語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital Forensics and Watermarking = 20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Digital Forensics and Watermarking/ edited by Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro.
其他題名:
20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
其他作者:
Zhao, Xianfeng.
面頁冊數:
XII, 273 p. 28 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Cryptography. -
電子資源:
https://doi.org/10.1007/978-3-030-95398-0
ISBN:
9783030953980
Digital Forensics and Watermarking = 20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
Digital Forensics and Watermarking
20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /[electronic resource] :edited by Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro. - 1st ed. 2022. - XII, 273 p. 28 illus.online resource. - Security and Cryptology ;13180. - Security and Cryptology ;9241.
Forensics and Security Analysis -- A Multi-Level Feature Enhancement Network for Image Splicing Localization -- MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network -- Double-Stream Segmentation Network with Temporal Self-Attention for Deepfake Video Detection -- Exposing Deepfake Videos with Spatial, Frequency and Multi-Scale Temporal Artifacts -- On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic -- Modify the Quantization Table in the JPEG Header File for Forensics and Anti-Forensics -- More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach -- Effects of Image Compression on Image Age Approximation -- FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection -- Watermarking -- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm -- A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks -- Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding -- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification -- Steganology -- Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network -- Using Contrastive Learning to Improve the Performance of Steganalysis Schemes -- A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes -- Data Hiding Based on Redundant Space of WeChat Mini Program Codes -- Image Block Regression Based on Feature Fusion for CNN-Based Spatial Steganalysis.
This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.
ISBN: 9783030953980
Standard No.: 10.1007/978-3-030-95398-0doiSubjects--Topical Terms:
567927
Cryptography.
LC Class. No.: QA268
Dewey Class. No.: 005.824
Digital Forensics and Watermarking = 20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
LDR
:03508nam a22004335i 4500
001
1093110
003
DE-He213
005
20220120230407.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030953980
$9
978-3-030-95398-0
024
7
$a
10.1007/978-3-030-95398-0
$2
doi
035
$a
978-3-030-95398-0
050
4
$a
QA268
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
245
1 0
$a
Digital Forensics and Watermarking
$h
[electronic resource] :
$b
20th International Workshop, IWDW 2021, Beijing, China, November 20–22, 2021, Revised Selected Papers /
$c
edited by Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XII, 273 p. 28 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
13180
505
0
$a
Forensics and Security Analysis -- A Multi-Level Feature Enhancement Network for Image Splicing Localization -- MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network -- Double-Stream Segmentation Network with Temporal Self-Attention for Deepfake Video Detection -- Exposing Deepfake Videos with Spatial, Frequency and Multi-Scale Temporal Artifacts -- On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic -- Modify the Quantization Table in the JPEG Header File for Forensics and Anti-Forensics -- More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach -- Effects of Image Compression on Image Age Approximation -- FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection -- Watermarking -- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm -- A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks -- Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding -- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification -- Steganology -- Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network -- Using Contrastive Learning to Improve the Performance of Steganalysis Schemes -- A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes -- Data Hiding Based on Redundant Space of WeChat Mini Program Codes -- Image Block Regression Based on Feature Fusion for CNN-Based Spatial Steganalysis.
520
$a
This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.
650
0
$a
Cryptography.
$3
567927
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Image processing—Digital techniques.
$3
1365735
650
0
$a
Computer vision.
$3
561800
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
671334
650
2 4
$a
Data and Information Security.
$3
1365785
700
1
$a
Zhao, Xianfeng.
$e
editor.
$1
https://orcid.org/0000-0002-5617-8399
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1319417
700
1
$a
Piva, Alessandro.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1200875
700
1
$a
Comesaña-Alfaro, Pedro.
$e
editor.
$1
https://orcid.org/0000-0001-5406-0066
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1401030
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030953973
776
0 8
$i
Printed edition:
$z
9783030953997
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-95398-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入