Digital-Forensics and Watermarking 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / [electronic resource] :
edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim.
- 1st ed. 2013.
- XX, 532 p. 245 illus. online resource.
- Security and Cryptology, 7809 2946-1863 ; .
- Security and Cryptology, 7809 .
Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
9783642400995
10.1007/978-3-642-40099-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Coding theory.
Information theory.
Image processing--Digital techniques.
Computer vision.
Cryptology.
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Computer Imaging, Vision, Pattern Recognition and Graphics.
QA268
005.824
Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
9783642400995
10.1007/978-3-642-40099-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Coding theory.
Information theory.
Image processing--Digital techniques.
Computer vision.
Cryptology.
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Computer Imaging, Vision, Pattern Recognition and Graphics.
QA268
005.824