Runtime Verification : Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Runtime Verification, RV 2012, held in Istanbul, Turkey, in September 2012.The 25 revised full papers presented together with 3 invited papers and 2 tutorials were carefully reviewed a...
Enregistré dans:
Auteurs principaux : | , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Runtime Verification : Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers / edited by Shaz Qadeer, Serdar Tasiran |
Édition : | 1st ed. 2013. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, [20..] Cham : Springer Nature |
Collection : | Programming and Software Engineering ; 7687 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : https://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Contenu : | Multimedia Forensics and Counter-Forensics. Blind Median Filtering Detection Using Statistics in Difference Domain. Robustness of Color Interpolation Identification against Anti-forensic Operations. Steganalysis. Steganalysis of LSB Replacement Using Parity-Aware Features. Statistical Detection of LSB Matching Using Hypothesis Testing Theory. Textural Features for Steganalysis. JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface. Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data. Steganography A Game-Theoretic Approach to Content-Adaptive Steganography. Key-Efficient Steganography. Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations. Anonymity and Privacy Lower Bounds for Private Broadcast Encryption. The Dangers of Composing Anonymous Channels. Watermarking A New Measure of Watermarking Security Applied on QIM. Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model. Bias Equalizer for Binary Probabilistic Fingerprinting Codes |
Sujets : | |
Documents associés : | Autre format:
Runtime Verification Autre format: Runtime Verification |