Intelligent Techniques in Signal Processing for Multimedia Security

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encry...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Dey, Nilanjan. (Editor, http://id.loc.gov/vocabulary/relators/edt), Santhi, V. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edition:1st ed. 2017.
Series:Studies in Computational Intelligence, 660
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-44790-2
Table of Contents:
  • Security of Multimedia Contents: A Brief
  • A Survey on Intelligent Security Techniques for High Definition Multimedia Data
  • Intelligent Morphing and Steganography Techniques for Multimedia Security
  • Information Hiding: Steganography
  • Digital Watermarking: A Potential Solution For Multimedia Authentication
  • Real Time Implementation of Reversible Watermarking
  • Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking
  • Biometric Based Security System: Issues and Challenges
  • Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network
  • Hand Image based Personal Authentication System
  • A Study on Security and Surveillance System using Gait Recognition
  • Face Recognition under Dry and Wet Face Conditions
  • Improved Approach for 3D Face Characterization
  • Attendance Recording System using Partial Face Recognition Algorithm
  • Automatic Human Emotion Recognition in Surveillance Video
  • Watermarking in Bio-medical Signal Processing
  • Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications
  • A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel
  • StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection
  • Adaptive Color Image Watermarking Scheme Using Weibull Distribution
  • Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.