LEADER 03686nam 22008415 450 001 9910484746703321 005 20251226195101.0 010 $a3-642-40099-X 024 7 $a10.1007/978-3-642-40099-5 035 $a(CKB)3710000000002664 035 $a(SSID)ssj0000962659 035 $a(PQKBManifestationID)11519819 035 $a(PQKBTitleCode)TC0000962659 035 $a(PQKBWorkID)10976207 035 $a(PQKB)10696444 035 $a(DE-He213)978-3-642-40099-5 035 $a(MiAaPQ)EBC3093288 035 $z(PPN)197455115 035 $a(PPN)17242898X 035 $a(EXLCZ)993710000000002664 100 $a20130724d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital-Forensics and Watermarking $e11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers /$fedited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XX, 532 p. 245 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7809 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40098-1 327 $aSteganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7809 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers and civilization 606 $aCoding theory 606 $aInformation theory 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aCryptology 606 $aData and Information Security 606 $aComputers and Society 606 $aCoding and Information Theory 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputers and Society. 615 24$aCoding and Information Theory. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.82 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPérez-González$b Fernando$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484746703321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA