Buch, Englisch, 370 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
Reihe: AAP Research Notes on Optimization and Decision Making Theories
Tools, Techniques, and Applications
Buch, Englisch, 370 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
Reihe: AAP Research Notes on Optimization and Decision Making Theories
ISBN: 978-1-77491-502-8
Verlag: Apple Academic Press Inc.
Multimedia security has become one of the most important topics for organizations and individuals. Presenting important state-of-the art multimedia security techniques and algorithms, this book focuses on data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pan sharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. It also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security.
Zielgruppe
Academic and Postgraduate
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung Multimedia
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
1. Understanding Multimedia Security 2. Evaluation Metrics Used for Image Encryption to Analyze the Efficiency Toward Various Attacks 3. Machine Learning Approaches to Malware Detection Systems 4. Securing Identities Through Biometric Template Security 5. Watermarking and Copyright Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured Smart Home Applications Using the Internet of Things and Blockchain Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem for Video Surveillance Applications 8. Evaluation of Pansharpening Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation Utilizing Supervised Machine Learning Approaches in Security Issues 10. Secure Chaos-Based Image Encryption Techniques Based on a Feedback Convolution Method