Access Control and Security Monitoring of Multimedia Information Processing and Transmission -

Access Control and Security Monitoring of Multimedia Information Processing and Transmission

Buch | Hardcover
303 Seiten
2024
Institution of Engineering and Technology (Verlag)
978-1-83953-693-9 (ISBN)
143,40 inkl. MwSt
This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.
In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.


This book covers innovations and future perspectives in access control and security monitoring of multimedia Information processing and transmission. The authors present cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and deepfake video security monitoring.


This will be a useful reference for researchers, engineers and scientists in both academia and industry as well as lecturers and advanced students for developing efficient methods, frameworks and techniques for multimedia information processing security and privacy. It will also be of interest to multimedia platform and system developers and designers.

Zhihan Lyu is an associate professor at Uppsala University, Sweden, where he specializes in virtual and augmented reality, computer vision and visualization and the internet of things. He has successfully completed several projects on PC, website, smartphone and smart glasses. Zhihan has two granted patents. Jaime Lloret is a full professor at the Polytechnic University of Valencia, Spain. He is the chair of the Integrated Management Coastal Research Institute (IGIC). He has authored 15 books and has more than 800 research papers published in national and international conferences, international journals. Since 2016 he has been the Spanish researcher with highest h-index in TELECOMMUNICATIONS. He is included in the world's top 2% scientists according to the Stanford University List since 2020. Houbing Herbert Song is director of security and optimization for the Networked Globe Laboratory (SONG Lab, http://songlab.us/) and a professor in the Department of Information Systems at the University of Maryland, Baltimore County, USA. His research interests include cyber-physical systems, internet of things, cybersecurity and privacy, AI and machine learning, big data analytics, edge computing, unmanned aircraft systems, connected vehicles, smart and connected health and wireless communications and networking. He is an IEEE fellow.

Chapter 1: Introduction
Chapter 2: Detection of secret information in the processing of multimedia information
Chapter 3: Machine/Deep learning techniques for multimedia security
Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
Chapter 10: Privacy-preserving identification for monitoring images
Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
Chapter 14: Conclusion

Erscheinungsdatum
Reihe/Serie Computing and Networks
Verlagsort Stevenage
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-83953-693-4 / 1839536934
ISBN-13 978-1-83953-693-9 / 9781839536939
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00