Digital Forensics and Watermarking [[electronic resource] ] : 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings / / edited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 392 p. 167 illus., 101 illus. in color.) |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer crimes Optical data processing Coding theory Information theory Artificial intelligence Cryptology Systems and Data Security Computer Crime Image Processing and Computer Vision Coding and Information Theory Artificial Intelligence |
ISBN | 3-030-11389-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection. |
Record Nr. | UNINA-9910337582903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Forensics and Watermarking [[electronic resource] ] : 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings / / edited by Chang D. Yoo, Yun-Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 392 p. 167 illus., 101 illus. in color.) |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer crimes Optical data processing Coding theory Information theory Artificial intelligence Cryptology Systems and Data Security Computer Crime Image Processing and Computer Vision Coding and Information Theory Artificial Intelligence |
ISBN | 3-030-11389-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep Neural Networks for Digital Forensics -- Steganalysis and Identification -- Watermarking -- Reversible Data Hiding -- Steganographic Algorithms -- Identification and Security -- Deep Generative Models for Forgery and Its Detection. |
Record Nr. | UNISA-996466346403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital Forensics and Watermarking [[electronic resource] ] : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / / edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XI, 422 p. 174 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Optical data processing Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Image Processing and Computer Vision Computers and Society Coding and Information Theory |
ISBN | 3-319-64185-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches. |
Record Nr. | UNISA-996466174803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital Forensics and Watermarking [[electronic resource] ] : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / / edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XI, 422 p. 174 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Optical data processing Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Image Processing and Computer Vision Computers and Society Coding and Information Theory |
ISBN | 3-319-64185-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches. |
Record Nr. | UNINA-9910483045803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 448 p. 224 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory |
ISBN | 3-319-31960-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme. |
Record Nr. | UNINA-9910484517203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 448 p. 224 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory |
ISBN | 3-319-31960-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme. |
Record Nr. | UNISA-996466043203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 626 p. 278 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Biometrics (Biology) Coding theory Information theory Cryptology Systems and Data Security Biometrics Coding and Information Theory |
ISBN | 3-319-19321-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis. |
Record Nr. | UNINA-9910483252903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 626 p. 278 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Biometrics (Biology) Coding theory Information theory Cryptology Systems and Data Security Biometrics Coding and Information Theory |
ISBN | 3-319-19321-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis. |
Record Nr. | UNISA-996198536403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|