Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer International Publishing
[2016]
|
Schriftenreihe: | Lecture Notes in Computer Science
9569 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource XVI, 448 Seiten Illustrationen |
ISBN: | 9783319319605 9783319319599 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-31960-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043503919 | ||
003 | DE-604 | ||
005 | 20200514 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160411s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319319605 |c Online |9 978-3-319-31960-5 | ||
020 | |a 9783319319599 |c Print |9 978-3-319-31959-9 | ||
024 | 7 | |a 10.1007/978-3-319-31960-5 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-319-31960-5 | ||
035 | |a (ZDB-2-LNC)978-3-319-31960-5 | ||
035 | |a (OCoLC)946158833 | ||
035 | |a (DE-599)BVBBV043503919 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-523 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Digital-Forensics and Watermarking |b 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers |c edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
264 | 1 | |a [Cham] |b Springer International Publishing |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XVI, 448 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9569 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Multimedia |0 (DE-588)4192358-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 0 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 0 | 4 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 5 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 0 | 6 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shi, Yun Qing |0 (DE-588)132534215 |4 edt | |
711 | 2 | |a IWDW |n 14. |d 2015 |c Tokyo |j Sonstige |0 (DE-588)1097759725 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9569 |w (DE-604)BV014880109 |9 9569 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-31960-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028920264 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l BTU01 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UBY01 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31960-5 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176141089505280 |
---|---|
adam_text | DIGITAL-FORENSICS AND WATERMARKING
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DIGITAL FORENSICS
IMAGE NOISE AND DIGITAL IMAGE FORENSICS
CAMERA SOURCE IDENTIFICATION WITH LIMITED LABELED TRAINING SET
DETECTING VIDEO FORGERY BY ESTIMATING EXTRINSIC CAMERA PARAMETERS
DISCRIMINATING BETWEEN COMPUTER-GENERATED FACIAL IMAGES AND NATURAL ONES
USING SMOOTHNESS PROPERTY AND LOCAL ENTROPY
MULTIPLE MP3 COMPRESSION DETECTION BASED ON THE STATISTICAL PROPERTIES
OF SCALE FACTORS
DETECTION OF DOUBLE COMPRESSION FOR HEVC VIDEOS BASED ON THE
CO-OCCURRENCE MATRIX OF DCT COEFFICIENTS.-AN ADVANCED TEXTURE ANALYSIS
METHOD FOR IMAGE SHARPENING DETECTION
SOURCE CAMERA MODEL IDENTIFICATION USING FEATURES FROM CONTAMINATED
SENSOR NOISE
INTER-FRAME FORGERY DETECTION FOR STATIC-BACKGROUND VIDEO BASED ON MVP
CONSISTENCY
AN EFFECTIVE DETECTION METHOD BASED ON PHYSICAL TRAITS OF RECAPTURED
IMAGES ON LCD SCREENS
STEGANOGRAPHY AND STEGANALYSIS
VIDEO STEGANALYSIS BASED ON INTRA PREDICTION MODE CALIBRATION
FEATURE SELECTION FOR HIGH DIMENSIONAL STEGANALYSIS
SYNTHETIC SPEECH DETECTION AND AUDIO STEGANOGRAPHY IN VOIP SCENARIOS
DIGITAL WATERMARKING
FINGERPRINTING FOR BROADCAST CONTENT DISTRIBUTION SYSTEM
IMAGE WATERMARKING BASED ON REFLECTANCE MODIFICATION
DIGITAL VIDEO WATERMARK OPTIMIZATION FOR DETECTING REPLICATED
TWO-DIMENSIONAL BARCODES
AN AUTHENTICATION AND RECOVERY SCHEME FOR DIGITAL SPEECH SIGNAL BASED ON
DWT
ENRICHMENT OF VISUAL APPEARANCE OF AESTHETIC QR CODE
NONDESTRUCTIVE READOUT OF COPYRIGHT INFORMATION EMBEDDED IN OBJECTS
FABRICATED WITH 3-D PRINTERS
BLIND WATERMARKING BASED ON ADAPTIVE LATTICE QUANTIZATION INDEX
MODULATION
SELF-EMBEDDING WATERMARKING SCHEME BASED ON MDS CODES
WATERMARKING METHOD USING CONCATENATED CODE FOR SCALING AND ROTATION
ATTACKS
DCT-OFDM BASED WATERMARKING SCHEME ROBUST AGAINST CLIPPING, ROTATION,
AND SCALING ATTACKS
ROBUST IMPERCEPTIBLE VIDEO WATERMARKING FOR MPEG COMPRESSION AND DA-AD
CONVERSION USING VISUAL MASKING
DETECTION OF FREQUENCY-SCALE MODIFICATION USING ROBUST AUDIO
WATERMARKING BASED ON AMPLITUDE MODULATION
AUDIO WATERMARKING USING DIFFERENT WAVELET FILTERS
REVERSIBLE DATA HIDING
A COMMUTATIVE ENCRYPTION AND REVERSIBLE WATERMARKING FOR FINGERPRINT
IMAGE
DISTORTION-FREE ROBUST REVERSIBLE WATERMARKING BY MODIFYING AND
RECORDING IWT MEANS OF IMAGE BLOCKS
REVERSIBLE DATA HIDING FOR ENCRYPTED AUDIOS BY HIGH ORDER SMOOTHNESS
COMPLETELY SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES
OPTIMAL HISTOGRAM-PAIR AND PREDICTION-ERROR BASED REVERSIBLE DATA HIDING
FOR MEDICAL IMAGES
VISUAL CRYPTOGRAPHY
AUTHENTICATED SECRET SHARING SCHEME BASED ON GMEMD
ROBUST CONTENT-BASED IMAGE HASH FUNCTIONS USING NESTED LATTICE CODES
AN IMPROVED ASPECT RATIO INVARIANT VISUAL CRYPTOGRAPHY SCHEME WITH
FLEXIBLE PIXEL EXPANSION
A NEW CONSTRUCTION OF TAGGED VISUAL CRYPTOGRAPHY SCHEME
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DIGITAL-FORENSICS AND WATERMARKING
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES REVISED SELECTED PAPERS FROM THE 14TH
INTERNATIONAL WORKSHOP ON DIGITAL-FORENSICS AND WATERMARKING, IWDW 2015,
HELD IN TOKYO, JAPAN, IN OCTOBER 2015. THE 35 PAPERS PRESENTED IN THIS
VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 54 SUBMISSIONS. THE
CONTRIBUTIONS ARE ORGANIZED IN TOPICAL SECTIONS NAMED: DIGITAL
FORENSICS; STEGANOGRAPHY AND STEGANALYSIS; DIGITAL WATERMARKING;
REVERSIBLE DATA HIDING; AND VISUAL CRYPTOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Shi, Yun Qing |
author2_role | edt |
author2_variant | y q s yq yqs |
author_GND | (DE-588)132534215 |
