Intelligent Multimedia Analysis for Security Applications

Intelligent Multimedia Analysis for Security Applications

Author: Husrev T. Sencar

Publisher: Springer Science & Business Media

Published: 2010-04-22

Total Pages: 406

ISBN-13: 3642117546

DOWNLOAD EBOOK

This is one of the very few books focused on analysis of multimedia data and newly emerging multimedia applications with an emphasis on security. The main objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most comprehensive list of research references. The book includes sixteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. Topics covered include dangerous or abnormal event detection, interaction recognition, person identification based on multiple traits, audiovisual biometric person authentication and liveness verification, emerging biometric technologies, sensitive information filtering for teleradiology, detection of nakedness in images, audio forensics, steganalysis, media content tracking authentication and illegal distributor identification through watermarking and content-based copy detection. We believe that the comprehensive coverage of diverse disciplines in the field of intelligent multimedia analysis for security applications will contribute to a better understanding of all topics, research, and discoveries in this emerging and evolving field and that the included contributions will be instrumental in the expansion of the corresponding body of knowledge, making this book a reference source of information. It is our sincere hope that this publication and its great amount of information and research will assist our research colleagues, faculty members and students, and organization decision makers in enhancing their understanding for the concepts, issues, problems, trends, challenges and opportunities related to this research field. Perhaps this book will even inspire its readers to contribute to the current discoveries in this immense field.


Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications

Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications

Author: Tran Khanh Dang

Publisher: Springer Nature

Published: 2021-11-13

Total Pages: 502

ISBN-13: 9811680620

DOWNLOAD EBOOK

This book constitutes the proceedings of the 8th International Conference on Future Data and Security Engineering, FDSE 2021, held in Ho Chi Minh City, Vietnam, in November 2021.* The 28 full papers and 8 short were carefully reviewed and selected from 168 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; blockchain and access control; data analytics and healthcare systems; and short papers: security and data engineering. * The conference was held virtually due to the COVID-19 pandemic.


Ambient Intelligence – Software and Applications –,10th International Symposium on Ambient Intelligence

Ambient Intelligence – Software and Applications –,10th International Symposium on Ambient Intelligence

Author: Paulo Novais

Publisher: Springer

Published: 2019-06-22

Total Pages: 238

ISBN-13: 3030240975

DOWNLOAD EBOOK

This book presents the latest research on Ambient Intelligence including software and applications. Ambient Intelligence (AmI) is a paradigm emerging from Artificial Intelligence, in which computers are used as proactive tools for assisting people with their day-to-day activities, making everyone’s lives more comfortable. Another main concern of AmI originates from the human–computer interaction domain and focuses on offering ways to interact with systems in a more natural way by means of user-friendly interfaces. This field is evolving rapidly, as can be seen in emerging natural language and gesture-based types of interaction. This symposium was jointly organized by the Universidade do Minho, Technical University of Valencia, Hiroshima University, and University of Salamanca. The latest installment was held in Ávila, Spain, from 26th to 28th June 2019. The authors wish to thank the sponsors: IEEE Systems Man and Cybernetics Society, Spain Section Chapter and the IEEE Spain Section (Technical Co-Sponsor), IBM, Indra, Viewnext, Global Exchange, AEPIA, APPIA and AIR Institute.


Multimedia Security 2

Multimedia Security 2

Author: William Puech

Publisher: John Wiley & Sons

Published: 2022-07-20

Total Pages: 322

ISBN-13: 1789450276

DOWNLOAD EBOOK

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.


Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2010

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2010

Author: Roger Lee

Publisher: Springer Science & Business Media

Published: 2010-10-01

Total Pages: 166

ISBN-13: 3642132642

DOWNLOAD EBOOK

th The purpose of the 11 Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2010) held on June 9 – 11, 2010 in London, United Kingdom was to bring together researchers and scientists, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. Our conference officers selected the best 15 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rounds of rigorous review. In Chapter 1, Cai Luyuan et al. Present a new method of shape decomposition based on a refined morphological shape decomposition process. In Chapter 2, Kazunori Iwata et al. propose a method for reducing the margin of error in effort and error prediction models for embedded software development projects using artificial neural networks (ANNs). In Chapter 3, Viliam Šimko et al. describe a model-driven tool that allows system code to be generated from use-cases in plain English. In Chapter 4, Abir Smiti and Zied Elouedi propose a Case Base Maintenance (CBM) method that uses machine learning techniques to preserve the maximum competence of a system. In Chapter 5, Shagufta Henna and Thomas Erlebach provide a simulation based analysis of some widely used broadcasting schemes within mobile ad hoc networks (MANETs) and propose adaptive extensions to an existing broadcasting algorithm.


Intelligent Information Access

Intelligent Information Access

Author: Giuliano Armano

Publisher: Springer

Published: 2010-07-08

Total Pages: 148

ISBN-13: 3642140009

DOWNLOAD EBOOK

Written from a multidisciplinary perspective, Intelligent Information Access investigates new insights into methods, techniques and technologies for intelligent information access. The chapters are written by participants in the Intelligent Information Access meeting, held in Cagliari, Italy, in December 2008.


Software Engineering Research, Management and Applications 2010

Software Engineering Research, Management and Applications 2010

Author: Alain Abran

Publisher: Springer

Published: 2010-05-12

Total Pages: 259

ISBN-13: 3642132731

DOWNLOAD EBOOK

The purpose of the 8th Conference on Software Engineering, Artificial Intelligence Research, Management and Applications (SERA 2010) held on May 24 – 26, 2010 in Montreal, Canada was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas and research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected 15 outstanding papers from SERA 2010, all of which you will find in this volume of Springer's Studies in Computational Intelligence.


Intelligent Systems: From Theory to Practice

Intelligent Systems: From Theory to Practice

Author: Vassil Sgurev

Publisher: Springer

Published: 2010-09-23

Total Pages: 574

ISBN-13: 3642134289

DOWNLOAD EBOOK

In the modern science and technology there are some research directions and ch- lenges which are at the forefront of world wide research activities because of their relevance. This relevance may be related to different aspects. First, from a point of view of researchers it can be implied by just an analytic or algorithmic difficulty in the solution of problems within an area. From a broader perspective, this re- vance can be related to how important problems and challenges in a particular area are to society, corporate or national competitiveness, etc. Needless to say that the latter, more global challenges are probably more decisive a driving force for s- ence seen from a global perspective. One of such “meta-challenges” in the present world is that of intelligent s- tems. For a long time it has been obvious that the complexity of our world and the speed of changes we face in virtually all processes that have impact on our life imply a need to automate many tasks and processes that have been so far limited to human beings because they require some sort of intelligence.


Computational Intelligence in Power Engineering

Computational Intelligence in Power Engineering

Author: Ajith Abraham

Publisher: Springer

Published: 2010-09-08

Total Pages: 385

ISBN-13: 3642140130

DOWNLOAD EBOOK

Computational Intelligence (CI) is one of the most important powerful tools for research in the diverse fields of engineering sciences ranging from traditional fields of civil, mechanical engineering to vast sections of electrical, electronics and computer engineering and above all the biological and pharmaceutical sciences. The existing field has its origin in the functioning of the human brain in processing information, recognizing pattern, learning from observations and experiments, storing and retrieving information from memory, etc. In particular, the power industry being on the verge of epoch changing due to deregulation, the power engineers require Computational intelligence tools for proper planning, operation and control of the power system. Most of the CI tools are suitably formulated as some sort of optimization or decision making problems. These CI techniques provide the power utilities with innovative solutions for efficient analysis, optimal operation and control and intelligent decision making. This edited volume deals with different CI techniques for solving real world Power Industry problems. The technical contents will be extremely helpful for the researchers as well as the practicing engineers in the power industry.


Biometric-Based Physical and Cybersecurity Systems

Biometric-Based Physical and Cybersecurity Systems

Author: Mohammad S. Obaidat

Publisher: Springer

Published: 2018-10-24

Total Pages: 590

ISBN-13: 3319987348

DOWNLOAD EBOOK

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.