000 03494nam a22005775i 4500
001 978-981-99-9803-6
003 DE-He213
005 20240730171333.0
007 cr nn 008mamaa
008 240221s2024 si | s |||| 0|eng d
020 _a9789819998036
_9978-981-99-9803-6
024 7 _a10.1007/978-981-99-9803-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aMultimedia Watermarking
_h[electronic resource] :
_bLatest Developments and Trends /
_cedited by Aditya Kumar Sahu.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXII, 136 p. 37 illus., 20 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1. Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA -- 2. Digital Watermarking - Pathway to Secure! -- 3. Secured Digital Watermarking using Neural Networks -- 4. The Impact of Denoising in Watermarking Robustness -- 5. A Watermark Challenge: Synthetic Speech Detection -- 6. Role of Blockchain and Watermarking towards Cyber Security -- 7. Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective.
520 _aMultimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and forgery detection. This book provides an extensive survey from the fundamentals to cutting-edge digital watermarking techniques. One of the crucial aspects of multimedia security is the ability to detect forged/tampered regions from the multimedia object. In this book, we emphasized how tampering detection, localization, and recovery of manipulated information not only limits but also eliminates the scope of unauthorized usage. Finally, this book provides the groundwork for understanding the role of intelligent machines and blockchain in achieving better security in multimedia watermarking. Readers will find it easy to comprehend the wide variety of applications, theoretical principles, and effective solutions for protecting intellectual rights soon after reading this book.
650 0 _aData protection.
_97245
650 0 _aData protection
_xLaw and legislation.
_923450
650 0 _aComputer security.
_93970
650 0 _aComputer networks
_xSecurity measures.
_93969
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Services.
_978910
650 2 4 _aPrivacy.
_935098
650 2 4 _aPrinciples and Models of Security.
_978911
650 2 4 _aMobile and Network Security.
_933624
700 1 _aKumar Sahu, Aditya.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998117
710 2 _aSpringerLink (Online service)
_998120
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819998029
776 0 8 _iPrinted edition:
_z9789819998043
776 0 8 _iPrinted edition:
_z9789819998050
856 4 0 _uhttps://doi.org/10.1007/978-981-99-9803-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87525
_d87525