Applications of Encryption and Watermarking for Information Security

Applications of Encryption and Watermarking for Information Security

Author: Mohamed, Boussif

Publisher: IGI Global

Published: 2023-03-27

Total Pages: 262

ISBN-13: 1668449471

DOWNLOAD EBOOK

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their understanding of the strategic role of trust at different levels of information security, that is, trust at the level of cryptography and watermarking and at the level of securing multimedia data. Covering topics such as background subtraction, moving object detection, and visual watermark identification, this premier reference source is an excellent resource for security and privacy professionals, IT managers, practitioners, students and educators of higher education, librarians, researchers, and academicians.


Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking

Author: Borko Furht

Publisher: Springer Science & Business Media

Published: 2006-10-03

Total Pages: 331

ISBN-13: 0387260900

DOWNLOAD EBOOK

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images. Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.


Watermarking Systems Engineering

Watermarking Systems Engineering

Author: Mauro Barni

Publisher: CRC Press

Published: 2004-02-03

Total Pages: 500

ISBN-13: 0203913515

DOWNLOAD EBOOK

The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the principles of watermarking system design and discusses technologies in information concealment and recovery. It highlights the requirements and challenges of applications in security, image/video indexing, hidden communications, image captioning, and transmission error recovery and concealment. It explains digital watermarking technologies and offers an understanding of new approaches and applications, laying the groundwork for further developments in the field.


Handbook of Image-based Security Techniques

Handbook of Image-based Security Techniques

Author: Shivendra Shivani

Publisher: CRC Press

Published: 2018-05-20

Total Pages: 410

ISBN-13: 1351681559

DOWNLOAD EBOOK

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB


Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery

Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-01-15

Total Pages: 689

ISBN-13: 1799881075

DOWNLOAD EBOOK

Telemedicine, which involves electronic communications and software, provides the same clinical services to patients without the requirement of an in-person visit. Essentially, this is considered remote healthcare. Though telemedicine is not a new practice, it has become an increasingly popular form of healthcare delivery due to current events, including the COVID-19 pandemic. Not only are visits being moved onto virtual platforms, but additional materials and correspondence can remain in the digital sphere. Virtual lab results, digital imaging, medical diagnosis, and video consultations are just a few examples that encompass how telemedicine can be used for increased accessibility in healthcare delivery. With telemedicine being used in both the diagnosis and treatment of patients, technology in healthcare can be implemented at almost any phase of the patient experience. As healthcare delivery follows the digital shift, it is important to understand the technologies, benefits and challenges, and overall impacts of the remote healthcare experience. The Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery presents the latest research on best practices for adopting telehealth into medical practices and its efficacy and solutions for the improvement of telemedicine, as well as addresses emerging challenges and opportunities, including issues such as securing patient data and providing healthcare accessibility to rural populations. Covering important themes that include doctor-patient relationships, tele-wound monitoring, and telemedicine regulations, this book is essential for healthcare professionals, doctors, medical students, academic and medical libraries, medical technologists, practitioners, stakeholders, researchers, academicians, and students interested in the emerging technological developments and solutions within the field of telemedicine.


Watermarking Security

Watermarking Security

Author: Patrick Bas

Publisher: Springer

Published: 2016-06-21

Total Pages: 132

ISBN-13: 9811005060

DOWNLOAD EBOOK

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.


Handbook of Multimedia Information Security: Techniques and Applications

Handbook of Multimedia Information Security: Techniques and Applications

Author: Amit Kumar Singh

Publisher: Springer

Published: 2019-07-19

Total Pages: 808

ISBN-13: 303015887X

DOWNLOAD EBOOK

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.


Medical Image Watermarking

Medical Image Watermarking

Author: Amit Kumar Singh

Publisher: Springer

Published: 2017-08-11

Total Pages: 263

ISBN-13: 3319576992

DOWNLOAD EBOOK

This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.


Smart Medical Data Sensing and IoT Systems Design in Healthcare

Smart Medical Data Sensing and IoT Systems Design in Healthcare

Author: Chakraborty, Chinmay

Publisher: IGI Global

Published: 2019-09-20

Total Pages: 288

ISBN-13: 1799802620

DOWNLOAD EBOOK

Smart healthcare technology improves the diagnosis and treatment of patients, provides easy access to medical facilities and emergency care services, and minimizes the gaps between patients and healthcare providers. While clinical data protection remains a major challenge, innovations such as the internet of medical things and smart healthcare systems increase the efficiency and quality of patient care. Healthcare technology can only become faster, more profitable, and more flexible as additional research on its advancements is conducted and collected. Smart Medical Data Sensing and IoT Systems Design in Healthcare is an essential reference source that focuses on robust and easy solutions for the delivery of medical information from patients to doctors and explores low-cost, high-performance, highly efficient, deployable IoT system options in healthcare systems. Featuring research on topics such as hospital management systems, electronic health records, and bio-signals, this book is ideally designed for technologists, engineers, scientists, clinicians, biomedical engineers, hospital directors, doctors, nurses, healthcare practitioners, telemedical agents, students, and academicians seeking coverage on the latest technological developments in medical data analysis and connectivity.


Multimedia Security

Multimedia Security

Author: Frank Y. Shih

Publisher: CRC Press

Published: 2017-12-19

Total Pages: 423

ISBN-13: 1439873321

DOWNLOAD EBOOK

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.