000 | 05396nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-49803-9 | ||
003 | DE-He213 | ||
005 | 20240730171451.0 | ||
007 | cr nn 008mamaa | ||
008 | 240304s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031498039 _9978-3-031-49803-9 |
||
024 | 7 |
_a10.1007/978-3-031-49803-9 _2doi |
|
050 | 4 | _aQ325.5-.7 | |
072 | 7 |
_aUYQM _2bicssc |
|
072 | 7 |
_aMAT029000 _2bisacsh |
|
072 | 7 |
_aUYQM _2thema |
|
082 | 0 | 4 |
_a006.31 _223 |
245 | 1 | 0 |
_aAdversarial Multimedia Forensics _h[electronic resource] / _cedited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXVIII, 284 p. 92 illus., 83 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x2512-2193 ; _v104 |
|
505 | 0 | _aChapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection's Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection. | |
520 | _aThis book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book's content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs. The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy. Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource. | ||
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _998731 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
650 | 2 | 4 |
_aComputer Crime. _986411 |
650 | 2 | 4 |
_aSignal, Speech and Image Processing. _931566 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aNowroozi, Ehsan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998734 |
|
700 | 1 |
_aKallas, Kassem. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998735 |
|
700 | 1 |
_aJolfaei, Alireza. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998736 |
|
710 | 2 |
_aSpringerLink (Online service) _998738 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031498022 |
776 | 0 | 8 |
_iPrinted edition: _z9783031498046 |
776 | 0 | 8 |
_iPrinted edition: _z9783031498053 |
830 | 0 |
_aAdvances in Information Security, _x2512-2193 ; _v104 _998740 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-49803-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87606 _d87606 |