000779708 000__ 02837cam\a2200565Ii\4500 000779708 001__ 779708 000779708 005__ 20230306143034.0 000779708 006__ m\\\\\o\\d\\\\\\\\ 000779708 007__ cr\nn\nnnunnun 000779708 008__ 170223s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000779708 019__ $$a974466485$$a974545029$$a981873659 000779708 020__ $$a9783319534657$$q(electronic book) 000779708 020__ $$a3319534653$$q(electronic book) 000779708 020__ $$z9783319534640 000779708 020__ $$z3319534645 000779708 0247_ $$a10.1007/978-3-319-53465-7$$2doi 000779708 035__ $$aSP(OCoLC)ocn973481897 000779708 035__ $$aSP(OCoLC)973481897$$z(OCoLC)974466485$$z(OCoLC)974545029$$z(OCoLC)981873659 000779708 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dNJR$$dUAB$$dESU$$dOCLCF$$dCOO$$dIOG$$dAZU$$dUWO$$dUPM 000779708 049__ $$aISEA 000779708 050_4 $$aQA76.9.A25 000779708 08204 $$a005.8/2$$223 000779708 1112_ $$aIWDW (Conference)$$n(15th :$$d2016 :$$cBeijing, China) 000779708 24510 $$aDigital forensics and watermarking :$$b15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised selected papers /$$cYun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Feng Liu (eds.). 000779708 2463_ $$aIWDW 2016 000779708 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000779708 300__ $$a1 online resource (xiv, 618 pages) :$$billustrations. 000779708 336__ $$atext$$btxt$$2rdacontent 000779708 337__ $$acomputer$$bc$$2rdamedia 000779708 338__ $$aonline resource$$bcr$$2rdacarrier 000779708 347__ $$atext file$$bPDF$$2rda 000779708 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10082 000779708 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000779708 500__ $$aIncludes author index. 000779708 506__ $$aAccess limited to authorized users. 000779708 520__ $$aThis book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis. 000779708 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 23, 2017). 000779708 650_0 $$aData encryption (Computer science)$$vCongresses. 000779708 650_0 $$aDigital watermarking$$vCongresses. 000779708 7001_ $$aShi, Yun Q.,$$eeditor. 000779708 7001_ $$aKim, Hyoung Joong,$$d1954-$$eeditor. 000779708 7001_ $$aPérez-González, F.$$q(Fernando),$$d1967-$$eeditor. 000779708 7001_ $$aLiu, Feng,$$eeditor. 000779708 77608 $$iPrint version:$$z3319534645$$z9783319534640$$w(OCoLC)968662078 000779708 830_0 $$aLecture notes in computer science ;$$v10082. 000779708 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000779708 852__ $$bebk 000779708 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-53465-7$$zOnline Access$$91397441.1 000779708 909CO $$ooai:library.usi.edu:779708$$pGLOBAL_SET 000779708 980__ $$aEBOOK 000779708 980__ $$aBIB 000779708 982__ $$aEbook 000779708 983__ $$aOnline 000779708 994__ $$a92$$bISE