Limit search to available items
Book Cover
E-book
Author Ramakrishnan, S

Title Cryptographic and Information Security Approaches for Images and Videos
Published Milton : Chapman and Hall/CRC, 2018

Copies

Description 1 online resource (987 pages)
Contents Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Acknowledgements; Editor; Contributors; Reviewer Details; SECTION I: ENCRYPTION; 1: Introduction to Information Security Systems Primitives; 2: Cryptographic Image Scrambling Techniques; 3: Chaos-Based Image Cryptography; 4: Fundamental Cryptographic Characteristics of Boolean Functions: A Review; 5: Phase Retrieval in Optical Cryptography; 6: Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC); 7: Security of Scalable Video Coding: Encryption and Authentication
8: Compressive Sensing in Color Image Security9: Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings; 10: Multimedia Contents Encryption Using the Chaotic MACM System on a Smart-display; 11: Medical Image Encryption; SECTION II: WATERMARKING; 12: Watermarking Techniques for Copyright Protection of Texts in Document Files; 13: VLSI Implementation of Video Watermarking for Secure HEVC Coding Standard; 14: Data Hiding in Compressed Images and Videos; 15: Robust Image Watermarking Based on Multiple-Criteria Decision-Making
16: The Role of Image Fusion and Watermarking Techniques in Medical Imaging17: Watermarking Techniques and Its Applications in Tele-Health: A Technical Survey; SECTION III: STEGANOGRAPHY; 18: Utilization of Small S-Boxes for Information Hiding; 19: Secure and Robust ECG Steganography Using Fractional Fourier Transform; 20: Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions; 21: Steganography Based on Interpolation and Edge Detection Techniques; 22: Steganography and Medical Data Security; SECTION IV: FORENSICS; 23: Digital Visual Media Forensics
24: Review of Image Tampering Detection Techniques25: Blockchain Security for Wireless Multimedia Networks; 26: Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method; 27: Anti-Forensics for Image and Video Tampering: A Review; SECTION V: BIOMETRICS; 28: Securing Biometrics Using Data Hiding Techniques; 29: Secure Biometric Modalities for Effective Communication; 30: Application of Video-Based Face Recognition for Mobile Security Using Machine Learning Techniques; 31: Biometrics-Based Authentication Scheme for Cloud Environment; Index
Summary This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques
Notes Print version record
Subject Computer security.
Multimedia communications -- Security measures
Data encryption (Computer science)
Data protection.
Computer Security
COMPUTERS -- Internet -- General.
TECHNOLOGY & ENGINEERING -- Imaging Systems.
Computer security
Data encryption (Computer science)
Data protection
Form Electronic book
ISBN 9780429788079
042978807X