LEADER 04082nam 22007695 450 001 9910647391503321 005 20230128100229.0 010 $a3-031-25115-6 024 7 $a10.1007/978-3-031-25115-3 035 $a(MiAaPQ)EBC7187340 035 $a(Au-PeEL)EBL7187340 035 $a(CKB)26068912200041 035 $a(DE-He213)978-3-031-25115-3 035 $a(PPN)267807112 035 $a(EXLCZ)9926068912200041 100 $a20230128d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Watermarking $e21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers /$fedited by Xianfeng Zhao, Zhenjun Tang, Pedro Comesaņa-Alfaro, Alessandro Piva 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (227 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13825 311 08$aPrint version: Zhao, Xianfeng Digital Forensics and Watermarking Cham : Springer,c2023 9783031251146 320 $aIncludes bibliographical references and index. 327 $aSteganology -- High-Performance Steganographic Coding Based on Sub-Polarized Channel -- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC -- Forensics and Security Analysis -- SE-ResNet56: Robust Network Model for Deepfake Detection -- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder -- Visual Explanations for Exposing Potential Inconsistency of Deepfakes -- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method -- Manipulated Face Detection and Localization Based on Semantic Segmentation -- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information? -- Watermarking -- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code -- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability -- Adaptive Robust Watermarking Method Based on Deep Neural Networks -- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking -- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images -- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. . 330 $aThis book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13825 606 $aCryptography 606 $aData encryption (Computer science) 606 $aNumerical analysis 606 $aComputer vision 606 $aMachine learning 606 $aComputer networks 606 $aComputer engineering 606 $aCryptology 606 $aNumerical Analysis 606 $aComputer Vision 606 $aMachine Learning 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aNumerical analysis. 615 0$aComputer vision. 615 0$aMachine learning. 615 0$aComputer networks. 615 0$aComputer engineering. 615 14$aCryptology. 615 24$aNumerical Analysis. 615 24$aComputer Vision. 615 24$aMachine Learning. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 676 $a005.82 676 $a005.82 702 $aZhao$b Xianfeng 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647391503321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA