|
|
|
|
LEADER |
03823nam a2200649 4500 |
001 |
978-3-030-11389-6 |
003 |
DE-He213 |
005 |
20191220130846.0 |
007 |
cr nn 008mamaa |
008 |
190123s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030113896
|9 978-3-030-11389-6
|
024 |
7 |
|
|a 10.1007/978-3-030-11389-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Digital Forensics and Watermarking
|h [electronic resource] :
|b 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings /
|c edited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XI, 392 p. 167 illus., 101 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11378
|
505 |
0 |
|
|a Deep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018. The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. .
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Crime.
|0 http://scigraph.springernature.com/things/product-market-codes/I28070
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|0 http://scigraph.springernature.com/things/product-market-codes/I22021
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
700 |
1 |
|
|a Yoo, Chang D.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shi, Yun-Qing.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kim, Hyoung Joong.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Piva, Alessandro.
|e editor.
|0 (orcid)0000-0002-3047-0519
|1 https://orcid.org/0000-0002-3047-0519
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kim, Gwangsu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030113889
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030113902
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11378
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-11389-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|