Description |
1 online resource (987 pages) |
Contents |
Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Acknowledgements; Editor; Contributors; Reviewer Details; SECTION I: ENCRYPTION; 1: Introduction to Information Security Systems Primitives; 2: Cryptographic Image Scrambling Techniques; 3: Chaos-Based Image Cryptography; 4: Fundamental Cryptographic Characteristics of Boolean Functions: A Review; 5: Phase Retrieval in Optical Cryptography; 6: Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC); 7: Security of Scalable Video Coding: Encryption and Authentication |
|
8: Compressive Sensing in Color Image Security9: Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings; 10: Multimedia Contents Encryption Using the Chaotic MACM System on a Smart-display; 11: Medical Image Encryption; SECTION II: WATERMARKING; 12: Watermarking Techniques for Copyright Protection of Texts in Document Files; 13: VLSI Implementation of Video Watermarking for Secure HEVC Coding Standard; 14: Data Hiding in Compressed Images and Videos; 15: Robust Image Watermarking Based on Multiple-Criteria Decision-Making |
|
16: The Role of Image Fusion and Watermarking Techniques in Medical Imaging17: Watermarking Techniques and Its Applications in Tele-Health: A Technical Survey; SECTION III: STEGANOGRAPHY; 18: Utilization of Small S-Boxes for Information Hiding; 19: Secure and Robust ECG Steganography Using Fractional Fourier Transform; 20: Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions; 21: Steganography Based on Interpolation and Edge Detection Techniques; 22: Steganography and Medical Data Security; SECTION IV: FORENSICS; 23: Digital Visual Media Forensics |
|
24: Review of Image Tampering Detection Techniques25: Blockchain Security for Wireless Multimedia Networks; 26: Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method; 27: Anti-Forensics for Image and Video Tampering: A Review; SECTION V: BIOMETRICS; 28: Securing Biometrics Using Data Hiding Techniques; 29: Secure Biometric Modalities for Effective Communication; 30: Application of Video-Based Face Recognition for Mobile Security Using Machine Learning Techniques; 31: Biometrics-Based Authentication Scheme for Cloud Environment; Index |
Summary |
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques |
Notes |
Print version record |
Subject |
Computer security.
|
|
Multimedia communications -- Security measures
|
|
Data encryption (Computer science)
|
|
Data protection.
|
|
Computer Security
|
|
COMPUTERS -- Internet -- General.
|
|
TECHNOLOGY & ENGINEERING -- Imaging Systems.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
Form |
Electronic book
|
ISBN |
9780429788079 |
|
042978807X |
|