Isao Echizen - Böcker
Visar alla böcker från författaren Isao Echizen. Handla med fri frakt och snabb leverans.
4 produkter
4 produkter
Del 9569 - Lecture Notes in Computer Science
Digital-Forensics and Watermarking
14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
Häftad, Engelska, 2016
551 kr
Skickas inom 10-15 vardagar
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions.
Advances in Information and Computer Security
5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings
Häftad, Engelska, 2010
556 kr
Skickas inom 7-10 vardagar
This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in Kobe, Japan, in November 2010. The 22 revised full papers presented together with 2 invited talk were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on encryption, data and web security, protocols, network security, block cipher, and implementation and real life security.
1 855 kr
Skickas inom 10-15 vardagar
The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
1 855 kr
Skickas inom 10-15 vardagar
The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.