Limit search to available items
7435 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author Puech, William

Title Multimedia Security 2 Biometrics, Video Surveillance and Multimedia Encryption
Published Newark : John Wiley & Sons, Incorporated, 2022

Copies

Description 1 online resource (320 p.)
Contents Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data
1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction
3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a region from the same document -- 3.2.3. Copy-and-paste of a region from another document -- 3.2.4. Deleting information -- 3.3. Degradation in printed and re-scanned documents -- 3.3.1. Degradations linked to the print process -- 3.3.2. Degradations linked to scanning -- 3.3.3. Degradation models -- 3.4. Active approaches: protection by extrinsic fingerprints -- 3.4.1. Watermarking a document -- 3.4.2. Digital signatures -- 3.5. Passive approaches: detecting intrinsic characteristics
3.5.1. Printer identification -- 3.5.2. Detecting graphical clues -- 3.5.3. Other approaches -- 3.6. Conclusion -- 3.7. References -- Chapter 4. Image Crypto-Compression -- 4.1. Introduction -- 4.2. Preliminary notions -- 4.2.1. The JPEG image format -- 4.2.2. Introduction to cryptography -- 4.3. Image encryption -- 4.3.1. Naive methods -- 4.3.2. Chaos-based methods -- 4.3.3. Encryption-then-compression -- 4.4. Different classes of crypto-compression for images -- 4.4.1. Substitution-based crypto-compression -- 4.4.2. Shuffle-based crypto-compression -- 4.4.3. Hybrid crypto-compression
4.5. Recompressing crypto-compressed JPEG images -- 4.5.1. A crypto-compression approach robust to recompression -- 4.5.2. Recompression of a crypto-compressed image -- 4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image -- 4.5.4. Illustration of the method -- 4.6. Conclusion -- 4.7. References -- Chapter 5. Crypto-Compression of Videos -- 5.1. Introduction -- 5.1.1. Background -- 5.1.2. Video compression -- 5.1.3. Video security -- 5.2. State of the art -- 5.2.1. Naive encryption -- 5.2.2. Partial encryption -- 5.2.3. Perceptual encryption
Summary Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing. -- Edited summary from book
Notes Description based upon print version of record
5.2.4. Crypto-compression methods
Subject Artificial intelligence.
Multimedia systems.
Computational intelligence.
artificial intelligence.
Artificial intelligence
Computational intelligence
Multimedia systems
Form Electronic book
ISBN 9781394150380
1394150385