共同时代 发表于 2025-3-30 08:56:49

An Implementation of Key-Based Digital Signal Steganography,gnals for steganography are explored. The terms . and . are defined. Possible attacks are considered in detail from passive wardens and methods of defeating such attacks are suggested. Software implementing the new ideas is introduced, which has been successfully developed, deployed and used for several years without detection.

角斗士 发表于 2025-3-30 12:45:33

COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks,alization of video streams that preserve copyrights and scale well to a large number of users would allow deployment of new services. In this paper we present a new scalable model for video stream broadcasting over open networks that preserves and enforces copyright protection.

橡子 发表于 2025-3-30 18:34:39

The Strong Eternity Service,sent a way how to retrieve information from such data storage. We adapt the notion of the mix-network so that it can provide symmetric anonymity to both the client and the server. Finally we propose a system of after-the-act payments that can support operation of the Service without compromising anonymity.

Frenetic 发表于 2025-3-30 21:17:42

http://reply.papertrans.cn/47/4651/465063/465063_54.png

tendinitis 发表于 2025-3-31 02:34:20

http://reply.papertrans.cn/47/4651/465063/465063_55.png

Intellectual 发表于 2025-3-31 08:19:35

0302-9743 Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001..The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image an

阴险 发表于 2025-3-31 09:27:33

Computational Forensic Techniques for Intellectual Property Protection,ics data collection, feature extraction, entity clustering, and validation. In addition to IP protection, the developed CFE paradigm can have other potential applications: optimization algorithm selection and tuning, benchmark selection, and source-verification for mobile code.

annexation 发表于 2025-3-31 14:46:12

http://reply.papertrans.cn/47/4651/465063/465063_58.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Hiding; 4th International Wo Ira S. Moskowitz Conference proceedings 2001 Springer-Verlag Berlin Heidelberg 2001 Information hi