Handbook of Multimedia Information Security: Techniques and Applications

Handbook of Multimedia Information Security: Techniques and Applications
ISBN-10
303015887X
ISBN-13
9783030158873
Category
Computers
Pages
808
Language
English
Published
2019-07-19
Publisher
Springer
Authors
Amit Kumar Singh, Anand Mohan

Description

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

Similar books

  • Handbook of Research on Multimedia Cyber Security
    By Gupta, Brij B., Deepak

    The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges.

  • Multimedia Security Handbook
    By Borko Furht, Darko Kirovski

    Workflow is an essential part of a digital watermarking system and framework. ... M., Schmucker, M., and Wolthusen, S., Techniques and Applications of Digital Watermarking and Content Protection, Artech House, Norwood, MA, 2003, pp.

  • An Information Security Handbook
    By John M. Hunter

    This book is geared at postgraduate courses on managing and designing information systems.

  • Computer and Information Security Handbook
    By John R. Vacca

    Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless ...

  • Multimedia Security Handbook
    By Borko Furht, Darko Kirovski

    This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.

  • Information Security Management Handbook, Sixth Edition
    By Micki Krause Nozaki, Harold F. Tipton

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.

  • Information Security Handbook
    By Khalid Hussain, Noor Zaman Jhanjhi, Joao Manuel R.S. Tavares

    ... Computer and Mathematics Education (TURCOMAT), 12(6), 2866–2882. [15] Calder A., & Watkins S. (2019). The ISO 27001 risk assessment. In Information Security Risk Management for ISO 27001/ISO 27002, third edition (pp. 87–93). Ely ...

  • Information Security Management Handbook, Sixth Edition
    By James S. Tiller, Richard O'Hanley

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance.

  • Information Security Management Handbook, Volume 5
    By Micki Krause Nozaki, Harold F. Tipton

    The authors of Integrative Document and Content Management explain that development, communication, and acceptance of a policy framework should be completed before even beginning requirement specifications for a content management ...

  • Information Security Management Handbook, Sixth Edition
    By Micki Krause, Harold F. Tipton

    As shown in Screen 12, it is good to take every opportunity, including within your training modules, to let your personnel know the person or position within your organization that they can contact for more information, or for concerns.