Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1382
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKraetzer, Christian. ; editor ;en_US
dc.contributor.authorShi, Yun-Qing. ; editor ;en_US
dc.contributor.authorDittmann, Jana. ; editor ;en_US
dc.contributor.authorKim, Hyoung Joong. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:21Z-
dc.date.available2020-05-17T08:28:21Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319641850 ;en_US
dc.identifier.isbn3319641859 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1382-
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319641843 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ;en_US
dc.description.statementofresponsibilityedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kimen_US
dc.description.tableofcontentsDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ;en_US
dc.format.extent1 online resource (XI, 422 p.) : ; 174 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.haspart9783319641850.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory ;en_US
dc.subjectAlgorithms ;en_US
dc.subjectImage processing ;en_US
dc.subjectComputers and civilization ;en_US
dc.titleDigital Forensics and Watermarkingen_US
dc.title.alternative16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319641850.pdf65.04 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKraetzer, Christian. ; editor ;en_US
dc.contributor.authorShi, Yun-Qing. ; editor ;en_US
dc.contributor.authorDittmann, Jana. ; editor ;en_US
dc.contributor.authorKim, Hyoung Joong. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:21Z-
dc.date.available2020-05-17T08:28:21Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319641850 ;en_US
dc.identifier.isbn3319641859 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1382-
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319641843 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ;en_US
dc.description.statementofresponsibilityedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kimen_US
dc.description.tableofcontentsDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ;en_US
dc.format.extent1 online resource (XI, 422 p.) : ; 174 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.haspart9783319641850.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory ;en_US
dc.subjectAlgorithms ;en_US
dc.subjectImage processing ;en_US
dc.subjectComputers and civilization ;en_US
dc.titleDigital Forensics and Watermarkingen_US
dc.title.alternative16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319641850.pdf65.04 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKraetzer, Christian. ; editor ;en_US
dc.contributor.authorShi, Yun-Qing. ; editor ;en_US
dc.contributor.authorDittmann, Jana. ; editor ;en_US
dc.contributor.authorKim, Hyoung Joong. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:21Z-
dc.date.available2020-05-17T08:28:21Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319641850 ;en_US
dc.identifier.isbn3319641859 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1382-
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319641843 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ;en_US
dc.description.statementofresponsibilityedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kimen_US
dc.description.tableofcontentsDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ;en_US
dc.format.extent1 online resource (XI, 422 p.) : ; 174 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ;en_US
dc.relation.haspart9783319641850.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory ;en_US
dc.subjectAlgorithms ;en_US
dc.subjectImage processing ;en_US
dc.subjectComputers and civilization ;en_US
dc.titleDigital Forensics and Watermarkingen_US
dc.title.alternative16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319641850.pdf65.04 MBAdobe PDFThumbnail
Preview File