|
|
|
|
LEADER |
02425nmm a2200457 u 4500 |
001 |
EB001860456 |
003 |
EBX01000000000000001024552 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
190201 ||| eng |
020 |
|
|
|a 9783030113896
|
100 |
1 |
|
|a Yoo, Chang D.
|e [editor]
|
245 |
0 |
0 |
|a Digital Forensics and Watermarking
|h Elektronische Ressource
|b 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
|c edited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim
|
250 |
|
|
|a 1st ed. 2019
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2019, 2019
|
300 |
|
|
|a XI, 392 p. 167 illus., 101 illus. in color
|b online resource
|
505 |
0 |
|
|a Deep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computer Vision
|
653 |
|
|
|a Computer crimes
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer Crime
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Shi, Yun-Qing
|e [editor]
|
700 |
1 |
|
|a Kim, Hyoung Joong
|e [editor]
|
700 |
1 |
|
|a Piva, Alessandro
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-11389-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-11389-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018. The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.
|