Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best (Englisch)
Nationallizenz
- Neue Suche nach: Franz, Elke
- Neue Suche nach: Jerichow, Anja
- Neue Suche nach: Möller, Steffen
- Neue Suche nach: Pfitzmann, Andreas
- Neue Suche nach: Stierand, Ingo
- Neue Suche nach: Franz, Elke
- Neue Suche nach: Jerichow, Anja
- Neue Suche nach: Möller, Steffen
- Neue Suche nach: Pfitzmann, Andreas
- Neue Suche nach: Stierand, Ingo
In:
Information Hiding
;
7-21
;
1996
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
-
Beteiligte:Franz, Elke ( Autor:in ) / Jerichow, Anja ( Autor:in ) / Möller, Steffen ( Autor:in ) / Pfitzmann, Andreas ( Autor:in ) / Stierand, Ingo ( Autor:in )
-
Erschienen in:Information Hiding ; 7-21Lecture Notes in Computer Science ; 1174 ; 7-21
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.1996
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The history of steganographyKahn, David et al. | 1996
- 7
-
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at bestFranz, Elke / Jerichow, Anja / Möller, Steffen / Pfitzmann, Andreas / Stierand, Ingo et al. | 1996
- 23
-
Hiding data in the OSI network modelHandel, Theodore G. / Sandford, Maxwell T. II et al. | 1996
- 39
-
Stretching the limits of steganographyAnderson, Ross et al. | 1996
- 49
-
Trials of traced traitorsPfitzmann, Birgit et al. | 1996
- 65
-
Establishing big brother using covert channels and other covert techniquesDesmedt, Yvo et al. | 1996
- 73
-
Covert channels—A context-based viewMeadows, Catherine / Moskowitz, Ira S. et al. | 1996
- 95
-
Covert channel analysis for StubsAnderson, Mark S. / Ozols, Maris A. et al. | 1996
- 115
-
Anonymous addresses and confidentiality of locationJackson, Ian W. et al. | 1996
- 121
-
MIXes in mobile communication systems: Location management with privacyFederrath, Hannes / Jerichow, Anja / Pfitzmann, Andreas et al. | 1996
- 137
-
Hiding Routing informationGoldschlag, David M. / Reed, Michael G. / Syverson, Paul F. et al. | 1996
- 151
-
The Newton channelAnderson, Ross / Vaudenay, Serge / Preneel, Bart / Nyberg, Kaisa et al. | 1996
- 157
-
A progress report on subliminal-free channelsBurmester, Mike / Desmedt, Yvo G. / Itoh, Toshiya / Sakurai, Kouichi / Shizuya, Hiroki / Yung, Moti et al. | 1996
- 169
-
Modeling cryptographic protocols and their collusion analysisLow, Steven H. / Maxemchuk, Nicholas F. et al. | 1996
- 185
-
A secure, robust watermark for multimediaCox, Ingemar J. / Kilian, Joe / Leighton, Tom / Shamoon, Talal et al. | 1996
- 207
-
Modulation and information hiding in imagesSmith, Joshua R. / Comiskey, Barrett O. et al. | 1996
- 227
-
Watermarking document images with bounding box expansionBrassil, Jack / O'Gorman, Larry et al. | 1996
- 237
-
The history of subliminal channelsSimmons, Gustavus J. et al. | 1996
- 257
-
Blind decoding, blind undeniable signatures, and their applications to privacy protectionSakurai, Kouichi / Yamane, Yoshinori et al. | 1996
- 265
-
Practical invisibility in digital communicationAura, Tuomas et al. | 1996
- 279
-
Fractal based image steganographyDavern, Paul / Dr. Scott, Michael et al. | 1996
- 295
-
Echo hidingGruhl, Daniel / Lu, Anthony / Bender, Walter et al. | 1996
- 317
-
Tamper resistant software: an implementationAucsmith, David et al. | 1996
- 335
-
Oblivious key escrowBlaze, Matt et al. | 1996
- 345
-
HMOS: Her Majesty's Orthography ServiceSir Bentbyte, Norman et al. | 1996
- 347
-
Information hiding terminology| 1996