|
Showing 1 - 3 of
3 matches in All Departments
The book presents recent advances in the generation and detection
of fake multimedia. It also presents some frontiers in defensive
techniques in front of skillfully cloned media. The ultimate
purpose of the research direction presented by this book is to
build up a trustworthy media network benefited by an iron dome in
front of media clones’ attacks. The book focusses on (1)
applications of deep generative models in the generation of fake
multimedia, and (2) cyber-defensive and detective techniques in
front of cyberattacks. The book is composed of three parts: (i)
introduction, (ii) fake media generation, and (iii) fake media
detection.
The book presents recent advances in the generation and detection
of fake multimedia. It also presents some frontiers in defensive
techniques in front of skillfully cloned media. The ultimate
purpose of the research direction presented by this book is to
build up a trustworthy media network benefited by an iron dome in
front of media clones' attacks. The book focusses on (1)
applications of deep generative models in the generation of fake
multimedia, and (2) cyber-defensive and detective techniques in
front of cyberattacks. The book is composed of three parts: (i)
introduction, (ii) fake media generation, and (iii) fake media
detection.
|
Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Isao Echizen
|
R2,938
Discovery Miles 29 380
|
Ships in 10 - 15 working days
|
This book constitutes revised selected papers from the 14th
International Workshop on Digital-Forensics and Watermarking, IWDW
2015, held in Tokyo, Japan, in October 2015. The 35 papers
presented in this volume were carefully reviewed and selected from
54 submissions. The contributions are organized in topical sections
named: digital forensics; steganography and steganalysis; digital
watermarking; reversible data hiding; and visual cryptography.
|
You may like...
LSD
Labrinth, Sia, …
CD
R213
R71
Discovery Miles 710
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|