Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9023 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 626 S.) Ill., graph. Darst. |
ISBN: | 9783319193212 9783319193205 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-19321-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042725100 | ||
003 | DE-604 | ||
005 | 20150806 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150730s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319193212 |c Online |9 978-3-319-19321-2 | ||
020 | |a 9783319193205 |c Print |9 978-3-319-19320-5 | ||
024 | 7 | |a 10.1007/978-3-319-19321-2 |2 doi | |
035 | |a (OCoLC)913025592 | ||
035 | |a (DE-599)BVBBV042725100 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Digital-Forensics and Watermarking |b 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers |c edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 626 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9023 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Multimedia |0 (DE-588)4192358-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
651 | 7 | |a Taipeh |0 (DE-588)4078134-3 |2 gnd |9 rswk-swf | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 0 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 0 | 4 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 5 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 0 | 6 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 7 | |a Taipeh |0 (DE-588)4078134-3 |D g |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shi, Yun Qing |e Sonstige |0 (DE-588)132534215 |4 oth | |
711 | 2 | |a IWDW |n 13. |d 2014 |c Taipeh |j Sonstige |0 (DE-588)1072567849 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9023 |w (DE-604)BV014880109 |9 9023 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-19321-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028156221 |
Datensatz im Suchindex
_version_ | 1804174933413068800 |
---|---|
adam_text | DIGITAL-FORENSICS AND WATERMARKING
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FORENSICS
WATERMARKING
REVERSIBLE DATA HIDING
VISUAL CRYPTOGRAPHY.-STEGANOGRAPHY AND STEGANALYSIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DIGITAL-FORENSICS AND WATERMARKING
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-PROCEEDINGS OF THE
13TH INTERNATIONAL WORKSHOP ON DIGITAL-FORENSICS AND WATERMARKING, IWDW
2014, HELD IN TAIPEI, TAIWAN, DURING OCTOBER 2014. THE 32 FULL AND 14
POSTER PAPERS, PRESENTED TOGETHER WITH 1 KEYNOTE SPEECH, WERE CAREFULLY
REVIEWED AND SELECTED FROM 79 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN
TOPICAL SECTIONS ON FORENSICS; WATERMARKING; REVERSIBLE DATA HIDING;
VISUAL CRYPTOGRAPHY; AND STEGANOGRAPHY AND STEGANALYSIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)132534215 |
building | Verbundindex |
bvnumber | BV042725100 |
classification_tum | DAT 000 DAT 465f DAT 050f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)913025592 (DE-599)BVBBV042725100 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-19321-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03646nmm a2200781zcb4500</leader><controlfield tag="001">BV042725100</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150806 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150730s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319193212</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-19321-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319193205</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-19320-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-19321-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913025592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042725100</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital-Forensics and Watermarking</subfield><subfield code="b">13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers</subfield><subfield code="c">edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 626 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9023</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Taipeh</subfield><subfield code="0">(DE-588)4078134-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Taipeh</subfield><subfield code="0">(DE-588)4078134-3</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Yun Qing</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)132534215</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IWDW</subfield><subfield code="n">13.</subfield><subfield code="d">2014</subfield><subfield code="c">Taipeh</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1072567849</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9023</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9023</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-19321-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028156221</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
geographic | Taipeh (DE-588)4078134-3 gnd |
geographic_facet | Taipeh |
id | DE-604.BV042725100 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:08:16Z |
institution | BVB |
institution_GND | (DE-588)1072567849 |
isbn | 9783319193212 9783319193205 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028156221 |
oclc_num | 913025592 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 626 S.) Ill., graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang Cham Springer International Publishing 2015 1 Online-Ressource (XIII, 626 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9023 0302-9743 Computer science Data protection Data encryption (Computer science) Coding theory Biometrics Computer Science Data Encryption Systems and Data Security Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Multimedia (DE-588)4192358-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Taipeh (DE-588)4078134-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Elektronisches Wasserzeichen (DE-588)4572344-8 s Computerforensik (DE-588)4774034-6 s Kryptoanalyse (DE-588)4830502-9 s Steganographie (DE-588)4617648-2 s Authentifikation (DE-588)4330656-1 s Multimedia (DE-588)4192358-3 s Datensicherung (DE-588)4011144-1 s Taipeh (DE-588)4078134-3 g DE-604 Shi, Yun Qing Sonstige (DE-588)132534215 oth IWDW 13. 2014 Taipeh Sonstige (DE-588)1072567849 oth Lecture Notes in Computer Science 9023 (DE-604)BV014880109 9023 https://doi.org/10.1007/978-3-319-19321-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Biometrics Computer Science Data Encryption Systems and Data Security Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd Steganographie (DE-588)4617648-2 gnd Computerforensik (DE-588)4774034-6 gnd Multimedia (DE-588)4192358-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4011144-1 (DE-588)4617648-2 (DE-588)4774034-6 (DE-588)4192358-3 (DE-588)4830502-9 (DE-588)4572344-8 (DE-588)4078134-3 (DE-588)1071861417 |
title | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers |
title_auth | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers |
title_exact_search | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers |
title_full | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
title_fullStr | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
title_full_unstemmed | Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
title_short | Digital-Forensics and Watermarking |
title_sort | digital forensics and watermarking 13th international workshop iwdw 2014 taipei taiwan october 1 4 2014 revised selected papers |
title_sub | 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Biometrics Computer Science Data Encryption Systems and Data Security Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd Steganographie (DE-588)4617648-2 gnd Computerforensik (DE-588)4774034-6 gnd Multimedia (DE-588)4192358-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Biometrics Computer Science Data Encryption Systems and Data Security Coding and Information Theory Informatik Authentifikation Datensicherung Steganographie Computerforensik Multimedia Kryptoanalyse Elektronisches Wasserzeichen Taipeh Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-19321-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028156221&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT shiyunqing digitalforensicsandwatermarking13thinternationalworkshopiwdw2014taipeitaiwanoctober142014revisedselectedpapers AT iwdwtaipeh digitalforensicsandwatermarking13thinternationalworkshopiwdw2014taipeitaiwanoctober142014revisedselectedpapers |