|
|
|
|
LEADER |
03224nam a22006015i 4500 |
001 |
978-3-319-64185-0 |
003 |
DE-He213 |
005 |
20170725113126.0 |
007 |
cr nn 008mamaa |
008 |
170725s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319641850
|9 978-3-319-64185-0
|
024 |
7 |
|
|a 10.1007/978-3-319-64185-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Digital Forensics and Watermarking
|h [electronic resource] :
|b 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /
|c edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XI, 422 p. 174 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10431
|
505 |
0 |
|
|a Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Image processing.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Kraetzer, Christian.
|e editor.
|
700 |
1 |
|
|a Shi, Yun-Qing.
|e editor.
|
700 |
1 |
|
|a Dittmann, Jana.
|e editor.
|
700 |
1 |
|
|a Kim, Hyoung Joong.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319641843
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10431
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-64185-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|