Advanced Statistical Steganalysis (Record no. 112449)

000 -LEADER
fixed length control field 03695nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-3-642-14313-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220084542.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100806s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642143137
-- 978-3-642-14313-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-14313-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA1637-1638
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA1637-1638
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYT
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQV
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM012000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM016000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.6
Edition number 23
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.37
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Böhme, Rainer.
Relator term author.
245 10 - TITLE STATEMENT
Title Advanced Statistical Steganalysis
Medium [electronic resource] /
Statement of responsibility, etc by Rainer Böhme.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 288 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Information Security and Cryptography,
International Standard Serial Number 1619-7100 ;
Volume number/sequential designation 0
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Background and Advances in Theory -- Principles of Modern Steganography and Steganalysis -- Towards a Theory of Cover Models -- Specific Advances in Steganalysis -- Detection of Model-Based Steganography with First-Order Statistics -- Models of Heterogeneous Covers for Quantitative Steganalysis -- Improved Weighted Stego Image Steganalysis -- Using Encoder Artefacts for Steganalysis of Compressed Audio Streams -- Synthesis -- General Discussion.
520 ## - SUMMARY, ETC.
Summary, etc Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer vision.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Image Processing and Computer Vision.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Signal, Image and Speech Processing.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642143120
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information Security and Cryptography,
-- 1619-7100 ;
Volume number/sequential designation 0
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-14313-7
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue