Multimedia Security -

Multimedia Security (eBook)

Algorithm Development, Analysis and Applications
eBook Download: PDF
2021 | 1st ed. 2021
XII, 302 Seiten
Springer Singapore (Verlag)
978-981-15-8711-5 (ISBN)
Systemvoraussetzungen
171,19 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.


Kaiser J. Giri received his Master's Degree, M.Phil. and Ph.D. in Computer Applications from the University of Kashmir, India, in the year 2004, 2011 & 2016, respectively. He is working as a Sr. Assistant Professor in the Department of Computer Science, Islamic University of Science & Technology, and Awantipora, J & K, India, since 2006. He has participated in more than 50 national & international conferences, seminars & workshops. He has more than 20 papers in various journals & conferences of international repute to his credit.  His research interests include image processing, signal processing, information security, multimedia security, digital image watermarking and big data analytics. 

Shabir A. Parah received M.Sc., M.Phil. and Ph.D. degrees in electronics from the University of Kashmir, Srinagar, in 2004, 2010 and 2013, respectively. He is currently an Assistant Professor with the Department of Electronics and IT, University of Kashmir. He has authored or co-authored over 100 papers in the journals and conferences of international repute. His fields of interest are multimedia communication and security, image processing, information hiding, electronichealth care, secure communications, steganography and watermarking, biometrics, FPGA-based digital signal processing, digital system design using hardware description languages, nonlinear dynamics and chaos.

Rumaan Bashir is working as a Sr. Assistant Professor in the Department of Computer Science, Islamic University of Science and Technology, Awantipora, J&K, India, since 2006. Her area of research is pattern recognition/document image analysis and information security and is presently working on script identification. The author received her MCA and PGDBA from the University of Kashmir, J&K, India, in the year 2005 & 2009, respectively. She has also done M.Phil. & Ph.D. in Computer Science from the University of Kashmir, J&K, India, in the year 2011 & 2016, respectively. She has more than 20 papers in various journals & conferences of international repute to her credit.

Khan Muhammad is an Assistant Professor in the Department of Software, Sejong University, South Korea. His research interests include information security, video summarization, computer vision and video surveillance. He has authored over 100 papers in peer-reviewed international journals such as IEEE TII, TIE, IoTJ and TSMC Systems and is a reviewer of over 70 SCI/SCIE journals including IEEE Communications Magazine, IEEE Network, IEEE Internet of Things Journal, TIP, TII, TCYB and IEEE Access. He is a member of the ACM.

This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.
Erscheint lt. Verlag 11.1.2021
Reihe/Serie Algorithms for Intelligent Systems
Zusatzinfo XII, 302 p. 134 illus., 106 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik
Schlagworte copyright protection • Data Piracy • digital watermarking • Information Hiding and Cryptography • Information Security • multimedia security
ISBN-10 981-15-8711-6 / 9811587116
ISBN-13 978-981-15-8711-5 / 9789811587115
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 12,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90