Intelligent Techniques in Signal Processing for Multimedia Security

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encry...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Dey, Nilanjan. (Editor, http://id.loc.gov/vocabulary/relators/edt), Santhi, V. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edition:1st ed. 2017.
Series:Studies in Computational Intelligence, 660
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-44790-2
LEADER 05331nam a22005775i 4500
001 978-3-319-44790-2
003 DE-He213
005 20210624080418.0
007 cr nn 008mamaa
008 161018s2017 gw | s |||| 0|eng d
020 |a 9783319447902  |9 978-3-319-44790-2 
024 7 |a 10.1007/978-3-319-44790-2  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a Intelligent Techniques in Signal Processing for Multimedia Security  |h [electronic resource] /  |c edited by Nilanjan Dey, V. Santhi. 
250 |a 1st ed. 2017. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a IX, 485 p. 226 illus., 96 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 660 
505 0 |a Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing. 
520 |a This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems. 
650 0 |a Computational intelligence. 
650 0 |a Artificial intelligence. 
650 0 |a Signal processing. 
650 0 |a Image processing. 
650 0 |a Speech processing systems. 
650 0 |a Multimedia information systems. 
650 1 4 |a Computational Intelligence.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T11014 
650 2 4 |a Artificial Intelligence.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I21000 
650 2 4 |a Signal, Image and Speech Processing.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T24051 
650 2 4 |a Multimedia Information Systems.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I18059 
700 1 |a Dey, Nilanjan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Santhi, V.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319447896 
776 0 8 |i Printed edition:  |z 9783319447919 
776 0 8 |i Printed edition:  |z 9783319831374 
830 0 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 660 
856 4 0 |u https://doi.org/10.1007/978-3-319-44790-2 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)