Normal view MARC view ISBD view

Digital Forensics and Watermarking [electronic resource] : 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers / edited by Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Feng Liu.

Contributor(s): Shi, Yun Qing [editor.] | Kim, Hyoung Joong [editor.] | Perez-Gonzalez, Fernando [editor.] | Liu, Feng [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10082Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XIV, 618 p. 269 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319534657.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Algorithms | Computer vision | Computers and civilization | Coding theory | Information theory | Cryptology | Data and Information Security | Algorithms | Computer Vision | Computers and Society | Coding and Information TheoryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

There are no comments for this item.

Log in to your account to post a comment.