Information Hiding

Information Hiding

4.11 - 1251 ratings - Source

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.Process of sending a one-hop message One-hop communication takes place according to a push-pull model. ... When a user pushes (uploads) an image to Facebook from an infected host, the bot intercepts the image and inserts the botcargo ... In theory, blocking access to Online Social Networks (OSNs) will stop Stegobot.

Title:Information Hiding
Author:Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker
Publisher:Springer - 2011-09-15


You Must CONTINUE and create a free account to access unlimited downloads & streaming