000 03206nam a22006735i 4500
001 978-3-662-43886-2
003 DE-He213
005 20240423130036.0
007 cr nn 008mamaa
008 140708s2014 gw | s |||| 0|eng d
020 _a9783662438862
_9978-3-662-43886-2
024 7 _a10.1007/978-3-662-43886-2
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aDigital-Forensics and Watermarking
_h[electronic resource] :
_b12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers /
_cedited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González.
250 _a1st ed. 2014.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXVI, 530 p. 239 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v8389
505 0 _aSteganography -- Steganalysis -- Visual cryptography -- Reversible data hiding -- Forensics -- Watermarking -- Anonymizing and plate recognition.
520 _aThis book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 0 _aImage processing
_xDigital techniques.
650 0 _aComputer vision.
650 0 _aComputers and civilization.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 1 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
650 2 4 _aComputers and Society.
650 2 4 _aCoding and Information Theory.
700 1 _aShi, Yun Qing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKim, Hyoung-Joong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPérez-González, Fernando.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783662438855
776 0 8 _iPrinted edition:
_z9783662438879
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v8389
856 4 0 _uhttps://doi.org/10.1007/978-3-662-43886-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c184400
_d184400