Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: International Workshops on Digital Forensics and Watermarking Jinan (VerfasserIn)
Weitere Verfasser: Ma, Bin (HerausgeberIn), Li, Jian (HerausgeberIn), Li, Qi (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Singapore Springer [2024]
Ausgabe:1st ed. 2024
Schriftenreihe:Lecture notes in computer science 14511
Schlagworte:
Online-Zugang:DE-522
DE-634
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-824
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV049673452
003 DE-604
005 20240517
006 a |||| 10|||
007 cr|uuu---uuuuu
008 240503s2024 |||| o||u| ||||||eng d
020 |a 9789819725854  |c Online  |9 978-981-97-2585-4 
024 7 |a 10.1007/978-981-97-2585-4  |2 doi 
035 |a (ZDB-2-SCS)9789819725854 
035 |a (ZDB-2-LNC)9789819725854 
035 |a (OCoLC)1437878017 
035 |a (DE-599)BVBBV049673452 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-19  |a DE-83  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-824  |a DE-522  |a DE-384  |a DE-M347  |a DE-573  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 5,824  |2 23 
084 |a DAT 465  |2 stub 
084 |a DAT 050  |2 stub 
111 2 |a International Workshops on Digital Forensics and Watermarking  |n 22.  |d 2023  |c Jinan  |j Verfasser  |0 (DE-588)1329877276  |4 aut 
245 1 0 |a Digital forensics and watermarking  |b 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers  |c Bin Ma, Jian Li, Qi Li, editors 
264 1 |a Singapore  |b Springer  |c [2024] 
300 |a 1 Online-Ressource (xiii, 320 Seiten)  |b 117 Illustrationen, 96 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 14511  |x 1611-3349 
650 4 |a Cryptology 
650 4 |a Numerical Analysis 
650 4 |a Computer Vision 
650 4 |a Machine Learning 
650 4 |a Computer Communication Networks 
650 4 |a Computer Engineering and Networks 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
650 4 |a Numerical analysis 
650 4 |a Computer vision 
650 4 |a Machine learning 
650 4 |a Computer networks  
650 4 |a Computer engineering 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y Jinan  |z 2023  |2 gnd-content 
700 1 |a Ma, Bin  |4 edt 
700 1 |a Li, Jian  |4 edt 
700 1 |a Li, Qi  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-97-2584-7 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-97-2586-1 
830 0 |a Lecture notes in computer science  |v 14511  |w (DE-604)BV014880109  |9 14511 
856 4 0 |u https://doi.org/10.1007/978-981-97-2585-4  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2024 
940 1 |q ZDB-2-LNC_2024 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-522  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-1050  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2024  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-355  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-824  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-2585-4  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 1072350
DE-BY-UBG_katkey 197246111
DE-BY-UBG_local_url Verlag
https://doi.org/10.1007/978-981-97-2585-4
_version_ 1816344500421787648
adam_text
any_adam_object
author2 Ma, Bin
Li, Jian
Li, Qi
author2_role edt
edt
edt
author2_variant b m bm
j l jl
q l ql
author_corporate International Workshops on Digital Forensics and Watermarking Jinan
author_corporate_role aut
author_facet Ma, Bin
Li, Jian
Li, Qi
International Workshops on Digital Forensics and Watermarking Jinan
author_sort International Workshops on Digital Forensics and Watermarking Jinan
building Verbundindex
bvnumber BV049673452
classification_tum DAT 465
DAT 050
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9789819725854
(ZDB-2-LNC)9789819725854
(OCoLC)1437878017
(DE-599)BVBBV049673452
dewey-full 5,824
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 5,824
dewey-search 5,824
dewey-sort 15 3824
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-981-97-2585-4
edition 1st ed. 2024
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV049673452</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240517</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240503s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819725854</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-97-2585-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-2585-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789819725854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9789819725854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437878017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049673452</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5,824</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Workshops on Digital Forensics and Watermarking</subfield><subfield code="n">22.</subfield><subfield code="d">2023</subfield><subfield code="c">Jinan</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1329877276</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics and watermarking</subfield><subfield code="b">22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers</subfield><subfield code="c">Bin Ma, Jian Li, Qi Li, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 320 Seiten)</subfield><subfield code="b">117 Illustrationen, 96 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">14511</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Numerical Analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Numerical analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">Jinan</subfield><subfield code="z">2023</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, Bin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Jian</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Qi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-97-2584-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-97-2586-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">14511</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">14511</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2024</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2024</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-2585-4</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift Jinan 2023 gnd-content
genre_facet Konferenzschrift Jinan 2023
id DE-604.BV049673452
illustrated Not Illustrated
index_date 2024-09-19T15:57:26Z
indexdate 2024-11-21T15:58:14Z
institution BVB
institution_GND (DE-588)1329877276
isbn 9789819725854
issn 1611-3349
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035016399
oclc_num 1437878017
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-83
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
owner_facet DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-83
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xiii, 320 Seiten) 117 Illustrationen, 96 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2024
ZDB-2-LNC_2024
ZDB-2-LNC ZDB-2-LNC_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers
Cryptology
Numerical Analysis
Computer Vision
Machine Learning
Computer Communication Networks
Computer Engineering and Networks
Cryptography
Data encryption (Computer science)
Numerical analysis
Computer vision
Machine learning
Computer networks 
Computer engineering
Lecture notes in computer science
subject_GND (DE-588)1071861417
title Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers
title_auth Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers
title_exact_search Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers
title_full Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers Bin Ma, Jian Li, Qi Li, editors
title_fullStr Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers Bin Ma, Jian Li, Qi Li, editors
title_full_unstemmed Digital forensics and watermarking 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers Bin Ma, Jian Li, Qi Li, editors
title_short Digital forensics and watermarking
title_sort digital forensics and watermarking 22nd international workshop iwdw 2023 jinan china november 25 26 2023 revised selected papers
title_sub 22nd international workshop, IWDW 2023, Jinan, China, November 25–26, 2023, revised selected papers
topic Cryptology
Numerical Analysis
Computer Vision
Machine Learning
Computer Communication Networks
Computer Engineering and Networks
Cryptography
Data encryption (Computer science)
Numerical analysis
Computer vision
Machine learning
Computer networks 
Computer engineering
topic_facet Cryptology
Numerical Analysis
Computer Vision
Machine Learning
Computer Communication Networks
Computer Engineering and Networks
Cryptography
Data encryption (Computer science)
Numerical analysis
Computer vision
Machine learning
Computer networks 
Computer engineering
Konferenzschrift Jinan 2023
url https://doi.org/10.1007/978-981-97-2585-4
volume_link (DE-604)BV014880109
work_keys_str_mv AT internationalworkshopsondigitalforensicsandwatermarkingjinan digitalforensicsandwatermarking22ndinternationalworkshopiwdw2023jinanchinanovember25262023revisedselectedpapers
AT mabin digitalforensicsandwatermarking22ndinternationalworkshopiwdw2023jinanchinanovember25262023revisedselectedpapers
AT lijian digitalforensicsandwatermarking22ndinternationalworkshopiwdw2023jinanchinanovember25262023revisedselectedpapers
AT liqi digitalforensicsandwatermarking22ndinternationalworkshopiwdw2023jinanchinanovember25262023revisedselectedpapers