このページのリンク

Digital Forensics and Watermarking : 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers / edited by Xianfeng Zhao, Zhenjun Tang, Pedro Comesaña-Alfaro, Alessandro Piva
(Lecture Notes in Computer Science. ISSN:16113349 ; 13825)

データ種別 電子ブック
1st ed. 2023.
出版者 (Cham : Springer Nature Switzerland : Imprint: Springer)
出版年 2023
大きさ XII, 219 p. 94 illus., 76 illus. in color : online resource
著者標目 Zhao, Xianfeng editor
Tang, Zhenjun editor
Comesaña-Alfaro, Pedro editor
Piva, Alessandro editor
SpringerLink (Online service)

所蔵情報を非表示

URL
射水-電子 007 EB0002397 Computer Scinece R0 2005-6,2022-3

9783031251153

書誌詳細を非表示

一般注記 Steganology -- High-Performance Steganographic Coding Based on Sub-Polarized Channel -- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC -- Forensics and Security Analysis -- SE-ResNet56: Robust Network Model for Deepfake Detection -- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder -- Visual Explanations for Exposing Potential Inconsistency of Deepfakes -- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method -- Manipulated Face Detection and Localization Based on Semantic Segmentation -- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information? -- Watermarking -- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code -- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability -- Adaptive Robust Watermarking Method Based on Deep Neural Networks -- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking -- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images -- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking
HTTP:URL=https://doi.org/10.1007/978-3-031-25115-3
件 名 LCSH:Cryptography
LCSH:Data encryption (Computer science)
LCSH:Numerical analysis
LCSH:Computer vision
LCSH:Machine learning
LCSH:Computer networks 
LCSH:Computer engineering
FREE:Cryptology
FREE:Numerical Analysis
FREE:Computer Vision
FREE:Machine Learning
FREE:Computer Communication Networks
FREE:Computer Engineering and Networks
分 類 LCC:QA268
DC23:005.824
書誌ID EB00001785
ISBN 9783031251153

 類似資料