Runtime Verification Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers / [electronic resource] : edited by Shaz Qadeer, Serdar Tasiran. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. - 1 online resource (XII, 322 p. 93 ill.) - Lecture Notes in Computer Science, 7687 0302-9743 ; .

Multimedia Forensics and Counter-Forensics -- Blind Median Filtering Detection Using Statistics in Difference Domain -- Robustness of Color Interpolation Identification against Anti-forensic Operations -- Steganalysis -- Steganalysis of LSB Replacement Using Parity-Aware Features -- Statistical Detection of LSB Matching Using Hypothesis Testing Theory -- Textural Features for Steganalysis -- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts -- Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface -- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data -- Steganography A Game-Theoretic Approach to Content-Adaptive Steganography -- Key-Efficient Steganography -- Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations -- Anonymity and Privacy Lower Bounds for Private Broadcast Encryption -- The Dangers of Composing Anonymous Channels -- Watermarking A New Measure of Watermarking Security Applied on QIM -- Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking -- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking -- Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model -- Bias Equalizer for Binary Probabilistic Fingerprinting Codes.

9783642356322


Computer science.
Computer programming.
Software engineering.
Programming languages (Electronic computers).
Algorithms.
Computer logic.
Mathematical logic.