Runtime Verification Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers / edited by Shaz Qadeer, Serdar Tasiran.

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Runtime Verification, RV 2012, held in Istanbul, Turkey, in September 2012. The 25 revised full papers presented together with 3 invited papers and  2 tutorials were carefully reviewed...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Qadeer, Shaz (Editor), Tasiran, Serdar (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Series:Programming and Software Engineering ; 7687
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Multimedia Forensics and Counter-Forensics
  • Blind Median Filtering Detection Using Statistics in Difference Domain
  • Robustness of Color Interpolation Identification against Anti-forensic Operations
  • Steganalysis
  • Steganalysis of LSB Replacement Using Parity-Aware Features
  • Statistical Detection of LSB Matching Using Hypothesis Testing Theory
  • Textural Features for Steganalysis
  • JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts
  • Data Hiding in Unusual Content Hiding a Second Appearance in a Physical Relief Surface
  • Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data
  • Steganography A Game-Theoretic Approach to Content-Adaptive Steganography
  • Key-Efficient Steganography
  • Covert Channels Secret Agent Radio: Covert Communication through Dirty Constellations
  • Anonymity and Privacy Lower Bounds for Private Broadcast Encryption
  • The Dangers of Composing Anonymous Channels
  • Watermarking A New Measure of Watermarking Security Applied on QIM
  • Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking
  • Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking
  • Fingerprinting Asymptotic Fingerprinting Capacity in the Combined Digit Model
  • Bias Equalizer for Binary Probabilistic Fingerprinting Codes.