Multimedia Security -

Multimedia Security

Algorithm Development, Analysis and Applications
Buch | Hardcover
302 Seiten
2021 | 1st ed. 2021
Springer Verlag, Singapore
978-981-15-8710-8 (ISBN)
181,89 inkl. MwSt
This book is a collection of outstanding content written by experts working in the field of multimedia security. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers.
This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having awealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.

Kaiser J. Giri received his Master’s Degree, M.Phil. and Ph.D. in Computer Applications from the University of Kashmir, India, in the year 2004, 2011 & 2016, respectively. He is working as a Sr. Assistant Professor in the Department of Computer Science, Islamic University of Science & Technology, and Awantipora, J & K, India, since 2006. He has participated in more than 50 national & international conferences, seminars & workshops. He has more than 20 papers in various journals & conferences of international repute to his credit.  His research interests include image processing, signal processing, information security, multimedia security, digital image watermarking and big data analytics.  Shabir A. Parah received M.Sc., M.Phil. and Ph.D. degrees in electronics from the University of Kashmir, Srinagar, in 2004, 2010 and 2013, respectively. He is currently an Assistant Professor with the Department of Electronics and IT, University of Kashmir. He hasauthored or co-authored over 100 papers in the journals and conferences of international repute. His fields of interest are multimedia communication and security, image processing, information hiding, electronichealth care, secure communications, steganography and watermarking, biometrics, FPGA-based digital signal processing, digital system design using hardware description languages, nonlinear dynamics and chaos. Rumaan Bashir is working as a Sr. Assistant Professor in the Department of Computer Science, Islamic University of Science and Technology, Awantipora, J&K, India, since 2006. Her area of research is pattern recognition/document image analysis and information security and is presently working on script identification. The author received her MCA and PGDBA from the University of Kashmir, J&K, India, in the year 2005 & 2009, respectively. She has also done M.Phil. & Ph.D. in Computer Science from the University of Kashmir, J&K, India, in the year 2011 & 2016,respectively. She has more than 20 papers in various journals & conferences of international repute to her credit. Khan Muhammad is an Assistant Professor in the Department of Software, Sejong University, South Korea. His research interests include information security, video summarization, computer vision and video surveillance. He has authored over 100 papers in peer-reviewed international journals such as IEEE TII, TIE, IoTJ and TSMC Systems and is a reviewer of over 70 SCI/SCIE journals including IEEE Communications Magazine, IEEE Network, IEEE Internet of Things Journal, TIP, TII, TCYB and IEEE Access. He is a member of the ACM.

Securing Medical Images via a Texture and Chaotic Key Framework.- Hybrid Local Phase Quantization and Grey Wolf Optimization based SVM for Finger Vein Recognition.- Image Encryption based on DNA Substitution and Chaotic Theory.- Impact of Computational Power on Cryptography.- Privacy Preserving Anti-Forensic Techniques.- Information Embedding using DNA Sequences for Covert Communication.- Information Hiding in Color Images utilizing Multi-bit Substitution Patterns.- Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic.- Survey on Reversible Watermarking Techniques for Medical Images.- Security and Privacy of e-health Data.

Erscheinungsdatum
Reihe/Serie Algorithms for Intelligent Systems
Zusatzinfo 106 Illustrations, color; 28 Illustrations, black and white; XII, 302 p. 134 illus., 106 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik
ISBN-10 981-15-8710-8 / 9811587108
ISBN-13 978-981-15-8710-8 / 9789811587108
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich