000798339 000__ 03110cam\a2200577Mi\4500 000798339 001__ 798339 000798339 005__ 20230306143448.0 000798339 006__ m\\\\\o\\d\\\\\\\\ 000798339 007__ cr\nn\nnnunnun 000798339 008__ 170725s2017\\\\gw\\\\\\o\\\\\000\0\eng\d 000798339 019__ $$a1001286707$$a1004389339 000798339 020__ $$a9783319641850 000798339 020__ $$a3319641859 000798339 020__ $$z9783319641843 000798339 020__ $$a3319641840 000798339 020__ $$a9783319641843 000798339 0247_ $$a10.1007/978-3-319-64185-0$$2doi 000798339 035__ $$aSP(OCoLC)on1002312717 000798339 035__ $$aSP(OCoLC)1002312717$$z(OCoLC)1001286707$$z(OCoLC)1004389339 000798339 040__ $$aAZU$$beng$$cAZU$$dGW5XE$$dUAB$$dCOO 000798339 049__ $$aISEA 000798339 050_4 $$aQA76.9.A25 000798339 08204 $$a005.8/24$$223 000798339 24500 $$aDigital Forensics and Watermarking :$$b16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /$$cedited by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim. 000798339 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2017. 000798339 300__ $$a1 online resource (xi, 422 pages) :$$billustrations. 000798339 336__ $$atext$$btxt$$2rdacontent 000798339 337__ $$acomputer$$bc$$2rdamedia 000798339 338__ $$aonline resource$$bcr$$2rdacarrier 000798339 347__ $$atext file$$bPDF$$2rda 000798339 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10431 000798339 5050_ $$aDigital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches. 000798339 506__ $$aAccess limited to authorized users. 000798339 520__ $$aThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches. 000798339 650_0 $$aComputer science. 000798339 650_0 $$aComputer security. 000798339 650_0 $$aData encryption (Computer science). 000798339 650_0 $$aCoding theory. 000798339 650_0 $$aAlgorithms. 000798339 650_0 $$aImage processing. 000798339 650_0 $$aComputers and civilization. 000798339 7001_ $$aKraetzer, Christian.$$eeditor. 000798339 7001_ $$aShi, Yun-Qing.$$eeditor. 000798339 7001_ $$aDittmann, Jana.$$eeditor. 000798339 7001_ $$aKim, Hyoung Joong.$$eeditor. 000798339 77608 $$iPrint version:$$z9783319641843 000798339 830_0 $$aLecture Notes in Computer Science ;$$v10431. 000798339 852__ $$bebk 000798339 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-64185-0$$zOnline Access$$91397441.1 000798339 909CO $$ooai:library.usi.edu:798339$$pGLOBAL_SET 000798339 980__ $$aEBOOK 000798339 980__ $$aBIB 000798339 982__ $$aEbook 000798339 983__ $$aOnline 000798339 994__ $$a92$$bISE