Sciweavers

IH
2004
Springer
13 years 10 months ago
Exploiting Preserved Statistics for Steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Rainer Böhme, Andreas Westfeld
IH
2004
Springer
13 years 10 months ago
Reversing Global and Local Geometrical Distortions in Image Watermarking
A new method improving watermark robustness against both global and local geometrical distortions is presented in this article. The proposed approach is based on a self-reference c...
Dariusz Bogumil
IH
2004
Springer
13 years 10 months ago
The Hitting Set Attack on Anonymity Protocols
Dogan Kesdogan, Lexi Pimenidis
IH
2004
Springer
13 years 10 months ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
IH
2004
Springer
13 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
IH
2004
Springer
13 years 10 months ago
Covert Channels for Collusion in Online Computer Games
Steven J. Murdoch, Piotr Zielinski