LEADER 03763nam 22006135 450 001 9910366616803321 005 20251113210110.0 010 $a981-13-9341-9 024 7 $a10.1007/978-981-13-9341-9 035 $a(CKB)4940000000149977 035 $a(DE-He213)978-981-13-9341-9 035 $a(MiAaPQ)EBC5989310 035 $a(PPN)242817580 035 $a(EXLCZ)994940000000149977 100 $a20191203d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Computer Science and Ubiquitous Computing $eCSA-CUTE 2018 /$fedited by James J. Park, Doo-Soon Park, Young-Sik Jeong, Yi Pan 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XXXI, 636 p. 356 illus., 225 illus. in color.) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v536 300 $aIncludes index. 311 08$a981-13-9340-0 327 $aCUTE2018 -- Track 1. Ubiquitous Communication and Networking -- Track 2. Ubiquitous Software Technology -- Track 3. Ubiquitous Systems and Applications -- Track 4. Ubiquitous Security, Privacy and Trust -- CSA2018 -- Track 1. Mobile and ubiquitous computing -- Track 2. Dependable, reliable and autonomic computing -- Track 3. Security and trust management -- Track 4. Multimedia systems and services -- Track 5. Networking and communications -- Track 6. Database and data mining -- Track 7. Game and software engineering -- Track 8. Grid and scalable computing -- Track 9. Embedded system and software -- Track 10. Artificial intelligence -- Track 11. Distributed and parallel algorithms -- Track 12. Web and internet computing -- Track 13. IT policy and business management. 330 $aThis book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v536 606 $aTelecommunication 606 $aComputational intelligence 606 $aComputer networks 606 $aCommunications Engineering, Networks 606 $aComputational Intelligence 606 $aComputer Communication Networks 615 0$aTelecommunication. 615 0$aComputational intelligence. 615 0$aComputer networks. 615 14$aCommunications Engineering, Networks. 615 24$aComputational Intelligence. 615 24$aComputer Communication Networks. 676 $a621.382 702 $aPark$b James J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPark$b Doo-Soon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJeong$b Young-Sik$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPan$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366616803321 996 $aAdvances in Computer Science and Ubiquitous Computing$91995478 997 $aUNINA LEADER 03840nam 22006015 450 001 9910366596103321 005 20251113184752.0 010 $a981-10-7644-8 024 7 $a10.1007/978-981-10-7644-2 035 $a(CKB)4100000008160608 035 $a(DE-He213)978-981-10-7644-2 035 $a(MiAaPQ)EBC5941008 035 $a(PPN)23652237X 035 $a(EXLCZ)994100000008160608 100 $a20190513d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Image Forensics $eTheory and Implementation /$fby Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XVI, 89 p. 45 illus., 32 illus. in color.) 225 1 $aStudies in Computational Intelligence,$x1860-9503 ;$v755 311 08$a981-10-7643-X 327 $aChapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images ? A Survey and Analysis -- Chapter 4: Copy?Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy?Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work. 330 $aThis book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on ?copy-move forgery? in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on ?Digital Image Processing?, ?Information Security?, ?Machine Learning?, ?Computer Vision? and ?Multimedia Security and Forensics?. 410 0$aStudies in Computational Intelligence,$x1860-9503 ;$v755 606 $aSignal processing 606 $aComputer vision 606 $aComputer crimes 606 $aSignal, Speech and Image Processing 606 $aComputer Vision 606 $aCybercrime 615 0$aSignal processing. 615 0$aComputer vision. 615 0$aComputer crimes. 615 14$aSignal, Speech and Image Processing. 615 24$aComputer Vision. 615 24$aCybercrime. 676 $a363.252 700 $aRoy$b Aniket$4aut$4http://id.loc.gov/vocabulary/relators/aut$0995397 702 $aDixit$b Rahul$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aNaskar$b Ruchira$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aChakraborty$b Rajat Subhra$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366596103321 996 $aDigital Image Forensics$92280489 997 $aUNINA