04082nam 22007695 450 991064739150332120230128100229.03-031-25115-610.1007/978-3-031-25115-3(MiAaPQ)EBC7187340(Au-PeEL)EBL7187340(CKB)26068912200041(DE-He213)978-3-031-25115-3(PPN)267807112(EXLCZ)992606891220004120230128d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierDigital Forensics and Watermarking 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers /edited by Xianfeng Zhao, Zhenjun Tang, Pedro ComesaƱa-Alfaro, Alessandro Piva1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (227 pages)Lecture Notes in Computer Science,1611-3349 ;13825Print version: Zhao, Xianfeng Digital Forensics and Watermarking Cham : Springer,c2023 9783031251146 Includes bibliographical references and index.Steganology -- High-Performance Steganographic Coding Based on Sub-Polarized Channel -- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC -- Forensics and Security Analysis -- SE-ResNet56: Robust Network Model for Deepfake Detection -- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder -- Visual Explanations for Exposing Potential Inconsistency of Deepfakes -- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method -- Manipulated Face Detection and Localization Based on Semantic Segmentation -- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information? -- Watermarking -- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code -- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability -- Adaptive Robust Watermarking Method Based on Deep Neural Networks -- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking -- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images -- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. .This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.Lecture Notes in Computer Science,1611-3349 ;13825CryptographyData encryption (Computer science)Numerical analysisComputer visionMachine learningComputer networksComputer engineeringCryptologyNumerical AnalysisComputer VisionMachine LearningComputer Communication NetworksComputer Engineering and NetworksCryptography.Data encryption (Computer science)Numerical analysis.Computer vision.Machine learning.Computer networks.Computer engineering.Cryptology.Numerical Analysis.Computer Vision.Machine Learning.Computer Communication Networks.Computer Engineering and Networks.005.82005.82Zhao XianfengMiAaPQMiAaPQMiAaPQBOOK9910647391503321Digital Forensics and Watermarking3004628UNINA