithm Alice analysis anonymity applications approach attacks audio clip bit-plane bits c-secure code c-secure CRT code capacity channel client coefficients color compression Computer Science constraints copy correlation covert channel cryptographic database decoding decrypt detector digital watermarking distribution document embed encoding encryption error Error-Correcting Codes example fingerprinting forensic engineering frequency function graph graph coloring hash HushMail IEEE implementation Information Hiding input LNCS mark method MIX-net node noise Notes in Computer Onion Routing original parameters Pfitzmann pixels private message service probability problem properties proposed protocol pseudonym public key public watermark quantization random reputation system robust sample secret key segments server signal solution spread-spectrum Springer-Verlag statistics steganographic stego stream structure theoretical traffic analysis transformations variables vector watermark detection watermark message watermarking scheme watermarking techniques zero-knowledge zero-knowledge proof