Multimedia Encryption and Authentication Techniques and Applications

Multimedia Encryption and Authentication Techniques and Applications

Author: Borko Furht

Publisher: CRC Press

Published: 2006-05-03

Total Pages: 265

ISBN-13: 1000654737

DOWNLOAD EBOOK

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des


Multimedia Security Handbook

Multimedia Security Handbook

Author: Borko Furht

Publisher: CRC Press

Published: 2004-12-28

Total Pages: 832

ISBN-13: 1420038265

DOWNLOAD EBOOK

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia securit


Chaos-based Cryptography

Chaos-based Cryptography

Author: Ljupco Kocarev

Publisher: Springer Science & Business Media

Published: 2011-06-17

Total Pages: 400

ISBN-13: 3642205410

DOWNLOAD EBOOK

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.


Intelligent Techniques in Signal Processing for Multimedia Security

Intelligent Techniques in Signal Processing for Multimedia Security

Author: Nilanjan Dey

Publisher: Springer

Published: 2016-10-18

Total Pages: 483

ISBN-13: 3319447904

DOWNLOAD EBOOK

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.


Proceedings of International Conference on Information Technology and Applications

Proceedings of International Conference on Information Technology and Applications

Author: Abrar Ullah

Publisher: Springer Nature

Published: 2022-04-21

Total Pages: 753

ISBN-13: 9811676186

DOWNLOAD EBOOK

This book includes high-quality papers presented at 15th International Conference on Information Technology and Applications (ICITA 2021), held in Dubai, UAE during 13 – 14 November 2021. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in information technology and applications. The topics covered in the book are cloud computing, business process engineering, machine learning, evolutionary computing, big data analytics, internet of things and cyber-physical systems, information and knowledge management, computer vision and image processing, computer graphics and games programming, mobile computing, ontology engineering, software and systems modelling, human computer interaction, online learning / e-learning, computer networks, and web engineering.


Document and Image Compression

Document and Image Compression

Author: Mauro Barni

Publisher: CRC Press

Published: 2018-10-08

Total Pages: 456

ISBN-13: 1420018833

DOWNLOAD EBOOK

Although it's true that image compression research is a mature field, continued improvements in computing power and image representation tools keep the field spry. Faster processors enable previously intractable compression algorithms and schemes, and certainly the demand for highly portable high-quality images will not abate. Document and Image Compression highlights the current state of the field along with the most probable and promising future research directions for image coding. Organized into three broad sections, the book examines the currently available techniques, future directions, and techniques for specific classes of images. It begins with an introduction to multiresolution image representation, advanced coding and modeling techniques, and the basics of perceptual image coding. This leads to discussions of the JPEG 2000 and JPEG-LS standards, lossless coding, and fractal image compression. New directions are highlighted that involve image coding and representation paradigms beyond the wavelet-based framework, the use of redundant dictionaries, the distributed source coding paradigm, and novel data-hiding techniques. The book concludes with techniques developed for classes of images where the general-purpose algorithms fail, such as for binary images and shapes, compound documents, remote sensing images, medical images, and VLSI layout image data. Contributed by international experts, Document and Image Compression gathers the latest and most important developments in image coding into a single, convenient, and authoritative source.


Mathematics of Data/image Pattern Recognition, Compression, and Encryption with Applications IX

Mathematics of Data/image Pattern Recognition, Compression, and Encryption with Applications IX

Author: G. X. Ritter

Publisher:

Published: 2006

Total Pages: 270

ISBN-13:

DOWNLOAD EBOOK

Proceedings of SPIE present the original research papers presented at SPIE conferences and other high-quality conferences in the broad-ranging fields of optics and photonics. These books provide prompt access to the latest innovations in research and technology in their respective fields. Proceedings of SPIE are among the most cited references in patent literature.