000 | 03398nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-40099-5 | ||
003 | DE-He213 | ||
005 | 20240730185437.0 | ||
007 | cr nn 008mamaa | ||
008 | 130724s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642400995 _9978-3-642-40099-5 |
||
024 | 7 |
_a10.1007/978-3-642-40099-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aDigital-Forensics and Watermarking _h[electronic resource] : _b11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / _cedited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXX, 532 p. 245 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7809 |
|
505 | 0 | _aSteganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography. | |
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _9139336 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aCoding and Information Theory. _9139337 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
700 | 1 |
_aShi, Yun Q. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139338 |
|
700 | 1 |
_aPérez-González, Fernando. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139339 |
|
700 | 1 |
_aKim, Hyoung Joong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139340 |
|
710 | 2 |
_aSpringerLink (Online service) _9139341 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642400988 |
776 | 0 | 8 |
_iPrinted edition: _z9783642401008 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7809 _9139342 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-40099-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92828 _d92828 |