000 05573nam a2200505Ii 4500
001 9780429435461
003 FlBoTFG
005 20220711212418.0
006 m o d
007 cr
008 190122t20182019fluab ob 001 0 eng d
020 _a9780429435461(e-book : PDF)
035 _a(OCoLC)1078763260
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9
_b.A25
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aCOM
_x060000
_2bisacsh
072 7 _aTEC
_x015000
_2bisacsh
072 7 _aUDB
_2bicscc
082 0 4 _a005.8
_223
100 1 _aRamakrishnan, S.,
_eauthor.
_91694
245 1 0 _aCryptographic and Information Security Approaches for Images and Videos /
_cby S. Ramakrishnan.
250 _aFirst edition.
264 1 _aBoca Raton, FL :
_bCRC Press,
_c[2018].
264 4 _c©2019.
300 _a1 online resource (986 pages) :
_b882 illustrations, text file, PDF
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 0 _tIntroduction to Information Security Systems Primitives - Majid Khan and Syeda Iram Batool Naqvi -- Cryptographic Image Scrambling Techniques - Bhaskar Mondal -- Chaos Based Image Cryptography - Charles Z. Liu, Linda Y. Dong, and Raymond P. Shaw -- Fundamental Cryptographic Characteristics of Boolean Functions - A Review -Majid Khan and Syeda Iram Batool Naqvi -- Phase Retrieval in Optical Cryptography - Naveen Kumar Nishchaland Areeba Fatima -- Security and Cryptography in images and video using Elliptic Curve Cryptography(ECC) - Piyush Raghav and Amit Dua -- Security of Scalable Video Coding : Encryption and Authentication - Zhuo Wei, Swee Won Lo, Yongdong Wu, Yanjiang Yang, Zheng Yan and Robert H. Deng -- Compressive Sensing in Color Image Security - Rohit Thanki, Surekha Borra, Komal Borisagar and Nilanjan Dey -- Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings - Sreenivasa Rao and Nishant Doshi -- Multimedia contents encryption using the chaotic MACM system on a smart-display - Rodrigo Mendez-Ramrez, Adrian Arellano-Delgado, Miguel Murillo-Escobar, and Cesar Cruz-Hernandez -- Medical Image Encryption - V. Padmapriya and R. Amirtharajan -- Watermarking Techniques for Copyright Protection of Texts in Document Files - Surekha Borra, Rohit Thanki and Nilanjan Dey -- VLSI Implementation Of Video Watermarking for Secure HEVC Coding Standard -Amit Mahesh Joshi -- Data hiding in compressed images and videos - Liu Shaohui -- Robust Image Watermarking Based on Multiple-criteria Decision-Making (MCDM) - Musab Ghadi, Lamri Laouamer, Laurent Nana and Anca Pascu -- The role of image fusion and watermarking techniques in medical imaging - Ch. Hima Bindu -- Watermarking techniques and its applications in Tele-Health: A Technical Survey - Sriti Thakur, Amit kumar Singh, Satya Prakash Ghrera and Mayank Dave -- Utilization of Small S-boxes for Information Hiding - Majid Khan and SyedaIram Batool Naqvi -- Secure and robust ECG steganography using Fractional Fourier transform - Gajanan K. Birajdar, Vishwesh A. Vyawahare and Mukesh D. Patil -- Visual secret sharing scheme for (k,n) threshold based on QR code with multiple decryptions - Song Wan, Yuliang Lu, Xuehu Yan, Yongjie Wang and Chao Chang -- Steganography based on interpolation and edge detection techniques - Ki-Hyun Jung -- Steganography and Medical Data Security - Rukiye Karakis and Inan Guler -- Digital Visual Media Forensics - Raahat Devender Singh -- Review of Image Tampering Detection Techniques - Manu V T and B. M. Mehtre -- Blockchain security for wireless multimedia networks - Ankit Songara , Lokeshchouhan and Pankaj Kumar -- Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method - Zahra Hossein-Nejad and Mehdi Nasri -- Anti-Forensics for Image & Video Tampering: A Review - Sitara K and B M Mehtre -- Securing biometrics using data hiding techniques - Mehul S Raval, Vaibhav B Joshi and Jignesh S Bhatt -- Secure Biometric Modalities for Effective Communication - Sandhya Tarar -- Application of Video based Face Recognition for Mobile Security using Machine Learning Techniques - Emir Kremi and Abdulhamit Subasi -- Biometrics based authentication scheme for Cloud Environment - G. Jaspher Willsie Kathrine.
520 3 _aThis book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
530 _aAlso available in print format.
650 7 _aCOMPUTERS / Internet / General.
_2bisacsh
_912733
650 7 _aTECHNOLOGY & ENGINEERING / Imaging Systems.
_2bisacsh
_99703
650 0 _aComputer security.
_93970
650 0 _aMultimedia communications
_xSecurity measures.
_916319
650 0 _aData encryption (Computer science)
_99168
650 0 _aData protection.
_97245
655 0 _aElectronic books.
_93294
710 2 _aTaylor and Francis.
_910719
776 0 8 _iPrint version:
_z9781138563841
856 4 0 _uhttps://www.taylorfrancis.com/books/9780429435461
_zClick here to view
942 _cEBK
999 _c71232
_d71232