|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking. Full Product DetailsAuthor: Xianfeng Zhao , Zhenjun Tang , Pedro Comesaña-Alfaro , Alessandro PivaPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2023 Volume: 13825 Weight: 0.361kg ISBN: 9783031251146ISBN 10: 3031251148 Pages: 219 Publication Date: 29 January 2023 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsSteganology.- High-Performance Steganographic Coding Based on Sub-Polarized Channel.- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC.- Forensics and Security Analysis.- SE-ResNet56: Robust Network Model for Deepfake Detection.- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder.- Visual Explanations for Exposing Potential Inconsistency of Deepfakes.- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method.- Manipulated Face Detection and Localization Based on Semantic Segmentation.- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information?.- Watermarking.- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code.- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability.- Adaptive Robust Watermarking Method Based on Deep Neural Networks.- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking.- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images.- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |