Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities

Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities

Author: Swain, Gandharba

Publisher: IGI Global

Published: 2019-06-28

Total Pages: 210

ISBN-13: 1522575170

DOWNLOAD EBOOK

In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world’s communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.


Multidisciplinary Approach to Modern Digital Steganography

Multidisciplinary Approach to Modern Digital Steganography

Author: Pramanik, Sabyasachi

Publisher: IGI Global

Published: 2021-06-04

Total Pages: 380

ISBN-13: 1799871622

DOWNLOAD EBOOK

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.


Integration Challenges for Analytics, Business Intelligence, and Data Mining

Integration Challenges for Analytics, Business Intelligence, and Data Mining

Author: Azevedo, Ana

Publisher: IGI Global

Published: 2020-12-11

Total Pages: 250

ISBN-13: 1799857832

DOWNLOAD EBOOK

As technology continues to advance, it is critical for businesses to implement systems that can support the transformation of data into information that is crucial for the success of the company. Without the integration of data (both structured and unstructured) mining in business intelligence systems, invaluable knowledge is lost. However, there are currently many different models and approaches that must be explored to determine the best method of integration. Integration Challenges for Analytics, Business Intelligence, and Data Mining is a relevant academic book that provides empirical research findings on increasing the understanding of using data mining in the context of business intelligence and analytics systems. Covering topics that include big data, artificial intelligence, and decision making, this book is an ideal reference source for professionals working in the areas of data mining, business intelligence, and analytics; data scientists; IT specialists; managers; researchers; academicians; practitioners; and graduate students.


Applications of Encryption and Watermarking for Information Security

Applications of Encryption and Watermarking for Information Security

Author: Mohamed, Boussif

Publisher: IGI Global

Published: 2023-03-27

Total Pages: 262

ISBN-13: 1668449471

DOWNLOAD EBOOK

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their understanding of the strategic role of trust at different levels of information security, that is, trust at the level of cryptography and watermarking and at the level of securing multimedia data. Covering topics such as background subtraction, moving object detection, and visual watermark identification, this premier reference source is an excellent resource for security and privacy professionals, IT managers, practitioners, students and educators of higher education, librarians, researchers, and academicians.


Digital Media Steganography

Digital Media Steganography

Author: Mahmoud Hassaballah

Publisher: Academic Press

Published: 2020-06-27

Total Pages: 388

ISBN-13: 0128194391

DOWNLOAD EBOOK

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography. - Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography - Provides new theoretical breakthroughs and a number of modern techniques in steganography - Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography


Modern Principles, Practices, and Algorithms for Cloud Security

Modern Principles, Practices, and Algorithms for Cloud Security

Author: Gupta, Brij B.

Publisher: IGI Global

Published: 2019-09-27

Total Pages: 361

ISBN-13: 1799810844

DOWNLOAD EBOOK

In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.


Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems

Author: Bilan, Stepan Mykolayovych

Publisher: IGI Global

Published: 2019-11-29

Total Pages: 434

ISBN-13: 1799812928

DOWNLOAD EBOOK

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.


Security and Privacy Issues in Sensor Networks and IoT

Security and Privacy Issues in Sensor Networks and IoT

Author: Ahlawat, Priyanka

Publisher: IGI Global

Published: 2019-10-25

Total Pages: 323

ISBN-13: 1799803759

DOWNLOAD EBOOK

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.


Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences

Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences

Author: Mayank Dave

Publisher: Springer Nature

Published: 2021-02-19

Total Pages: 1001

ISBN-13: 9811575339

DOWNLOAD EBOOK

This book presents best selected papers presented at the International Conference on Paradigms of Computing, Communication and Data Sciences (PCCDS 2020), organized by National Institute of Technology, Kurukshetra, India, during 1–3 May 2020. It discusses high-quality and cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.


Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Author: Asit Kumar Das

Publisher: Springer Nature

Published: 2020-02-19

Total Pages: 593

ISBN-13: 9811524491

DOWNLOAD EBOOK

This book features high-quality research papers presented at the 2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2020), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 4–5 January 2020. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.