Digital Forensics and Watermarking : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /

This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are cover...

Full description

Saved in:
Bibliographic Details
Corporate Authors: SpringerLink (Online service)
Group Author: Kraetzer, Christian (Editor); Shi, Yun-Qing (Editor); Dittmann, Jana (Editor); Kim, Hyoung Joong (Editor)
Published: Springer International Publishing : Imprint: Springer,
Publisher Address: Cham :
Publication Dates: 2017.
Literature type: eBook
Language: English
Series: Lecture Notes in Computer Science, 10431
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-319-64185-0
Summary: This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
Carrier Form: 1 online resource (XI, 422 pages): illustrations.
ISBN: 9783319641850
Index Number: QA76
CLC: TP309-532
Contents: Digital watermarking -- Steganography and steganalysis -- Forensics and anti-forensics -- Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection -- Emerging threats of criminal use of information hiding -- Usage, scenarios and detection approaches.