FEEDBACK Smiley face
Normal view MARC view ISBD view

Digital Forensics and Watermarking [electronic resource] :15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers /

Contributor(s): Shi, Yun Qing [editor.] | Kim, Hyoung Joong [editor.] | Perez-Gonzalez, Fernando [editor.] | Liu, Feng [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 10082Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017.Description: XIV, 618 p. 269 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319534657.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Coding theory | Algorithms | Image processing | Computers and civilization | Computer Science | Data Encryption | Systems and Data Security | Algorithm Analysis and Problem Complexity | Image Processing and Computer Vision | Computers and Society | Coding and Information TheoryOnline resources: Click here to access online In: Springer eBooksSummary: This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in