Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1382
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kraetzer, Christian. ; editor ; | en_US |
dc.contributor.author | Shi, Yun-Qing. ; editor ; | en_US |
dc.contributor.author | Dittmann, Jana. ; editor ; | en_US |
dc.contributor.author | Kim, Hyoung Joong. ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:21Z | - |
dc.date.available | 2020-05-17T08:28:21Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319641850 ; | en_US |
dc.identifier.isbn | 3319641859 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1382 | - |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319641843 ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ; | en_US |
dc.description.statementofresponsibility | edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim | en_US |
dc.description.tableofcontents | Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ; | en_US |
dc.format.extent | 1 online resource (XI, 422 p.) : ; 174 illus ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.haspart | 9783319641850.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory ; | en_US |
dc.subject | Algorithms ; | en_US |
dc.subject | Image processing ; | en_US |
dc.subject | Computers and civilization ; | en_US |
dc.title | Digital Forensics and Watermarking | en_US |
dc.title.alternative | 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319641850.pdf | 65.04 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kraetzer, Christian. ; editor ; | en_US |
dc.contributor.author | Shi, Yun-Qing. ; editor ; | en_US |
dc.contributor.author | Dittmann, Jana. ; editor ; | en_US |
dc.contributor.author | Kim, Hyoung Joong. ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:21Z | - |
dc.date.available | 2020-05-17T08:28:21Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319641850 ; | en_US |
dc.identifier.isbn | 3319641859 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1382 | - |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319641843 ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ; | en_US |
dc.description.statementofresponsibility | edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim | en_US |
dc.description.tableofcontents | Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ; | en_US |
dc.format.extent | 1 online resource (XI, 422 p.) : ; 174 illus ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.haspart | 9783319641850.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory ; | en_US |
dc.subject | Algorithms ; | en_US |
dc.subject | Image processing ; | en_US |
dc.subject | Computers and civilization ; | en_US |
dc.title | Digital Forensics and Watermarking | en_US |
dc.title.alternative | 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319641850.pdf | 65.04 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kraetzer, Christian. ; editor ; | en_US |
dc.contributor.author | Shi, Yun-Qing. ; editor ; | en_US |
dc.contributor.author | Dittmann, Jana. ; editor ; | en_US |
dc.contributor.author | Kim, Hyoung Joong. ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:21Z | - |
dc.date.available | 2020-05-17T08:28:21Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319641850 ; | en_US |
dc.identifier.isbn | 3319641859 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1382 | - |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319641843 ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches ; | en_US |
dc.description.statementofresponsibility | edited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim | en_US |
dc.description.tableofcontents | Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches ; | en_US |
dc.format.extent | 1 online resource (XI, 422 p.) : ; 174 illus ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10431 ; | en_US |
dc.relation.haspart | 9783319641850.pdf | en_US |
dc.subject | Computer science ; | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory ; | en_US |
dc.subject | Algorithms ; | en_US |
dc.subject | Image processing ; | en_US |
dc.subject | Computers and civilization ; | en_US |
dc.title | Digital Forensics and Watermarking | en_US |
dc.title.alternative | 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319641850.pdf | 65.04 MB | Adobe PDF | Preview File |