LEADER 03889nam 22008175 450 001 9910485050203321 005 20200630020056.0 010 $a3-662-43886-0 024 7 $a10.1007/978-3-662-43886-2 035 $a(CKB)3710000000219524 035 $a(SSID)ssj0001296432 035 $a(PQKBManifestationID)11802603 035 $a(PQKBTitleCode)TC0001296432 035 $a(PQKBWorkID)11348130 035 $a(PQKB)10737328 035 $a(DE-He213)978-3-662-43886-2 035 $a(MiAaPQ)EBC6301627 035 $a(MiAaPQ)EBC5594593 035 $a(Au-PeEL)EBL5594593 035 $a(OCoLC)884345479 035 $a(PPN)179925474 035 $a(EXLCZ)993710000000219524 100 $a20140708d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital-Forensics and Watermarking $e12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers /$fedited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 530 p. 239 illus.) 225 1 $aSecurity and Cryptology ;$v8389 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-43885-2 327 $aSteganography -- Steganalysis -- Visual cryptography -- Reversible data hiding -- Forensics -- Watermarking -- Anonymizing and plate recognition. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition. 410 0$aSecurity and Cryptology ;$v8389 606 $aData encryption (Computer science) 606 $aComputer security 606 $aOptical data processing 606 $aComputers and civilization 606 $aCoding theory 606 $aInformation theory 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aOptical data processing. 615 0$aComputers and civilization. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputers and Society. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aShi$b Yun Qing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung-Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPérez-González$b Fernando$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485050203321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA