LEADER 03913nam 22007935 450 001 996466026203316 005 20200706035604.0 010 $a3-642-40099-X 024 7 $a10.1007/978-3-642-40099-5 035 $a(CKB)3710000000002664 035 $a(SSID)ssj0000962659 035 $a(PQKBManifestationID)11519819 035 $a(PQKBTitleCode)TC0000962659 035 $a(PQKBWorkID)10976207 035 $a(PQKB)10696444 035 $a(DE-He213)978-3-642-40099-5 035 $a(MiAaPQ)EBC3093288 035 $z(PPN)197455115 035 $a(PPN)17242898X 035 $a(EXLCZ)993710000000002664 100 $a20130724d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital-Forensics and Watermarking$b[electronic resource] $e11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers /$fedited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XX, 532 p. 245 illus.) 225 1 $aSecurity and Cryptology ;$v7809 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40098-1 327 $aSteganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography. 410 0$aSecurity and Cryptology ;$v7809 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers and civilization 606 $aCoding theory 606 $aInformation theory 606 $aOptical data processing 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aOptical data processing. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aCoding and Information Theory. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.82 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPérez-González$b Fernando$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466026203316 996 $aDigital Forensics and Watermarking$92588993 997 $aUNISA