S. Ramakrishnan
Cryptographic and Information Security Approaches for Images and Videos
S. Ramakrishnan
Cryptographic and Information Security Approaches for Images and Videos
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
Andere Kunden interessierten sich auch für
- S. RamakrishnanCryptographic and Information Security Approaches for Images and Videos49,99 €
- Jeff StapletonSecurity without Obscurity61,99 €
- Jeff StapletonSecurity Without Obscurity132,99 €
- Jeff StapletonSecurity Without Obscurity53,99 €
- IoT-enabled Convolutional Neural Networks160,99 €
- Ralph MoseleyAdvanced Cybersecurity Technologies78,99 €
- Joanna F. DeFranco (The Pennsylvania State University, Malvern, USAWhat Every Engineer Should Know about Cyber Security and Digital Forensics170,99 €
-
-
-
This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 916
- Erscheinungstermin: 22. November 2023
- Englisch
- Abmessung: 243mm x 163mm x 56mm
- Gewicht: 1522g
- ISBN-13: 9781032598024
- ISBN-10: 1032598026
- Artikelnr.: 71999154
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 916
- Erscheinungstermin: 22. November 2023
- Englisch
- Abmessung: 243mm x 163mm x 56mm
- Gewicht: 1522g
- ISBN-13: 9781032598024
- ISBN-10: 1032598026
- Artikelnr.: 71999154
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Dr. S. Ramakrishnan received his bachelor of engineering degree in Electronics and Communication Engineering in 1998 from the Bharathidasan University Trichy, and his mechanical engineering degree in Communication Systems in 2000 from the Madurai Kamaraj University Madurai. He received his Ph.D. degree in Information and Communication Engineering from Anna University Chennai in 2007.He has 12 years of teaching experience and 1 year of industry experience. He is a professor and the head of the Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India. Dr. Ramakrishnan is a reviewer of 14 international journals such as IEEE Transactions on Image Processing, IET Journals (formerly IEE), ACM Computing Reviews Elsevier Science, International Journal of Vibration and Control, IET Generation Transmission and Distribution, etc. He is in the editorial board of six international journals. He is a guest editor of special issues in three international journals including Telecommunication Systems Journal of Springer. He has published 77 papers in international/national journals and conference proceedings. Dr. S. Ramakrishnan has published three books on computational techniques and speech processing.He has also reviewed three books for McGraw Hill International Edition and two books for ACM Computing Reviews. He is a convenor of the IT board in Anna University of Technology-Coimbatore Board of Studies (BoS). He is guiding 10 PhD research scholars. His biography has been included in Marquis Whos's Who in the World 2011 edition. His areas of research include digital image processing, soft computing, human-computer interaction, wireless sensor networks, and cognitive radio.
Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key
Distribution Techniques. 3. Authentication and Integrity Techniques. Part
2: Image and Video Security Techniques. 4. Image and Video Encryption
Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video
Steganography Techniques. 7. Image and Video Forensics. Part 3:
Applications. 8. Applications in Medical Imaging. 9. Applications in
Industrial Automation. 10. Applications in Sports and Entertainment. 11.
Applications in Privacy Preservation. 12. Applications in Copyrights and
Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
Distribution Techniques. 3. Authentication and Integrity Techniques. Part
2: Image and Video Security Techniques. 4. Image and Video Encryption
Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video
Steganography Techniques. 7. Image and Video Forensics. Part 3:
Applications. 8. Applications in Medical Imaging. 9. Applications in
Industrial Automation. 10. Applications in Sports and Entertainment. 11.
Applications in Privacy Preservation. 12. Applications in Copyrights and
Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key
Distribution Techniques. 3. Authentication and Integrity Techniques. Part
2: Image and Video Security Techniques. 4. Image and Video Encryption
Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video
Steganography Techniques. 7. Image and Video Forensics. Part 3:
Applications. 8. Applications in Medical Imaging. 9. Applications in
Industrial Automation. 10. Applications in Sports and Entertainment. 11.
Applications in Privacy Preservation. 12. Applications in Copyrights and
Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
Distribution Techniques. 3. Authentication and Integrity Techniques. Part
2: Image and Video Security Techniques. 4. Image and Video Encryption
Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video
Steganography Techniques. 7. Image and Video Forensics. Part 3:
Applications. 8. Applications in Medical Imaging. 9. Applications in
Industrial Automation. 10. Applications in Sports and Entertainment. 11.
Applications in Privacy Preservation. 12. Applications in Copyrights and
Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.