Digital Forensics and Watermarking [electronic resource] : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim.
Material type:
TextSeries: Security and Cryptology ; 10431 | Lecture Notes in Computer Science ; 10431Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XI, 422 p. 174 illus. online resourceContent type: - text
- computer
- online resource
- 9783319641850
- Data encryption (Computer science)
- Computer security
- Algorithms
- Optical data processing
- Computers and civilization
- Coding theory
- Information theory
- Cryptology
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Image Processing and Computer Vision
- Computers and Society
- Coding and Information Theory
- 005.82 23
- QA76.9.D335
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK15302 |
Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches.
This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
There are no comments on this title.