↓ Skip to main content

Information Hiding

Overview of attention for book
Cover of 'Information Hiding'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Asymptotic Fingerprinting Capacity for Non-binary Alphabets
  3. Altmetric Badge
    Chapter 2 Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes
  4. Altmetric Badge
    Chapter 3 Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithm
  5. Altmetric Badge
    Chapter 4 An Asymmetric Fingerprinting Scheme Based on Tardos Codes
  6. Altmetric Badge
    Chapter 5 ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS
  7. Altmetric Badge
    Chapter 6 A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)
  8. Altmetric Badge
    Chapter 7 Breaking HUGO – The Process Discovery
  9. Altmetric Badge
    Chapter 8 Steganalysis of Content-Adaptive Steganography in Spatial Domain
  10. Altmetric Badge
    Chapter 9 I Have a DREAM! (DiffeRentially privatE smArt Metering)
  11. Altmetric Badge
    Chapter 10 Anonymity Attacks on Mix Systems: A Formal Analysis
  12. Altmetric Badge
    Chapter 11 Differentially Private Billing with Rebates
  13. Altmetric Badge
    Chapter 12 Statistical Decision Methods in Hidden Information Detection
  14. Altmetric Badge
    Chapter 13 A Cover Image Model For Reliable Steganalysis
  15. Altmetric Badge
    Chapter 14 Video Steganography with Perturbed Motion Estimation
  16. Altmetric Badge
    Chapter 15 Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching
  17. Altmetric Badge
    Chapter 16 Improving Tonality Measures for Audio Watermarking
  18. Altmetric Badge
    Chapter 17 Watermarking as a Means to Enhance Biometric Systems: A Critical Survey
  19. Altmetric Badge
    Chapter 18 Capacity-Approaching Codes for Reversible Data Hiding
  20. Altmetric Badge
    Chapter 19 Code Obfuscation against Static and Dynamic Reverse Engineering
  21. Altmetric Badge
    Chapter 20 Countering Counter-Forensics: The Case of JPEG Compression
  22. Altmetric Badge
    Chapter 21 Stegobot: A Covert Social Network Botnet
  23. Altmetric Badge
    Chapter 22 CoCo: Coding-Based Covert Timing Channels for Network Flows
  24. Altmetric Badge
    Chapter 23 LinL:Lost in n-best List
Attention for Chapter 10: Anonymity Attacks on Mix Systems: A Formal Analysis
Altmetric Badge

Citations

dimensions_citation
29 Dimensions

Readers on

mendeley
10 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Anonymity Attacks on Mix Systems: A Formal Analysis
Chapter number 10
Book title
Information Hiding
Published by
Springer, Berlin, Heidelberg, May 2011
DOI 10.1007/978-3-642-24178-9_10
Book ISBNs
978-3-64-224177-2, 978-3-64-224178-9
Authors

Sami Zhioua, Zhioua, Sami

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 10 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 10 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 40%
Researcher 3 30%
Student > Bachelor 1 10%
Student > Master 1 10%
Other 1 10%
Other 0 0%
Readers by discipline Count As %
Computer Science 8 80%
Engineering 2 20%