| 000 | 03695nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-14313-7 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084542.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100806s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642143137 _9978-3-642-14313-7 |
||
| 024 | 7 |
_a10.1007/978-3-642-14313-7 _2doi |
|
| 050 | 4 | _aTA1637-1638 | |
| 050 | 4 | _aTA1637-1638 | |
| 072 | 7 |
_aUYT _2bicssc |
|
| 072 | 7 |
_aUYQV _2bicssc |
|
| 072 | 7 |
_aCOM012000 _2bisacsh |
|
| 072 | 7 |
_aCOM016000 _2bisacsh |
|
| 082 | 0 | 4 |
_a006.6 _223 |
| 082 | 0 | 4 |
_a006.37 _223 |
| 100 | 1 |
_aBöhme, Rainer. _eauthor. |
|
| 245 | 1 | 0 |
_aAdvanced Statistical Steganalysis _h[electronic resource] / _cby Rainer Böhme. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXVI, 288 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aInformation Security and Cryptography, _x1619-7100 ; _v0 |
|
| 505 | 0 | _aBackground and Advances in Theory -- Principles of Modern Steganography and Steganalysis -- Towards a Theory of Cover Models -- Specific Advances in Steganalysis -- Detection of Model-Based Steganography with First-Order Statistics -- Models of Heterogeneous Covers for Quantitative Steganalysis -- Improved Weighted Stego Image Steganalysis -- Using Encoder Artefacts for Steganalysis of Compressed Audio Streams -- Synthesis -- General Discussion. | |
| 520 | _aSteganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer vision. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aImage Processing and Computer Vision. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aSignal, Image and Speech Processing. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642143120 |
| 830 | 0 |
_aInformation Security and Cryptography, _x1619-7100 ; _v0 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-14313-7 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c112449 _d112449 |
||