TY - BOOK AU - Qadeer,Shaz AU - Tasiran,Serdar TI - Runtime Verification: Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers SN - 9783642356322 PY - 2013/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer programming KW - Software engineering KW - Programming languages (Electronic computers) KW - Algorithms KW - Computer logic KW - Mathematical logic N1 - Multimedia Forensics and Counter-Forensics -- Blind Median Filtering Detection Using Statistics in Difference Domain -- Robustness of Color Interpolation Identification against Anti-forensic Operations -- Steganalysis -- Steganalysis of LSB Replacement Using Parity-Aware Features -- Statistical Detection of LSB Matching Using Hypothesis Testing Theory -- Textural Features for Steganalysis -- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts -- Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface -- Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data -- Steganography A Game-Theoretic Approach to Content-Adaptive Steganography -- Key-Efficient Steganography -- Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations -- Anonymity and Privacy Lower Bounds for Private Broadcast Encryption -- The Dangers of Composing Anonymous Channels -- Watermarking A New Measure of Watermarking Security Applied on QIM -- Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking -- Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking -- Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model -- Bias Equalizer for Binary Probabilistic Fingerprinting Codes UR - http://dx.doi.org/10.1007/978-3-642-35632-2 ER -