Runtime Verification : Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Runtime Verification, RV 2012, held in Istanbul, Turkey, in September 2012.The 25 revised full papers presented together with 3 invited papers and 2 tutorials were carefully reviewed a...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Qadeer Shaz (Directeur de publication), Tasiran Serdar (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Runtime Verification : Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers / edited by Shaz Qadeer, Serdar Tasiran
Édition : 1st ed. 2013.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , [20..]
Cham : Springer Nature
Collection : Programming and Software Engineering ; 7687
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : https://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Contenu : Multimedia Forensics and Counter-Forensics. Blind Median Filtering Detection Using Statistics in Difference Domain. Robustness of Color Interpolation Identification against Anti-forensic Operations. Steganalysis. Steganalysis of LSB Replacement Using Parity-Aware Features. Statistical Detection of LSB Matching Using Hypothesis Testing Theory. Textural Features for Steganalysis. JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface. Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data. Steganography A Game-Theoretic Approach to Content-Adaptive Steganography. Key-Efficient Steganography. Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations. Anonymity and Privacy Lower Bounds for Private Broadcast Encryption. The Dangers of Composing Anonymous Channels. Watermarking A New Measure of Watermarking Security Applied on QIM. Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model. Bias Equalizer for Binary Probabilistic Fingerprinting Codes
Sujets :
Documents associés : Autre format: Runtime Verification
Autre format: Runtime Verification
Chargement en cours