Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos
Author: S. Ramakrishnan
Publisher: CRC Press
Total Pages: 937
Release: 2018-12-07
Genre: Computers
ISBN: 042978807X

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.

Cryptography for Security and Privacy in Cloud Computing

Cryptography for Security and Privacy in Cloud Computing
Author: Stefan Rass
Publisher: Artech House
Total Pages: 264
Release: 2013-11-01
Genre: Computers
ISBN: 1608075753

As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers. This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each.

Emerging Networking in the Digital Transformation Age

Emerging Networking in the Digital Transformation Age
Author: Mikhailo Klymash
Publisher: Springer Nature
Total Pages: 694
Release: 2023-03-20
Genre: Technology & Engineering
ISBN: 3031249631

This book covers a range of leading-edge topics. It is suitable for teaching specialists for advanced lectures in the domains of systems architecture and distributed platforms. Furthermore, it serves as a basis for undergraduates as well as an inspiration for interesting postgraduates, looking for new challenges. It addresses a holistic view of QoS, which becomes nowadays via Digital Transformations less technically and more socially driven. This includes IoT, energy efficiency, secure transactions, blockchains, and smart contracting. Under the term Emerging Networking (EmN), we cover the steadily growing diversity of smart mobile and robotic apps and unmanned scenarios (UAV). EmN supports distributed intelligence across the combined mobile, wireless, and fixed networks in the edge-to-cloud continuum. The 6G driving factors and potentials in the mid-term are examined. Operative (emergency) networking, which assists rescue troops at sites, also belongs to the above-mentioned problems. The EmN architecture includes the components of SDN, blockchain, and AI with efficient slicing and cloud support. The design peculiarities in dynamically changing domains, such as Smart Shopping/Office/Home, Context-Sensitive Intelligent apps, are discussed. Altogether, the provided content is technically interesting while still being rather practically oriented and therefore straightforward to understand. This book originated from the close cooperation of scientists from Germany, Ukraine, Israel, Switzerland, Slovak Republic, Poland, Czech Republic, South Korea, China, Italy, North Macedonia, Azerbaijan, Kazakhstan, France, Latvia, Greece, Romania, USA, Finland, Morocco, Ireland, and the United Kingdom. We wish all readers success and lots of inspiration from this useful book!

Digital Image and Video Watermarking and Steganography

Digital Image and Video Watermarking and Steganography
Author: Srinivasan Ramakrishnan
Publisher: Intechopen
Total Pages: 88
Release: 2019-09-18
Genre: Computers
ISBN: 1789841674

Authenticating data such as image, video, and audio is an important task in digital communication. Another critical task is establishing ownership of the copyright. Digital watermarking is a technique used to provide authentication and ownership of the copyright to the data. Too much digitalization of data in the form of image, video, and audio communicated through various web and mobile applications makes authentication a challenging task. Steganography, the art of hiding tiny pieces of data in image, video, and audio, can also help in copyright protection, authentication, and access control. This book provides three watermarking and two steganography methods and will be a useful resource for graduate students, researchers, and practicing engineers in the field of electrical engineering.

Design Studies and Intelligence Engineering

Design Studies and Intelligence Engineering
Author: L.C. Jain
Publisher: IOS Press
Total Pages: 668
Release: 2023-01-31
Genre: Computers
ISBN: 164368373X

The technologies applied in design studies vary from basic theories to more application-based systems. Intelligence engineering also plays a significant role in design sciences such as computer-aided industrial design, human factor design, and greenhouse design, and intelligent engineering technologies such as computational technologies, sensing technologies, and video detection encompass both theory and application perspectives. Being multidisciplinary in nature, intelligence engineering promotes cooperation, exchange and discussion between organizations and researchers from diverse fields. This book presents the proceedings of DSIE 2022, the International Symposium on Design Studies and Intelligence Engineering, held in Hangzhou, China, on 29 & 30 October 2022. This annual conference proves a platform for professionals and researchers from industry and academia to exchange and discuss recent advances in the field of design studies and intelligence engineering, inviting renowned experts from around the world to speak on their specialist topics, and allowing for in-depth discussion with presenters. The 189 submissions received were each carefully reviewed by 3 or 4 referees, and the 62 papers accepted for presentation and publication were selected based on their scores. Papers cover a very wide range of topics, from the design of a bachelor apartment, or a children’s backpack for healthy spine development, to interpretable neural symbol learning methods and design elements extraction from point-cloud datasets using deep enhancement learning. Offering a varied overview of recent developments in design and intelligence engineering, this book will be of interest to all those working in the field.

Proceedings of International Conference on Emerging Technologies and Intelligent Systems

Proceedings of International Conference on Emerging Technologies and Intelligent Systems
Author: Mostafa Al-Emran
Publisher: Springer Nature
Total Pages: 1024
Release: 2021-12-02
Genre: Technology & Engineering
ISBN: 3030859908

This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on four different themes, including Artificial Intelligence and Soft Computing, Information Security and Networking, Medical Informatics, and Advances in Information Systems. Each chapter contributes to the aforementioned themes by discussing the recent design, developments, and modifications of intelligent systems and their applications.

Basic Methods of Cryptography

Basic Methods of Cryptography
Author: Jan C. A. Lubbe
Publisher: Cambridge University Press
Total Pages: 248
Release: 1998-03-12
Genre: Computers
ISBN: 9780521555593

Textbook on cryptography for students of electrical engineering and computer science.

Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime: Concepts, Methodologies, Tools and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1885
Release: 2011-11-30
Genre: Computers
ISBN: 1613503245

Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Author: Gupta, Brij
Publisher: IGI Global
Total Pages: 616
Release: 2016-05-16
Genre: Computers
ISBN: 1522501061

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.