Cantitate/Preț
Produs

Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9569

Editat de Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
en Limba Engleză Paperback – 31 mar 2016
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions. The contributions are organized intopical sections named: digital forensics; steganography and steganalysis;digital watermarking; reversible data hiding; and visual cryptography.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 38302 lei

Nou

Puncte Express: 575

Preț estimativ în valută:
7331 7733$ 6109£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319319599
ISBN-10: 3319319590
Pagini: 448
Ilustrații: XVI, 448 p. 224 illus.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.65 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Digital Forensics.- Image Noise and Digital ImageForensics.- Camera Source Identification with Limited Labeled Training Set.- DetectingVideo Forgery By Estimating Extrinsic Camera Parameters.- Discriminatingbetween Computer-Generated Facial Images and Natural Ones Using SmoothnessProperty and Local Entropy.- Multiple MP3 Compression Detection based on theStatistical Properties of Scale Factors.- Detection of Double compression forHEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An AdvancedTexture Analysis Method for Image Sharpening Detection.- Source Camera ModelIdentification Using Features from contaminated Sensor Noise.- Inter-frameForgery Detection for Static-Background Video Based on MVP Consistency.- AnEffective Detection Method Based On Physical Traits of Recaptured Images On LCDScreens.- Steganography and Steganalysis.- Video Steganalysis Based on IntraPrediction Mode Calibration.- Feature Selection for High DimensionalSteganalysis.- Syntheticspeech detection and audio steganography in VoIPscenarios.- Digital Watermarking.- Fingerprinting for Broadcast ContentDistribution System.- Image Watermarking Based on Reflectance Modification.- DigitalVideo Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes.-An Authentication and Recovery Scheme for Digital Speech Signal based on DWT.- Enrichmentof Visual Appearance of Aesthetic QR Code.- Nondestructive Readout of CopyrightInformation Embedded in Objects Fabricated with 3-D Printers.- BlindWatermarking Based on Adaptive Lattice Quantization Index Modulation.- Self-embeddingWatermarking Scheme Based on MDS Codes.- Watermarking Method using ConcatenatedCode for Scaling and Rotation Attacks.- DCT-OFDM Based Watermarking SchemeRobust against Clipping, Rotation, and Scaling Attacks.- Robust Imperceptible VideoWatermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.- Detectionof frequency-scale modification using robust audio watermarking based onamplitude modulation.- Audio Watermarking Using Different Wavelet Filters.- ReversibleData Hiding.- A Commutative Encryption and Reversible Watermarking forFingerprint Image.- Distortion-Free Robust Reversible Watermarking By Modifyingand Recording IWT Means of Image Blocks.- Reversible Data Hiding for EncryptedAudios by High Order Smoothness.- Completely Separable Reversible Data Hidingin Encrypted Images.- Optimal Histogram-pair and Prediction-error BasedReversible Data Hiding for Medical Images.- Visual Cryptography.- AuthenticatedSecret Sharing Scheme Based on GMEMD.- Robust Content-Based Image HashFunctions Using Nested Lattice Codes.- An Improved Aspect Ratio InvariantVisual Cryptography Scheme with Flexible Pixel Expansion.- A New Constructionof Tagged Visual Cryptography Scheme.

Caracteristici

Includes supplementary material: sn.pub/extras