000 | 04256nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-031-25115-3 | ||
003 | DE-He213 | ||
005 | 20240730175827.0 | ||
007 | cr nn 008mamaa | ||
008 | 230128s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031251153 _9978-3-031-25115-3 |
||
024 | 7 |
_a10.1007/978-3-031-25115-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aDigital Forensics and Watermarking _h[electronic resource] : _b21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers / _cedited by Xianfeng Zhao, Zhenjun Tang, Pedro Comesaña-Alfaro, Alessandro Piva. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXII, 219 p. 94 illus., 76 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13825 |
|
505 | 0 | _aSteganology -- High-Performance Steganographic Coding Based on Sub-Polarized Channel -- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC -- Forensics and Security Analysis -- SE-ResNet56: Robust Network Model for Deepfake Detection -- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder -- Visual Explanations for Exposing Potential Inconsistency of Deepfakes -- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method -- Manipulated Face Detection and Localization Based on Semantic Segmentation -- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information? -- Watermarking -- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code -- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability -- Adaptive Robust Watermarking Method Based on Deep Neural Networks -- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking -- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images -- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. . | |
520 | _aThis book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aNumerical analysis. _94603 |
|
650 | 0 |
_aComputer vision. _9117983 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aNumerical Analysis. _94603 |
650 | 2 | 4 |
_aComputer Vision. _9117984 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aComputer Communication Networks. _9117985 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9117986 |
700 | 1 |
_aZhao, Xianfeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9117987 |
|
700 | 1 |
_aTang, Zhenjun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9117988 |
|
700 | 1 |
_aComesaña-Alfaro, Pedro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9117989 |
|
700 | 1 |
_aPiva, Alessandro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9117990 |
|
710 | 2 |
_aSpringerLink (Online service) _9117991 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031251146 |
776 | 0 | 8 |
_iPrinted edition: _z9783031251160 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13825 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-25115-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90065 _d90065 |