Intelligent Techniques In Signal Processing For Multimedia Security (studies In Computational Intelligence)
by Nilanjan Dey /
2016 / English / PDF
13.4 MB Download
This book proposes new algorithms to ensure secured
communications and prevent unauthorized data exchange in secured
multimedia systems. Focusing on numerous applications’ algorithms
and scenarios, it offers an in-depth analysis of data hiding
technologies including watermarking, cryptography, encryption,
copy control, and authentication. The authors present a framework
for visual data hiding technologies that resolves emerging
problems of modern multimedia applications in several contexts
including the medical, healthcare, education, and wireless
communication networking domains. Further, it introduces several
intelligent security techniques with real-time
implementation.
This book proposes new algorithms to ensure secured
communications and prevent unauthorized data exchange in secured
multimedia systems. Focusing on numerous applications’ algorithms
and scenarios, it offers an in-depth analysis of data hiding
technologies including watermarking, cryptography, encryption,
copy control, and authentication. The authors present a framework
for visual data hiding technologies that resolves emerging
problems of modern multimedia applications in several contexts
including the medical, healthcare, education, and wireless
communication networking domains. Further, it introduces several
intelligent security techniques with real-time
implementation.
As part of its comprehensive coverage, the book discusses
contemporary multimedia authentication and fingerprinting
techniques, while also proposing personal
authentication/recognition systems based on hand images,
surveillance system security using gait recognition, face
recognition under restricted constraints such as dry/wet face
conditions, and three-dimensional face identification using the
approach developed here.
As part of its comprehensive coverage, the book discusses
contemporary multimedia authentication and fingerprinting
techniques, while also proposing personal
authentication/recognition systems based on hand images,
surveillance system security using gait recognition, face
recognition under restricted constraints such as dry/wet face
conditions, and three-dimensional face identification using the
approach developed here.
This book equips perception technology professionals with the
latest technologies, techniques, and strategies for multimedia
security systems, offering a valuable resource for engineers and
researchers working to develop security systems.
This book equips perception technology professionals with the
latest technologies, techniques, and strategies for multimedia
security systems, offering a valuable resource for engineers and
researchers working to develop security systems.