Muutke küpsiste eelistusi

E-raamat: Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. 

The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.
Steganology.- High-Performance Steganographic Coding Based on
Sub-Polarized Channel.- High-Capacity Adaptive Steganography Based on
Transform Coefficient for HEVC.- Forensics and Security
Analysis.- SE-ResNet56: Robust Network Model for Deepfake Detection.- Voice
Conversion Using Learnable Similarity-Guided Masked Autoencoder.- Visual
Explanations for Exposing Potential Inconsistency of Deepfakes.- Improving
the Transferability of Adversarial Attacks through Both Front and Rear Vector
Method.- Manipulated Face Detection and Localization Based on Semantic
Segmentation.- Deep Learning Image Age Approximation - What is more Relevant:
Image Content or Age Information?.- Watermarking.-  Physical Anti-Copying
Semi-Robust Random Watermarking for QR Code.- Robust and Imperceptible
Watermarking Scheme for GWAS Data Traceability.- Adaptive Robust Watermarking
Method Based on Deep Neural Networks.- Adaptive Despread Spectrum-Based Image
Watermarking for Fast Product Tracking.- Reversible Data Hiding via Arranging
Blocks of Bit-Planes in Encrypted Images.- High Capacity Reversible Data
Hiding for Encrypted 3D Mesh Models Based on Topology.