LEADER 03648nam 22008295 450 001 9910337582903321 005 20251225190603.0 010 $a3-030-11389-2 024 7 $a10.1007/978-3-030-11389-6 035 $a(CKB)4100000007598314 035 $a(DE-He213)978-3-030-11389-6 035 $a(MiAaPQ)EBC5918178 035 $a(PPN)233799656 035 $a(EXLCZ)994100000007598314 100 $a20190123d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Watermarking $e17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings /$fedited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 392 p. 167 illus., 101 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11378 300 $aIncludes Index. 311 08$a3-030-11388-4 327 $aDeep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection. 330 $aThis book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018. The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11378 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer crimes 606 $aComputer vision 606 $aCoding theory 606 $aInformation theory 606 $aArtificial intelligence 606 $aCryptology 606 $aData and Information Security 606 $aComputer Crime 606 $aComputer Vision 606 $aCoding and Information Theory 606 $aArtificial Intelligence 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer crimes. 615 0$aComputer vision. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Crime. 615 24$aComputer Vision. 615 24$aCoding and Information Theory. 615 24$aArtificial Intelligence. 676 $a005.824 676 $a005.824 702 $aYoo$b Chang D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShi$b Yun-Qing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPiva$b Alessandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Gwangsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337582903321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA