Multimedia Security
Tools, Techniques, and Applications
Herausgeber: Mondal, Bhaskar; Rajput, Shyam Singh
Multimedia Security
Tools, Techniques, and Applications
Herausgeber: Mondal, Bhaskar; Rajput, Shyam Singh
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud.
Andere Kunden interessierten sich auch für
- Bhawana RudraFlexible Network Architectures Security103,99 €
- Securing Cyber-Physical Systems189,99 €
- The Usage and Impact of Icts During the Covid-19 Pandemic174,99 €
- The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity188,99 €
- Richard FoxInformation Technology268,99 €
- Antonio NicasoThe Dark Mafia176,99 €
- Patrick AievoliRock - Paper - Pixels154,99 €
-
-
-
Focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Apple Academic Press Inc.
- Seitenzahl: 350
- Erscheinungstermin: 7. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 453g
- ISBN-13: 9781774915028
- ISBN-10: 1774915022
- Artikelnr.: 73327853
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Apple Academic Press Inc.
- Seitenzahl: 350
- Erscheinungstermin: 7. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 453g
- ISBN-13: 9781774915028
- ISBN-10: 1774915022
- Artikelnr.: 73327853
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Bhaskar Mondal, PhD, is an Assistant Professor in the Department of Computer Science and Engineering at the National Institute of Technology Patna, India. He has more than 10 years of experience in academia during which he has worked at XIM University Bhubaneswar; Birsa Institute of Technology Sindri, Dhanbad; and National Institute of Technology Jamshedpur, all in India. He has published more than 40 research papers in journals and international conferences and has delivered many expert talks on cybersecurity and machine learning. He is a senior member of IEEE and the Association for Computing Machinery, and a life member of the Computer Society of India and the Cryptology Research Society of India. He has served at several international conferences as session chair. He is the editor of CRC Press's Cyber Security book series and has acted as a guest editor (lead) for a special issue in the International Journal of Computers and Electrical Engineering. His research interests include cybersecurity, machine learning, and quantum computing. He received his PhD from the National Institute of Technology Jamshedpur, India, and his MTech (CSE) from Kalyani Government Engineering College, India. Shyam Singh Rajput, PhD, has more than six years of experience in teaching undergraduate and postgraduate classes. Presently, he is working as an Assistant Professor in the Department of Computer Science and Engineering at the National Institute of Technology Patna, India. His current research interests include image processing and computer vision. He has published more than 40 journal and conference papers and book chapters in the domain of image processing, biometrics, wireless ad hoc networks, and information security. He has published two Indian patents and edited a book. He is a member of IEEE and the Association for Computing Machinery. Dr. Rajput received a BE degree in Computer Science & Engineering from R.G.P.V., Bhopal, Madhya Pradesh, India. He earned his MTech degree and PhD degree in CSE from ABV-Indian Institute of Information Technology & Management (ABV-IIITM), Gwalior, India.
1. Understanding Multimedia Security 2. Evaluation Metrics Used for Image
Encryption to Analyze the Efficiency Toward Various Attacks 3. Machine
Learning Approaches to Malware Detection Systems 4. Securing Identities
Through Biometric Template Security 5. Watermarking and Copyright
Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured
Smart Home Applications Using the Internet of Things and Blockchain
Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem
for Video Surveillance Applications 8. Evaluation of Pansharpening
Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation
Utilizing Supervised Machine Learning Approaches in Security Issues 10.
Secure Chaos-Based Image Encryption Techniques Based on a Feedback
Convolution Method
Encryption to Analyze the Efficiency Toward Various Attacks 3. Machine
Learning Approaches to Malware Detection Systems 4. Securing Identities
Through Biometric Template Security 5. Watermarking and Copyright
Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured
Smart Home Applications Using the Internet of Things and Blockchain
Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem
for Video Surveillance Applications 8. Evaluation of Pansharpening
Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation
Utilizing Supervised Machine Learning Approaches in Security Issues 10.
Secure Chaos-Based Image Encryption Techniques Based on a Feedback
Convolution Method
1. Understanding Multimedia Security 2. Evaluation Metrics Used for Image
Encryption to Analyze the Efficiency Toward Various Attacks 3. Machine
Learning Approaches to Malware Detection Systems 4. Securing Identities
Through Biometric Template Security 5. Watermarking and Copyright
Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured
Smart Home Applications Using the Internet of Things and Blockchain
Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem
for Video Surveillance Applications 8. Evaluation of Pansharpening
Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation
Utilizing Supervised Machine Learning Approaches in Security Issues 10.
Secure Chaos-Based Image Encryption Techniques Based on a Feedback
Convolution Method
Encryption to Analyze the Efficiency Toward Various Attacks 3. Machine
Learning Approaches to Malware Detection Systems 4. Securing Identities
Through Biometric Template Security 5. Watermarking and Copyright
Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured
Smart Home Applications Using the Internet of Things and Blockchain
Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem
for Video Surveillance Applications 8. Evaluation of Pansharpening
Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation
Utilizing Supervised Machine Learning Approaches in Security Issues 10.
Secure Chaos-Based Image Encryption Techniques Based on a Feedback
Convolution Method