LEADER 04076nam 22007935 450 001 996466346403316 005 20200704051629.0 010 $a3-030-11389-2 024 7 $a10.1007/978-3-030-11389-6 035 $a(CKB)4100000007598314 035 $a(DE-He213)978-3-030-11389-6 035 $a(MiAaPQ)EBC5918178 035 $a(PPN)233799656 035 $a(EXLCZ)994100000007598314 100 $a20190123d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Watermarking$b[electronic resource] $e17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings /$fedited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 392 p. 167 illus., 101 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11378 300 $aIncludes Index. 311 $a3-030-11388-4 327 $aDeep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection. 330 $aThis book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018. The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. . 410 0$aSecurity and Cryptology ;$v11378 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer crimes 606 $aOptical data processing 606 $aCoding theory 606 $aInformation theory 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Crime$3https://scigraph.springernature.com/ontologies/product-market-codes/I28070 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer crimes. 615 0$aOptical data processing. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Crime. 615 24$aImage Processing and Computer Vision. 615 24$aCoding and Information Theory. 615 24$aArtificial Intelligence. 676 $a005.824 702 $aYoo$b Chang D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShi$b Yun-Qing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPiva$b Alessandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Gwangsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466346403316 996 $aDigital Forensics and Watermarking$92588993 997 $aUNISA