- Table View
- List View
Digital Financial Inclusion: Towards Inclusive and Sustainable Finance for All
by Peter GoldfinchWith the arrival of the ‘Internet of Things’ (IoT), smartphones, real-time payments systems, plus FinTech activity, Financial Inclusion services can now be integrated into a country’s National Payment System (NPS), which means there should be no systemic barriers to transitioning the socio-economic pyramid, as actors build their financial status. This, however, is not the case. This book is a comprehensive guide to understanding the transition of financial services from cash-based to digital-based systems, with a focus on Financial Inclusion.It explores the success of Financial Inclusion programs in promoting economic activity and lifting people out of poverty. It does not concentrate on a single deployment or approach, rather, it takes a broader view. The book surveys the technology and infrastructure required to build digital payment systems, as well as the regulatory and governance frameworks that enable their operation, however, the major focus is on the incorporation of these financial services within communities in order to deliver social outcomes. The book opens the conversation, proposing a new method of measuring Financial Inclusion. It takes a critical but constructive look at the field over the last 20+ years and discusses the key learnings. It examines the Kenya mobile money approach to Financial Inclusion, compared with the Indian bank lead approach, and delivers a broad-based plan on how the programs can be more effective in the future.Financial Inclusion requires a pathway to progress, through a period of technology transformation. The foundation is provided by this book and the reader, on finishing it, will have a comprehensive appreciation of the subject matter.
Digital Fingerprinting
by Cliff Wang Ryan M. Gerdes Yong Guan Sneha Kumar KaseraThis is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference.
The Digital-First Customer Experience: Seven Design Strategies from the World’s Leading Brands
by Joe WheelerThe definitive guide to designing digital-first experiences customers love. In his third book on the topic of customer experience, bestselling author and consultant Joe Wheeler tackles the challenges many organizations are facing as they attempt to design compelling experiences in a digital-first world. It features case studies of leading brands including Lemonade, Spotify, CEMEX, VMware, Starbucks, NIKE and Amazon.Part One introduces the new "3 Cs", key trends associated with technology convergence, competition and culture change in a post-pandemic world. Part Two takes a deep dive into seven design strategies, from designing emotional peaks across channels to empowering customers through immersive experiences that merge physical and digital assets. Part Three provides a playbook for how to design digital-first experiences, including how to solve the right problems, develop a measurable business case, design digital-first experiences customers love and execute the new design at scale.
Digital Fluency: Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation
by Volker LangIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge technologies are expanding rapidly, and your daily life will continue to be affected by each of them. There is no better time than now to get started and become digitally fluent.You need not have previous knowledge of these versatile technologies, as author Volker Lang will expertly guide you through this digital age. He illustrates key concepts and applications in numerous practical examples and more than 48 catchy figures throughout Digital Fluency. The end of each chapter presents you with a helpful implementation checklist of central lessons before proceeding to the next. This book gets to the heart of digital buzzwords and concepts, and tells you what they truly mean. Breaking down topics such as automated driving and intelligent robotics powered by artificial intelligence, blockchain-based cryptocurrencies and smart contracts, drug development and optimization of financial investment portfolios by quantum computing, and more is imperative to being ready for what the future of industry holds. Whether your own digital transformation journey takes place within your private or public organization, your studies, or your individual household, Digital Fluency maps out a concrete digital action plan for all of your technology and innovation strategy needs.What You Will Learn Gain guidance in the digital age without requiring any previous knowledge about digital technologies and digital transformationGet acquainted with the most popular current and prospective applications of artificial intelligence, blockchain technology, and quantum computing across a wide range of industries including healthcare, financial services, and the automobile industryBecome familiar with the digital innovation models of Amazon, Google, Microsoft, IBM, and other world-leading organizations Implement your own digital transformation successfully along the eight core dimensions of a concrete digital action planWho This Book Is ForThought-leaders, business executives and industry strategists, management and strategy consultants, politicians and policy makers, entrepreneurs, financial analysts, investors and venture capitalists, students and research scientists, as well as general readers, who want to become digitally fluent.
Digital-for-Development: 12th International Development Informatics Association Conference, IDIA 2022, Mbombela, South Africa, November 22–25, 2022, Revised Selected Papers (Communications in Computer and Information Science #1774)
by Patrick Ndayizigamiye Hossana Twinomurinzi Billy Kalema Kelvin Bwalya Mncedisi BembeThis book constitutes the refereed proceedings of the 12th International Development Informatics Association Conference, IDIA 2022, held in Mbombela, South Africa, in November 2022. The 20 revised full papers presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on theories and practices in digital-for-development ecosystems; emerging technologies for transformation, inclusion and sustainable development; privacy and security in digital-for-development ecosystems; human-computer interaction (HCI) for digital inclusion; artificial intelligence (AI) for good.
Digital Forensic Art Techniques: A Professional’s Guide to Corel Painter
by Natalie MurryDigital Forensic Art Techniques: A Professional’s Guide to Corel PainterTM illustrates hands-on techniques to digitally create forensic art for police and investigative purposes. Coverage focuses specifically on how to utilize the software to create realistic human likenesses, including composites of suspects and drawings of persons in unidentified remains cases. Drawing digitally is like using any tool in art: a pencil, a charcoal stick, a conte’ crayon. A stylus is just another tool to master. Digital work is easier for artists to send to the case detective, and the work always reproduces exactly as it was completed. Another benefit to working digitally is that one can use video conferencing with a witness online to provide services remotely world-wide. This enables police departments who have never had access to a forensic artist to have a sketch done within hours of the crime. Chapters address the more basic functions to serve as a primer for those transitioning to working digitally. There is also instruction on light and shadow, and bones and muscles of the skull. All of the discussion is intended to make the reader see things as an artist to improve drawing skills and overall digital techniques. In short, Digital Forensic Art Techniques is a practical, easy-to-follow manual for working forensic artists that will give readers a solid base from which to start. It serves as an essential resource to greater skill and comfort with the hardware and software, thus furthering current best practices and technological advances in the field.
Digital Forensic Education: An Experiential Learning Approach (Studies in Big Data #61)
by Xiaolu Zhang Kim-Kwang Raymond ChooIn this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also presented in the book. Digital forensics is a topic of increasing importance as our society becomes “smarter” with more of the “things” around us been internet- and inter-connected (e.g., Internet of Things (IoT) and smart home devices); thus, the increasing likelihood that we will need to acquire data from these things in a forensically sound manner. This book is of interest to both digital forensic educators and digital forensic practitioners, as well as students seeking to learn about digital forensics.
Digital Forensic Investigation of Internet of Things (Advanced Sciences and Technologies for Security Applications)
by Reza Montasari Hamid Jahankhani Richard Hill Simon ParkinsonThis book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
Digital Forensics and Cyber Crime: 7th International Conference, Icdf2c 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #259)
by Frank Breitinger Ibrahim BaggiliThis book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artifact correlation.
Digital Forensics and Cyber Crime: 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #441)
by Pavel Gladyshev Sanjay Goel Joshua James George Markowsky Daryl JohnsonThis book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually.The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
Digital Forensics and Cyber Crime
by Pavel Gladyshev Andrew Marrington Ibrahim BaggiliThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation and digital forensics in the cloud.
Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #351)
by Sanjay Goel Pavel Gladyshev Daryl Johnson Makan Pourzandi Suryadipta MajumdarThis book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.
Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #508)
by Sanjay Goel Pavel Gladyshev Akatyev Nikolay George Markowsky Daryl JohnsonThis book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #570)
by Sanjay Goel Paulo Roberto Nunes de SouzaThe two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:Volume I:Crime profile analysis and Fact checking, Information hiding and Machine learning.Volume II: Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #571)
by Sanjay Goel Paulo Roberto Nunes de SouzaThe two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:Volume I:Crime profile analysis and Fact checking, Information hiding and Machine learning.Volume II: Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Digital Forensics and Cyber Crime
by Joshua I. James Frank BreitingerThis book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. The 14 papers and 3 abstracts were selected from 40 submissions and cover diverse topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and international cooperation in digital investigations.
Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions
by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Manoranjan Mohanty Brij B. Gupta Konstantinos E. PsannisIn the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous—it’s imperative. Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions serves as a crucial bridge, connecting the dots between the present knowledge base and the fast-paced developments in this dynamic field. Through a collection of meticulous research and expert insights, this book dissects various facets of digital forensics and cyber security, providing readers with a comprehensive look at current trends and future possibilities. Distinguished by its in-depth analysis and forward-looking perspective, this volume sets itself apart as an indispensable resource for those keen on navigating the complexities of securing the digital domain. Key features of this book include: Innovative Strategies for Web Application Security: Insights into Moving Target Defense (MTD) techniques Blockchain Applications in Smart Cities: An examination of how blockchain technology can fortify data security and trust Latest Developments in Digital Forensics: A thorough overview of cutting-edge techniques and methodologies Advancements in Intrusion Detection: The role of Convolutional Neural Networks (CNN) in enhancing network security Augmented Reality in Crime Scene Investigations: How AR technology is transforming forensic science Emerging Techniques for Data Protection: From chaotic watermarking in multimedia to deep learning models for forgery detection This book aims to serve as a beacon for practitioners, researchers, and students who are navigating the intricate world of digital forensics and cyber security. By offering a blend of recent advancements and speculative future directions, it not only enriches the reader’s understanding of the subject matter but also inspires innovative thinking and applications in the field. Whether you’re a seasoned investigator, an academic, or a technology enthusiast, Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions promises to be a valuable addition to your collection, pushing the boundaries of what’s possible in digital forensics and beyond.
Digital Forensics and Incident Response
by Gerard JohansenThis book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. It will also help professionals who are new to the incident response/digital forensics role within their organization.
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition
by Gerard JohansenBuild your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensics tools and techniques to investigate cyber threatsExplore the real-world threat of ransomware and apply proper incident response techniques for investigation and recoveryBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks.After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization.What you will learnCreate and deploy an incident response capability within your own organizationPerform proper evidence acquisition and handlingAnalyze the evidence collected and determine the root cause of a security incidentIntegrate digital forensic techniques and procedures into the overall incident response processUnderstand different techniques for threat huntingWrite incident reports that document the key findings of your analysisApply incident response practices to ransomware attacksLeverage cyber threat intelligence to augment digital forensics findingsWho this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. You'll also find the book helpful if you're new to the concept of digital forensics and looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition
by Gerard JohansenBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response.After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization.What you will learnCreate and deploy an incident response capability within your own organizationPerform proper evidence acquisition and handlingAnalyze the evidence collected and determine the root cause of a security incidentBecome well-versed with memory and log analysisIntegrate digital forensic techniques and procedures into the overall incident response processUnderstand the different techniques for threat huntingWrite effective incident reports that document the key findings of your analysisWho this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats
by Gerard JohansenBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you’ll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You’ll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you’ll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization.What you will learnCreate and deploy an incident response capability within your own organizationPerform proper evidence acquisition and handlingAnalyze the evidence collected and determine the root cause of a security incidentBecome well-versed with memory and log analysisIntegrate digital forensic techniques and procedures into the overall incident response processUnderstand the different techniques for threat huntingWrite effective incident reports that document the key findings of your analysisWho this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.
Digital Forensics and Internet of Things: Impact and Challenges
by Anita Gehlot Rajesh Singh Jaskaran Singh Neeta Raj SharmaDIGITAL FORENSICS AND INTERNET OF THINGS It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal. The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking. Digital Forensics and Internet of Things encompasses: State-of-the-art research and standards concerning IoT forensics and traditional digital forensics Compares and contrasts IoT forensic techniques with those of traditional digital forensics standards Identifies the driving factors of the slow maturation of IoT forensic standards and possible solutions Applies recommended standards gathered from IoT forensic literature in hands-on experiments to test their effectiveness across multiple IoT devices Provides educated recommendations on developing and establishing IoT forensic standards, research, and areas that merit further study. Audience Researchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology.
Digital Forensics and Watermarking: 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings (Lecture Notes in Computer Science #10431)
by Christian Kraetzer, Yun-Qing Shi, Jana Dittmann and Hyoung Joong KimThis book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019, Chengdu, China, November 2–4, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12022)
by Hyoung Joong Kim Alessandro Piva Hongxia Wang Xianfeng Zhao Yunqing ShiThe 22 full papers and 12 shorts papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking; information hiding; steganography and steganalysis; authentication and security.
Digital Forensics and Watermarking
by Feng Liu Fernando Perez-Gonzalez Hyoung Joong Kim Yun Qing ShiThis book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography.