Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Intelligent techniques in signal pro...
~
Dey, Nilanjan.
Linked to FindBook
Google Book
Amazon
博客來
Intelligent techniques in signal processing for multimedia security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Intelligent techniques in signal processing for multimedia security/ edited by Nilanjan Dey, V. Santhi.
other author:
Dey, Nilanjan.
Published:
Cham :Springer International Publishing : : 2017.,
Description:
ix, 485 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.
Contained By:
Springer eBooks
Subject:
Multimedia systems - Security measures. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-44790-2
ISBN:
9783319447902
Intelligent techniques in signal processing for multimedia security
Intelligent techniques in signal processing for multimedia security
[electronic resource] /edited by Nilanjan Dey, V. Santhi. - Cham :Springer International Publishing :2017. - ix, 485 p. :ill. (some col.), digital ;24 cm. - Studies in computational intelligence,v.6601860-949X ;. - Studies in computational intelligence ;v.660..
Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
ISBN: 9783319447902
Standard No.: 10.1007/978-3-319-44790-2doiSubjects--Topical Terms:
745385
Multimedia systems
--Security measures.
LC Class. No.: QA76.575
Dewey Class. No.: 006.7
Intelligent techniques in signal processing for multimedia security
LDR
:03914nmm a2200325 a 4500
001
2088119
003
DE-He213
005
20161018175843.0
006
m d
007
cr nn 008maaau
008
171013s2017 gw s 0 eng d
020
$a
9783319447902
$q
(electronic bk.)
020
$a
9783319447896
$q
(paper)
024
7
$a
10.1007/978-3-319-44790-2
$2
doi
035
$a
978-3-319-44790-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.575
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
006.7
$2
23
090
$a
QA76.575
$b
.I61 2017
245
0 0
$a
Intelligent techniques in signal processing for multimedia security
$h
[electronic resource] /
$c
edited by Nilanjan Dey, V. Santhi.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
ix, 485 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Studies in computational intelligence,
$x
1860-949X ;
$v
v.660
505
0
$a
Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.
520
$a
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
650
0
$a
Multimedia systems
$x
Security measures.
$3
745385
650
0
$a
Computational intelligence.
$3
595739
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
890894
650
2 4
$a
Signal, Image and Speech Processing.
$3
891073
650
2 4
$a
Multimedia Information Systems.
$3
892521
700
1
$a
Dey, Nilanjan.
$3
2200043
700
1
$a
Santhi, V.
$3
3217594
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Studies in computational intelligence ;
$v
v.660.
$3
3217595
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-44790-2
950
$a
Engineering (Springer-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9314291
電子資源
11.線上閱覽_V
電子書
EB QA76.575
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login