000 05396nam a22006255i 4500
001 978-3-031-49803-9
003 DE-He213
005 20240730171451.0
007 cr nn 008mamaa
008 240304s2024 sz | s |||| 0|eng d
020 _a9783031498039
_9978-3-031-49803-9
024 7 _a10.1007/978-3-031-49803-9
_2doi
050 4 _aQ325.5-.7
072 7 _aUYQM
_2bicssc
072 7 _aMAT029000
_2bisacsh
072 7 _aUYQM
_2thema
082 0 4 _a006.31
_223
245 1 0 _aAdversarial Multimedia Forensics
_h[electronic resource] /
_cedited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXVIII, 284 p. 92 illus., 83 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v104
505 0 _aChapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection's Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection.
520 _aThis book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book's content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs. The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy. Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource.
650 0 _aMachine learning.
_91831
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_998731
650 0 _aComputer crimes.
_910774
650 0 _aSignal processing.
_94052
650 0 _aArtificial intelligence.
_93407
650 1 4 _aMachine Learning.
_91831
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aComputer Crime.
_986411
650 2 4 _aSignal, Speech and Image Processing.
_931566
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aNowroozi, Ehsan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998734
700 1 _aKallas, Kassem.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998735
700 1 _aJolfaei, Alireza.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998736
710 2 _aSpringerLink (Online service)
_998738
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031498022
776 0 8 _iPrinted edition:
_z9783031498046
776 0 8 _iPrinted edition:
_z9783031498053
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v104
_998740
856 4 0 _uhttps://doi.org/10.1007/978-3-031-49803-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87606
_d87606