LEADER 00906nam0 22002533i 450 001 SBL0660390 005 20231121125830.0 100 $a20201218d1962 ||||0itac50 ba 101 | $aeng 102 $agb 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜The œAbinnaeus archive$epapers of a roman officier in the reign of Constantius 2.$fcollected and re-ed. by H.I. Bell ... °et al.! 210 $aOxford$cClarendon$d1962 215 $aXIV, 191 p.$d25 cm. 702 1$aBell$b, Harold Idris$3MILV022871 801 3$aIT$bIT-01$c20201218 850 $aIT-FR0017 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 $eN 912 $aSBL0660390 950 0$aBiblioteca umanistica Giorgio Aprea$d 52S.SIJ. E1 P. Abinn.$e 52BUN0000003965 VMB RS $fC $h20201218$i20201218 977 $a 52 996 $aAbinnaeus archive$9638008 997 $aUNICAS LEADER 03804nam 22008295 450 001 9910483045803321 005 20251225212249.0 010 $a3-319-64185-9 024 7 $a10.1007/978-3-319-64185-0 035 $a(CKB)4340000000061652 035 $a(DE-He213)978-3-319-64185-0 035 $a(MiAaPQ)EBC6301804 035 $a(MiAaPQ)EBC5577328 035 $a(Au-PeEL)EBL5577328 035 $a(OCoLC)1002312717 035 $a(PPN)203849973 035 $a(EXLCZ)994340000000061652 100 $a20170725d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Watermarking $e16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /$fedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XI, 422 p. 174 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10431 311 08$a3-319-64184-0 327 $aDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues.Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches. 330 $aThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany,in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis,forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of informationhiding : usage scenarios and detection approaches. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10431 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aComputer vision 606 $aComputers and civilization 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aComputer Vision 606 $aComputers and Society 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer vision. 615 0$aComputers and civilization. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aComputer Vision. 615 24$aComputers and Society. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aKraetzer$b Christian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShi$b Yun-Qing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDittmann$b Jana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483045803321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA