Advances in Automation, Signal Processing, Instrumentation, and Control

Advances in Automation, Signal Processing, Instrumentation, and Control
Author: Venkata Lakshmi Narayana Komanapalli
Publisher: Springer Nature
Total Pages: 3212
Release: 2021-03-04
Genre: Technology & Engineering
ISBN: 9811582211

This book presents the select proceedings of the International Conference on Automation, Signal Processing, Instrumentation and Control (i-CASIC) 2020. The book mainly focuses on emerging technologies in electrical systems, IoT-based instrumentation, advanced industrial automation, and advanced image and signal processing. It also includes studies on the analysis, design and implementation of instrumentation systems, and high-accuracy and energy-efficient controllers. The contents of this book will be useful for beginners, researchers as well as professionals interested in instrumentation and control, and other allied fields.

Handbook of Image-based Security Techniques

Handbook of Image-based Security Techniques
Author: Shivendra Shivani
Publisher: CRC Press
Total Pages: 410
Release: 2018-05-20
Genre: Computers
ISBN: 1351681559

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB

Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security
Author: Bahram Javidi
Publisher: Springer Science & Business Media
Total Pages: 356
Release: 2006-11-22
Genre: Science
ISBN: 0387250964

There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system—even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.

Digital Image Security

Digital Image Security
Author: Amit Kumar Singh
Publisher: CRC Press
Total Pages: 351
Release: 2024-05-14
Genre: Technology & Engineering
ISBN: 1040013198

This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas. It further discusses important topics such as biometric imaging, big data security and privacy in healthcare, security and privacy in the internet of things, and security in cloud-based image processing. This book Presents new ideas, approaches, theories, and practices with a focus on digital image security and privacy solutions for real-world applications. Discusses security in cloud-based image processing for smart city applications. Provides an overview of innovative security techniques that are being developed to ensure the guaranteed authenticity of transmitted, shared, or stored digital images. Highlights approaches such as watermarking, blockchain, and hashing. to secure digital images in artificial intelligence, machine learning, cloud computing, and temper detection environments. Explains important topics such as biometric imaging, blockchain for digital data security, and protection systems against personal identity theft. It will serve as an ideal reference text for senior undergraduate, graduate students, academic researchers, and professionals in the fields including electrical engineering, electronics, communications engineering, and computer engineering.

Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities

Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
Author: Swain, Gandharba
Publisher: IGI Global
Total Pages: 210
Release: 2019-06-28
Genre: Computers
ISBN: 1522575170

In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world’s communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.

Steganography Techniques for Digital Images

Steganography Techniques for Digital Images
Author: Abid Yahya
Publisher: Springer
Total Pages: 131
Release: 2018-06-12
Genre: Technology & Engineering
ISBN: 3319785974

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Research and Advanced Technology for Digital Libraries

Research and Advanced Technology for Digital Libraries
Author: László Kovács
Publisher: Springer Science & Business Media
Total Pages: 600
Release: 2007-09-06
Genre: Computers
ISBN: 3540748504

This book constitutes the refereed proceedings of the 10th European Conference on Research and Advanced Technology for Digital Libraries, ECDL 2007, held in Budapest, Hungary. The papers are organized in topical sections on ontologies, digital libraries and the web, models, multimedia and multilingual DLs, grid and peer-to-peer, preservation, user interfaces, document linking, information retrieval, personal information management, new DL applications, and user studies.

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Author: Lu, Chun-Shien
Publisher: IGI Global
Total Pages: 268
Release: 2004-07-31
Genre: Business & Economics
ISBN: 1591401933

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Digital Multimedia: Concepts, Methodologies, Tools, and Applications

Digital Multimedia: Concepts, Methodologies, Tools, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1797
Release: 2017-09-13
Genre: Computers
ISBN: 1522538232

Contemporary society resides in an age of ubiquitous technology. With the consistent creation and wide availability of multimedia content, it has become imperative to remain updated on the latest trends and applications in this field. Digital Multimedia: Concepts, Methodologies, Tools, and Applications is an innovative source of scholarly content on the latest trends, perspectives, techniques, and implementations of multimedia technologies. Including a comprehensive range of topics such as interactive media, mobile technology, and data management, this multi-volume book is an ideal reference source for engineers, professionals, students, academics, and researchers seeking emerging information on digital multimedia.

Cryptography: Breakthroughs in Research and Practice

Cryptography: Breakthroughs in Research and Practice
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 578
Release: 2019-12-06
Genre: Computers
ISBN: 1799817644

Advances in technology have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.