Narrow your search

Library

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

ULiège (5)

VIVES (5)

AP (2)

EhB (2)

More...

Resource type

book (8)

digital (2)


Language

English (10)


Year
From To Submit

2018 (1)

2015 (1)

2014 (2)

2013 (2)

2010 (4)

Listing 1 - 10 of 10
Sort by

Book
Advanced statistical steganalysis
Author:
ISBN: 3642143121 364214313X Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.

Keywords

Computer networks -- Security measures. --- Cryptography. --- Data encryption (Computer science). --- Cryptography --- Digital watermarking --- Data encryption (Computer science) --- Book Studies & Arts --- Applied Physics --- Engineering & Applied Sciences --- Education --- Social Sciences --- Statistical methods --- Statistical methods. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer science. --- Image processing. --- Application software. --- Computer Science. --- Computer Applications. --- Data Encryption. --- Signal, Image and Speech Processing. --- Image Processing and Computer Vision. --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Informatics --- Science --- Signal processing. --- Speech processing systems. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Optical equipment


Book
The economics of information security and privacy
Author:
ISBN: 3642394973 3642394981 Year: 2013 Publisher: Heidelberg [Germany] : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.


Digital
The Economics of Information Security and Privacy
Author:
ISBN: 9783642394980 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.


Book
Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
Authors: ---
ISBN: 9783662478547 3662478536 9783662478530 3662478544 Year: 2015 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.

Keywords

Computer Science. --- Data Encryption. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer Appl. in Administrative Data Processing. --- Computer Communication Networks. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Computer Science --- Engineering & Applied Sciences --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Application software. --- E-commerce. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Advanced Statistical Steganalysis
Authors: ---
ISBN: 9783642143137 9783642264504 9783642143120 9783642143144 9783662598474 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.


Book
Financial Cryptography and Data Security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
Authors: --- --- ---
ISBN: 3662447738 3662447746 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.


Book
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
Authors: ---
ISBN: 1450356257 Year: 2018 Publisher: New York NY ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Financial Cryptography and Data Security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
Authors: --- --- ---
ISBN: 9783662447741 Year: 2014 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.


Book
Information hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, revised selected papers
Authors: --- --- ---
ISBN: 364216434X 3642164358 9786613567833 1280389915 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28–30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This conference series aims to bring together a number of closely related research areas, including digital watermarking, steganography and s- ganalysis, anonymity and privacy, covert and subliminal channels, ?ngerpri- ing and embedding codes, multimedia forensics and counter-forensics, as well as theoretical aspects of information hiding and detection. Since its inception, the conference series has been a premier forum for publishing research in these areas. This volume contains the revised versions of 18 accepted papers (incor- rating the comments from members of the Program Committee), and extended abstracts of two (out of three) invited talks. The conference received 39 anonymous submissions for full papers. The task of selecting 18 of them for presentation was not easy. Each submission was reviewed by at least three members of the Program Committee or external - viewers reporting to a member of the Program Committee. In the case of - authorship by a Program Committee member, ?ve reviews were sought. There is no need to say that no member of the Program Committee reviewed his or her own work. Each paper was carefully discussed until consensus was reached.

Keywords

Computer security --- Data protection --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer programming. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Multimedia information systems. --- Image processing. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Programming Techniques. --- Multimedia Information Systems. --- Discrete Mathematics in Computer Science. --- Image Processing and Computer Vision. --- Mathematics. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Mathematics --- Foundations --- Programming --- Computer software. --- Multimedia systems. --- Computational complexity. --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment --- Calgary <2010>


Book
Information Hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers
Authors: --- --- ---
ISBN: 9783642164354 9783642164347 9783642164361 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28-30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This conference series aims to bring together a number of closely related research areas, including digital watermarking, steganography and s- ganalysis, anonymity and privacy, covert and subliminal channels, ?ngerpri- ing and embedding codes, multimedia forensics and counter-forensics, as well as theoretical aspects of information hiding and detection. Since its inception, the conference series has been a premier forum for publishing research in these areas. This volume contains the revised versions of 18 accepted papers (incor- rating the comments from members of the Program Committee), and extended abstracts of two (out of three) invited talks. The conference received 39 anonymous submissions for full papers. The task of selecting 18 of them for presentation was not easy. Each submission was reviewed by at least three members of the Program Committee or external - viewers reporting to a member of the Program Committee. In the case of - authorship by a Program Committee member, ?ve reviews were sought. There is no need to say that no member of the Program Committee reviewed his or her own work. Each paper was carefully discussed until consensus was reached.

Listing 1 - 10 of 10
Sort by