語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multimedia Security = Algorithm Deve...
~
Parah, Shabir Ahmad.
Multimedia Security = Algorithm Development, Analysis and Applications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Multimedia Security/ edited by Kaiser J. Giri, Shabir Ahmad Parah, Rumaan Bashir, Khan Muhammad.
其他題名:
Algorithm Development, Analysis and Applications /
其他作者:
Muhammad, Khan.
面頁冊數:
XII, 302 p. 134 illus., 106 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-981-15-8711-5
ISBN:
9789811587115
Multimedia Security = Algorithm Development, Analysis and Applications /
Multimedia Security
Algorithm Development, Analysis and Applications /[electronic resource] :edited by Kaiser J. Giri, Shabir Ahmad Parah, Rumaan Bashir, Khan Muhammad. - 1st ed. 2021. - XII, 302 p. 134 illus., 106 illus. in color.online resource. - Algorithms for Intelligent Systems,2524-7573. - Algorithms for Intelligent Systems,.
Securing Medical Images via a Texture and Chaotic Key Framework -- Hybrid Local Phase Quantization and Grey Wolf Optimization based SVM for Finger Vein Recognition -- Image Encryption based on DNA Substitution and Chaotic Theory -- Impact of Computational Power on Cryptography -- Privacy Preserving Anti-Forensic Techniques -- Information Embedding using DNA Sequences for Covert Communication -- Information Hiding in Color Images utilizing Multi-bit Substitution Patterns -- Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- Survey on Reversible Watermarking Techniques for Medical Images -- Security and Privacy of e-health Data.
This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.
ISBN: 9789811587115
Standard No.: 10.1007/978-981-15-8711-5doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Multimedia Security = Algorithm Development, Analysis and Applications /
LDR
:03813nam a22004095i 4500
001
1051847
003
DE-He213
005
20210817050539.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811587115
$9
978-981-15-8711-5
024
7
$a
10.1007/978-981-15-8711-5
$2
doi
035
$a
978-981-15-8711-5
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Multimedia Security
$h
[electronic resource] :
$b
Algorithm Development, Analysis and Applications /
$c
edited by Kaiser J. Giri, Shabir Ahmad Parah, Rumaan Bashir, Khan Muhammad.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
XII, 302 p. 134 illus., 106 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Algorithms for Intelligent Systems,
$x
2524-7573
505
0
$a
Securing Medical Images via a Texture and Chaotic Key Framework -- Hybrid Local Phase Quantization and Grey Wolf Optimization based SVM for Finger Vein Recognition -- Image Encryption based on DNA Substitution and Chaotic Theory -- Impact of Computational Power on Cryptography -- Privacy Preserving Anti-Forensic Techniques -- Information Embedding using DNA Sequences for Covert Communication -- Information Hiding in Color Images utilizing Multi-bit Substitution Patterns -- Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- Survey on Reversible Watermarking Techniques for Medical Images -- Security and Privacy of e-health Data.
520
$a
This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Multimedia Information Systems.
$3
669810
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Computer security.
$3
557122
650
0
$a
Multimedia information systems.
$3
1115395
650
0
$a
Computational intelligence.
$3
568984
700
1
$a
Muhammad, Khan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1356452
700
1
$a
Bashir, Rumaan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1356451
700
1
$a
Parah, Shabir Ahmad.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1356450
700
1
$a
Giri, Kaiser J.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1356449
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811587108
776
0 8
$i
Printed edition:
$z
9789811587122
776
0 8
$i
Printed edition:
$z
9789811587139
830
0
$a
Algorithms for Intelligent Systems,
$x
2524-7565
$3
1313417
856
4 0
$u
https://doi.org/10.1007/978-981-15-8711-5
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入