{"id":"https://openalex.org/W2913157426","doi":"https://doi.org/10.1145/3078897","title":"Proceedings of the 2nd International Workshop on Multimedia Forensics and Security","display_name":"Proceedings of the 2nd International Workshop on Multimedia Forensics and Security","publication_year":2017,"publication_date":"2017-05-25","ids":{"openalex":"https://openalex.org/W2913157426","doi":"https://doi.org/10.1145/3078897","mag":"2913157426"},"language":"en","primary_location":{"id":"doi:10.1145/3078897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3078897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6681361198425293},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6311547756195068},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5323950052261353},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5293142199516296},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.5264970660209656},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5231174826622009},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4913765490055084},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.4110787808895111},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13070642948150635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6681361198425293},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6311547756195068},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5323950052261353},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5293142199516296},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.5264970660209656},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5231174826622009},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4913765490055084},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.4110787808895111},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13070642948150635},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3078897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3078897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2355862304","https://openalex.org/W2356108042","https://openalex.org/W2030250808","https://openalex.org/W2376796979","https://openalex.org/W2379418341","https://openalex.org/W2380054981","https://openalex.org/W2393110101","https://openalex.org/W2379285345","https://openalex.org/W2980855156"],"abstract_inverted_index":{"It":[0],"is":[1,43],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,66,88,107,146,164,184],"welcome":[6],"you":[7],"the":[9,25,46,72,78,95,98,101,104,109,113,116,139,147,160,185,193],"Second":[10],"International":[11],"Workshop":[12,150],"on":[13,29,132],"Multimedia":[14,30],"Forensics":[15],"and":[16,53,59,74,83,86,91,93,119,121,134,138,182,189],"Security":[17],"--":[18,32],"MFSec":[19,41],"2017,":[20],"organized":[21],"in":[22,35,192],"conjunction":[23],"with":[24],"2017":[26,42],"ACM":[27],"Conference":[28],"Retrieval":[31],"ICMR2017,":[33],"held":[34],"Bucharest,":[36],"Romania.":[37],"The":[38,149],"goal":[39],"of":[40,80,97,112,154,175,187],"three-fold:":[44],"First,":[45],"workshop":[47,105],"aims":[48],"at":[49,57],"presenting":[50],"cutting-edge":[51],"forensic":[52],"security":[54],"methods":[55],"aimed":[56],"Web":[58,133],"social":[60,135],"media":[61,136],"applications.":[62],"Second,":[63],"it":[64],"aspires":[65],"bring":[67],"together":[68],"key":[69],"individuals":[70],"from":[71,77,177],"research":[73],"professional":[75],"communities,":[76],"fields":[79],"security,":[81],"forensics,":[82],"multimedia":[84,178],"analysis":[85],"retrieval,":[87],"exchange":[89],"ideas":[90],"experiences":[92],"shape":[94],"directions":[96],"field":[99],"for":[100],"future.":[102],"Third,":[103],"intends":[106],"evaluate":[108],"level":[110],"maturity":[111],"field,":[114],"identify":[115],"current":[117],"strengths":[118],"weaknesses,":[120],"encourage":[122],"progress":[123],"towards":[124],"novel":[125],"solutions.":[126],"This":[127],"year's":[128],"focus":[129],"was":[130],"placed":[131],"environments,":[137],"particular":[140],"challenges":[141],"that":[142],"these":[143],"environments":[144],"pose":[145],"field.":[148],"received":[151],"9":[152],"submissions,":[153],"which":[155],"5":[156],"were":[157],"accepted":[158],"by":[159],"Program":[161],"Committee,":[162],"leading":[163],"a":[165,172],"56%":[166],"acceptance":[167],"rate.":[168],"Accepted":[169],"submissions":[170],"cover":[171],"wide":[173],"range":[174],"challenges,":[176],"forensics":[179],"using":[180],"content":[181],"context,":[183],"tracking":[186],"terrorism-":[188],"weaponrelated":[190],"sources":[191],"Web.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
