HOME > 상세정보

상세정보

Cryptographic and information security : approaches for images and videos

Cryptographic and information security : approaches for images and videos

자료유형
단행본
개인저자
Ramakrishnan, S.
서명 / 저자사항
Cryptographic and information security : approaches for images and videos / edited by S. Ramakrishnan.
발행사항
Boca Raton :   CRCPress, Taylor & Francis Group,   c2019.  
형태사항
xxiv, 961 p. : ill. ; 25 cm.
ISBN
9781138563841 (hardback : acid-free paper) 9780429435461 (ebk.)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security. Multimedia communications --Security measures. Data encryption (Computer science). Data protection.
000 00000cam u2200205 a 4500
001 000046007441
005 20191206114310
008 191126s2019 flua b 001 0 eng d
010 ▼a 2018026578
020 ▼a 9781138563841 (hardback : acid-free paper)
020 ▼a 9780429435461 (ebk.)
035 ▼a (KERIS)REF000018714535
040 ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b C843 2019
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b C9572
245 0 0 ▼a Cryptographic and information security : ▼b approaches for images and videos / ▼c edited by S. Ramakrishnan.
260 ▼a Boca Raton : ▼b CRCPress, Taylor & Francis Group, ▼c c2019.
300 ▼a xxiv, 961 p. : ▼b ill. ; ▼c 25 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security.
650 0 ▼a Multimedia communications ▼x Security measures.
650 0 ▼a Data encryption (Computer science).
650 0 ▼a Data protection.
700 1 ▼a Ramakrishnan, S.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C9572c 등록번호 121251204 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.



This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.


정보제공 : Aladin

목차

Introduction to Information Security Systems Primitives - Majid Khan and Syeda Iram Batool Naqvi


Cryptographic Image Scrambling Techniques - Bhaskar Mondal


Chaos Based Image Cryptography - Charles Z. Liu, Linda Y. Dong, and Raymond P. Shaw


Fundamental Cryptographic Characteristics of Boolean Functions - A Review -Majid Khan and Syeda Iram Batool Naqvi


Phase Retrieval in Optical Cryptography - Naveen Kumar Nishchaland Areeba Fatima


Security and Cryptography in images and video using Elliptic Curve Cryptography(ECC) - Piyush Raghav and Amit Dua


Security of Scalable Video Coding : Encryption and Authentication - Zhuo Wei, Swee Won Lo, Yongdong Wu, Yanjiang Yang, Zheng Yan and Robert H. Deng


Compressive Sensing in Color Image Security - Rohit Thanki, Surekha Borra, Komal Borisagar and Nilanjan Dey


Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings - Sreenivasa Rao and Nishant Doshi


Multimedia contents encryption using the chaotic MACM system on a smart-display - Rodrigo Mendez-Ramrez, Adrian Arellano-Delgado, Miguel Murillo-Escobar, and Cesar Cruz-Hernandez


Medical Image Encryption - V. Padmapriya and R. Amirtharajan


Watermarking Techniques for Copyright Protection of Texts in Document Files - Surekha Borra, Rohit Thanki and Nilanjan Dey


VLSI Implementation Of Video Watermarking for Secure HEVC Coding Standard -Amit Mahesh Joshi


Data hiding in compressed images and videos - Liu Shaohui


Robust Image Watermarking Based on Multiple-criteria Decision-Making (MCDM) - Musab Ghadi, Lamri Laouamer, Laurent Nana and Anca Pascu


The role of image fusion and watermarking techniques in medical imaging - Ch. Hima Bindu


Watermarking techniques and its applications in Tele-Health: A Technical Survey - Sriti Thakur, Amit kumar Singh, Satya Prakash Ghrera and Mayank Dave


Utilization of Small S-boxes for Information Hiding - Majid Khan and SyedaIram Batool Naqvi


Secure and robust ECG steganography using Fractional Fourier transform - Gajanan K. Birajdar, Vishwesh A. Vyawahare and Mukesh D. Patil


Visual secret sharing scheme for (k,n) threshold based on QR code with multiple decryptions - Song Wan, Yuliang Lu, Xuehu Yan, Yongjie Wang and Chao Chang


Steganography based on interpolation and edge detection techniques - Ki-Hyun Jung


Steganography and Medical Data Security - Rukiye Karakis and Inan Guler


Digital Visual Media Forensics - Raahat Devender Singh


Review of Image Tampering Detection Techniques - Manu V T and B. M. Mehtre


Blockchain security for wireless multimedia networks - Ankit Songara , Lokeshchouhan and Pankaj Kumar


Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method - Zahra Hossein-Nejad and Mehdi Nasri


Anti-Forensics for Image & Video Tampering: A Review - Sitara K and B M Mehtre


Securing biometrics using data hiding techniques - Mehul S Raval, Vaibhav B Joshi and Jignesh S Bhatt


Secure Biometric Modalities for Effective Communication - Sandhya Tarar


Application of Video based Face Recognition for Mobile Security using Machine Learning Techniques - Emir Kremic and Abdulhamit Subasi


Biometrics based authentication scheme for Cloud Environment - G. Jaspher Willsie Kathrine

관련분야 신착자료

Harvard Business Review (2025)