000 | 04131nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-319-64185-0 | ||
003 | DE-He213 | ||
005 | 20210120143401.0 | ||
007 | cr nn 008mamaa | ||
008 | 170725s2017 gw | s |||| 0|eng d | ||
020 |
_a9783319641850 _9978-3-319-64185-0 |
||
024 | 7 |
_a10.1007/978-3-319-64185-0 _2doi |
|
050 | 4 | _aQA76.9.D335 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aDigital Forensics and Watermarking _h[electronic resource] : _b16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / _cedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXI, 422 p. 174 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v10431 _aLecture Notes in Computer Science _v10431 |
|
505 | 0 | _aDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches. | |
520 | _aThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches. | ||
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer security. | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aOptical data processing. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 1 | 4 |
_aCryptology. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aAlgorithm Analysis and Problem Complexity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I16021 |
650 | 2 | 4 |
_aImage Processing and Computer Vision. _0https://scigraph.springernature.com/ontologies/product-market-codes/I22021 |
650 | 2 | 4 |
_aComputers and Society. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24040 |
650 | 2 | 4 |
_aCoding and Information Theory. _0https://scigraph.springernature.com/ontologies/product-market-codes/I15041 |
700 | 1 |
_aKraetzer, Christian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aShi, Yun-Qing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDittmann, Jana. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKim, Hyoung Joong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319641843 |
776 | 0 | 8 |
_iPrinted edition: _z9783319641867 |
830 | 0 |
_aSecurity and Cryptology ; _v10431 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v10431 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-64185-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58039 _d58039 |