|
|
|
|
LEADER |
02805nam a22005535i 4500 |
001 |
16247 |
003 |
DE-He213 |
005 |
20130921042205.0 |
007 |
cr nn 008mamaa |
008 |
130724s2013 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642400995
|9 978-3-642-40099-5
|
024 |
7 |
# |
|a 10.1007/978-3-642-40099-5
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a URY
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
# |
|a Shi, Yun Q.
|e editor.
|
245 |
1 |
0 |
|a Digital Forensics and Watermaking
|b 11th International Workshop, IWDW 2012, Shanghai, China, October 31 <U+0013> November 3, 2012, Revised Selected Papers /
|c edited by Yun Q. Shi, Hyoung-Joong Kim, Fernando Přez-Gonzl̀ez.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
# |
# |
|a XX, 532 p. 245 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 7809
|x 0302-9743 ;
|
505 |
0 |
# |
|a Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
|
520 |
# |
# |
|a This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Coding theory.
|
650 |
# |
0 |
|a Computer vision.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|
700 |
1 |
# |
|a Kim, Hyoung-Joong.
|e editor.
|
700 |
1 |
# |
|a Přez-Gonzl̀ez, Fernando.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642400988
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 7809
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-40099-5
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|