Intelligent Techniques in Signal Processing for Multimedia Security

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Science & Nature, Technology, Electronics, General Computing
Cover of the book Intelligent Techniques in Signal Processing for Multimedia Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319447902
Publisher: Springer International Publishing Publication: October 18, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319447902
Publisher: Springer International Publishing
Publication: October 18, 2016
Imprint: Springer
Language: English

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. 

As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.

This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. 

As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.

This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

More books from Springer International Publishing

Cover of the book A Comparative Political Ecology of Exurbia by
Cover of the book Alien Encounter by
Cover of the book Governance of Biotechnology in Post-Soviet Russia by
Cover of the book Cyber Physical Systems. Design, Modeling, and Evaluation by
Cover of the book Psychological Trauma and the Legacies of the First World War by
Cover of the book Motion Control of Underactuated Mechanical Systems by
Cover of the book Practical Text Analytics by
Cover of the book Foundational Aspects of Family-School Partnership Research by
Cover of the book Open Problems in the Geometry and Analysis of Banach Spaces by
Cover of the book Handbook of Evidence-Based Stereotactic Radiosurgery and Stereotactic Body Radiotherapy by
Cover of the book Methods for Appearance-based Loop Closure Detection by
Cover of the book Learning Representation for Multi-View Data Analysis by
Cover of the book Diaspora and Media in Europe by
Cover of the book Legacies of the Degraded Image in Violent Digital Media by
Cover of the book Specific Intermolecular Interactions of Element-Organic Compounds by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy