000 | 04488nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-95398-0 | ||
003 | DE-He213 | ||
005 | 20240730181138.0 | ||
007 | cr nn 008mamaa | ||
008 | 220120s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030953980 _9978-3-030-95398-0 |
||
024 | 7 |
_a10.1007/978-3-030-95398-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aDigital Forensics and Watermarking _h[electronic resource] : _b20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers / _cedited by Xianfeng Zhao, Alessandro Piva, Pedro ComesaƱa-Alfaro. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXII, 273 p. 28 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13180 |
|
505 | 0 | _aForensics and Security Analysis -- A Multi-Level Feature Enhancement Network for Image Splicing Localization -- MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network -- Double-Stream Segmentation Network with Temporal Self-Attention for Deepfake Video Detection -- Exposing Deepfake Videos with Spatial, Frequency and Multi-Scale Temporal Artifacts -- On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic -- Modify the Quantization Table in the JPEG Header File for Forensics and Anti-Forensics -- More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach -- Effects of Image Compression on Image Age Approximation -- FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection -- Watermarking -- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm -- A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks -- Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding -- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification -- Steganology -- Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network -- Using Contrastive Learning to Improve the Performance of Steganalysis Schemes -- A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes -- Data Hiding Based on Redundant Space of WeChat Mini Program Codes -- Image Block Regression Based on Feature Fusion for CNN-Based Spatial Steganalysis. | |
520 | _aThis volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _9123608 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aZhao, Xianfeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123609 |
|
700 | 1 |
_aPiva, Alessandro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123610 |
|
700 | 1 |
_aComesaƱa-Alfaro, Pedro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123611 |
|
710 | 2 |
_aSpringerLink (Online service) _9123612 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030953973 |
776 | 0 | 8 |
_iPrinted edition: _z9783030953997 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13180 _9123613 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-95398-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90722 _d90722 |