001443931 000__ 04724cam\a2200685Ii\4500 001443931 001__ 1443931 001443931 003__ OCoLC 001443931 005__ 20230310003609.0 001443931 006__ m\\\\\o\\d\\\\\\\\ 001443931 007__ cr\un\nnnunnun 001443931 008__ 220126s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001443931 019__ $$a1293846558$$a1293896026$$a1293933277$$a1294139516$$a1296666789 001443931 020__ $$a9783030953980$$q(electronic bk.) 001443931 020__ $$a303095398X$$q(electronic bk.) 001443931 020__ $$z9783030953973 001443931 020__ $$z3030953971 001443931 0247_ $$a10.1007/978-3-030-95398-0$$2doi 001443931 035__ $$aSP(OCoLC)1293775671 001443931 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dOCLCO$$dEBLCP$$dDKU$$dOCLCO$$dOCLCF$$dUKAHL$$dOCLCQ 001443931 049__ $$aISEA 001443931 050_4 $$aQA76.9.A25$$bI93 2021 001443931 08204 $$a005.8/24$$223 001443931 1112_ $$aIWDW (Conference)$$n(20th :$$d2021 :$$cBeijing, China) 001443931 24510 $$aDigital forensics and watermarking :$$b20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers /$$cXianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (eds.). 001443931 24630 $$aIWDW 2021 001443931 264_1 $$aCham :$$bSpringer,$$c[2022] 001443931 264_4 $$c©2022 001443931 300__ $$a1 online resource :$$billustrations. 001443931 336__ $$atext$$btxt$$2rdacontent 001443931 337__ $$acomputer$$bc$$2rdamedia 001443931 338__ $$aonline resource$$bcr$$2rdacarrier 001443931 347__ $$atext file$$bPDF$$2rda 001443931 4901_ $$aLecture notes in computer science ;$$v13180 001443931 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001443931 500__ $$aInternational conference proceedings. 001443931 500__ $$aIncludes author index. 001443931 5050_ $$aForensics and Security Analysis -- A Multi-Level Feature Enhancement Network for Image Splicing Localization -- MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network -- Double-Stream Segmentation Network with Temporal Self-Attention for Deepfake Video Detection -- Exposing Deepfake Videos with Spatial, Frequency and Multi-Scale Temporal Artifacts -- On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic -- Modify the Quantization Table in the JPEG Header File for Forensics and Anti-Forensics -- More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach -- Effects of Image Compression on Image Age Approximation -- FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection -- Watermarking -- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm -- A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks -- Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding -- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification -- Steganology -- Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network -- Using Contrastive Learning to Improve the Performance of Steganalysis Schemes -- A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes -- Data Hiding Based on Redundant Space of WeChat Mini Program Codes -- Image Block Regression Based on Feature Fusion for CNN-Based Spatial Steganalysis. 001443931 506__ $$aAccess limited to authorized users. 001443931 520__ $$aThis volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology. 001443931 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 28, 2022). 001443931 650_0 $$aData encryption (Computer science)$$vCongresses. 001443931 650_0 $$aDigital watermarking$$vCongresses. 001443931 650_6 $$aChiffrement (Informatique)$$vCongrès. 001443931 650_6 $$aTatouage numérique$$vCongrès. 001443931 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001443931 655_7 $$aConference papers and proceedings.$$2lcgft 001443931 655_7 $$aActes de congrès.$$2rvmgf 001443931 655_0 $$aElectronic books. 001443931 7001_ $$aZhao, Xianfeng$$c(Computer scientist),$$eeditor. 001443931 7001_ $$aPiva, Alessandro,$$d1968-$$eeditor. 001443931 7001_ $$aComesaña-Alfaro, Pedro,$$eeditor. 001443931 77608 $$iPrint version: $$z3030953971$$z9783030953973$$w(OCoLC)1290015534 001443931 830_0 $$aLecture notes in computer science ;$$v13180. 001443931 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001443931 852__ $$bebk 001443931 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-95398-0$$zOnline Access$$91397441.1 001443931 909CO $$ooai:library.usi.edu:1443931$$pGLOBAL_SET 001443931 980__ $$aBIB 001443931 980__ $$aEBOOK 001443931 982__ $$aEbook 001443931 983__ $$aOnline 001443931 994__ $$a92$$bISE