Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Author: S. Ramakrishnan

Publisher: CRC Press

Published: 2018-12-07

Total Pages: 937

ISBN-13: 042978807X

DOWNLOAD EBOOK

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.


Cryptography for Security and Privacy in Cloud Computing

Cryptography for Security and Privacy in Cloud Computing

Author: Stefan Rass

Publisher: Artech House

Published: 2013-11-01

Total Pages: 264

ISBN-13: 1608075753

DOWNLOAD EBOOK

As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each.


Emerging Networking in the Digital Transformation Age

Emerging Networking in the Digital Transformation Age

Author: Mikhailo Klymash

Publisher: Springer Nature

Published: 2023-03-20

Total Pages: 694

ISBN-13: 3031249631

DOWNLOAD EBOOK

This book covers a range of leading-edge topics. It is suitable for teaching specialists for advanced lectures in the domains of systems architecture and distributed platforms. Furthermore, it serves as a basis for undergraduates as well as an inspiration for interesting postgraduates, looking for new challenges. It addresses a holistic view of QoS, which becomes nowadays via Digital Transformations less technically and more socially driven. This includes IoT, energy efficiency, secure transactions, blockchains, and smart contracting. Under the term Emerging Networking (EmN), we cover the steadily growing diversity of smart mobile and robotic apps and unmanned scenarios (UAV). EmN supports distributed intelligence across the combined mobile, wireless, and fixed networks in the edge-to-cloud continuum. The 6G driving factors and potentials in the mid-term are examined. Operative (emergency) networking, which assists rescue troops at sites, also belongs to the above-mentioned problems. The EmN architecture includes the components of SDN, blockchain, and AI with efficient slicing and cloud support. The design peculiarities in dynamically changing domains, such as Smart Shopping/Office/Home, Context-Sensitive Intelligent apps, are discussed. Altogether, the provided content is technically interesting while still being rather practically oriented and therefore straightforward to understand. This book originated from the close cooperation of scientists from Germany, Ukraine, Israel, Switzerland, Slovak Republic, Poland, Czech Republic, South Korea, China, Italy, North Macedonia, Azerbaijan, Kazakhstan, France, Latvia, Greece, Romania, USA, Finland, Morocco, Ireland, and the United Kingdom. We wish all readers success and lots of inspiration from this useful book!


Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems

Author: Elçi, Atilla

Publisher: IGI Global

Published: 2013-05-31

Total Pages: 611

ISBN-13: 1466640316

DOWNLOAD EBOOK

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.


Design Studies and Intelligence Engineering

Design Studies and Intelligence Engineering

Author: L.C. Jain

Publisher: IOS Press

Published: 2023-01-31

Total Pages: 668

ISBN-13: 164368373X

DOWNLOAD EBOOK

The technologies applied in design studies vary from basic theories to more application-based systems. Intelligence engineering also plays a significant role in design sciences such as computer-aided industrial design, human factor design, and greenhouse design, and intelligent engineering technologies such as computational technologies, sensing technologies, and video detection encompass both theory and application perspectives. Being multidisciplinary in nature, intelligence engineering promotes cooperation, exchange and discussion between organizations and researchers from diverse fields. This book presents the proceedings of DSIE 2022, the International Symposium on Design Studies and Intelligence Engineering, held in Hangzhou, China, on 29 & 30 October 2022. This annual conference proves a platform for professionals and researchers from industry and academia to exchange and discuss recent advances in the field of design studies and intelligence engineering, inviting renowned experts from around the world to speak on their specialist topics, and allowing for in-depth discussion with presenters. The 189 submissions received were each carefully reviewed by 3 or 4 referees, and the 62 papers accepted for presentation and publication were selected based on their scores. Papers cover a very wide range of topics, from the design of a bachelor apartment, or a children’s backpack for healthy spine development, to interpretable neural symbol learning methods and design elements extraction from point-cloud datasets using deep enhancement learning. Offering a varied overview of recent developments in design and intelligence engineering, this book will be of interest to all those working in the field.


Proceedings of International Conference on Emerging Technologies and Intelligent Systems

Proceedings of International Conference on Emerging Technologies and Intelligent Systems

Author: Mostafa Al-Emran

Publisher: Springer Nature

Published: 2021-12-02

Total Pages: 1024

ISBN-13: 3030859908

DOWNLOAD EBOOK

This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on four different themes, including Artificial Intelligence and Soft Computing, Information Security and Networking, Medical Informatics, and Advances in Information Systems. Each chapter contributes to the aforementioned themes by discussing the recent design, developments, and modifications of intelligent systems and their applications.


Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Author: Nemati, Hamid R.

Publisher: IGI Global

Published: 2010-08-31

Total Pages: 407

ISBN-13: 1615207848

DOWNLOAD EBOOK

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.


Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime: Concepts, Methodologies, Tools and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2011-11-30

Total Pages: 1885

ISBN-13: 1613503245

DOWNLOAD EBOOK

Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.