author_facet | Shi, Yun Qing |
building | Verbundindex |
bvnumber | BV043503919 |
classification_tum | DAT 000 DAT 050f DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)978-3-319-31960-5 (ZDB-2-LNC)978-3-319-31960-5 (OCoLC)946158833 (DE-599)BVBBV043503919 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-31960-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05634nmm a2201045zcb4500</leader><controlfield tag="001">BV043503919</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319319605</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-31960-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319319599</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-31959-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-31960-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-31960-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-319-31960-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)946158833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043503919</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital-Forensics and Watermarking</subfield><subfield code="b">14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers</subfield><subfield code="c">edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XVI, 448 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9569</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Yun Qing</subfield><subfield code="0">(DE-588)132534215</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IWDW</subfield><subfield code="n">14.</subfield><subfield code="d">2015</subfield><subfield code="c">Tokyo</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1097759725</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9569</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9569</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920264</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31960-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043503919 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:27:27Z |
institution | BVB |
institution_GND | (DE-588)1097759725 |
isbn | 9783319319605 9783319319599 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028920264 |
oclc_num | 946158833 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
owner_facet | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
physical | 1 Online-Ressource XVI, 448 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC-2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen [Cham] Springer International Publishing [2016] © 2016 1 Online-Ressource XVI, 448 Seiten Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Volume 9569 0302-9743 Computer science Computer security Data encryption (Computer science) Coding theory Algorithms Computers and civilization Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory Informatik Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Multimedia (DE-588)4192358-3 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Elektronisches Wasserzeichen (DE-588)4572344-8 s Computerforensik (DE-588)4774034-6 s Kryptoanalyse (DE-588)4830502-9 s Steganographie (DE-588)4617648-2 s Authentifikation (DE-588)4330656-1 s Multimedia (DE-588)4192358-3 s Datensicherung (DE-588)4011144-1 s DE-604 Shi, Yun Qing (DE-588)132534215 edt IWDW 14. 2015 Tokyo Sonstige (DE-588)1097759725 oth Lecture Notes in Computer Science 9569 (DE-604)BV014880109 9569 https://doi.org/10.1007/978-3-319-31960-5 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Coding theory Algorithms Computers and civilization Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory Informatik Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Multimedia (DE-588)4192358-3 gnd Authentifikation (DE-588)4330656-1 gnd Computerforensik (DE-588)4774034-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Steganographie (DE-588)4617648-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4572344-8 (DE-588)4192358-3 (DE-588)4330656-1 (DE-588)4774034-6 (DE-588)4830502-9 (DE-588)4617648-2 (DE-588)4011144-1 (DE-588)1071861417 |
title | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers |
title_auth | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers |
title_exact_search | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers |
title_full | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
title_fullStr | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
title_full_unstemmed | Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
title_short | Digital-Forensics and Watermarking |
title_sort | digital forensics and watermarking 14th international workshop iwdw 2015 tokyo japan october 7 10 2015 revised selected papers |
title_sub | 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers |
topic | Computer science Computer security Data encryption (Computer science) Coding theory Algorithms Computers and civilization Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory Informatik Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Multimedia (DE-588)4192358-3 gnd Authentifikation (DE-588)4330656-1 gnd Computerforensik (DE-588)4774034-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Steganographie (DE-588)4617648-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Coding theory Algorithms Computers and civilization Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory Informatik Elektronisches Wasserzeichen Multimedia Authentifikation Computerforensik Kryptoanalyse Steganographie Datensicherung Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-31960-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920264&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT shiyunqing digitalforensicsandwatermarking14thinternationalworkshopiwdw2015tokyojapanoctober7102015revisedselectedpapers AT iwdwtokyo digitalforensicsandwatermarking14thinternationalworkshopiwdw2015tokyojapanoctober7102015revisedselectedpapers |