Intelligent Techniques in Signal Processing for Multimedia Security

Intelligent Techniques in Signal Processing for Multimedia Security
Author: Nilanjan Dey
Publisher: Springer
Total Pages: 483
Release: 2016-10-18
Genre: Technology & Engineering
ISBN: 3319447904

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Author: Lu, Chun-Shien
Publisher: IGI Global
Total Pages: 268
Release: 2004-07-31
Genre: Business & Economics
ISBN: 1591401933

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Multimedia Security

Multimedia Security
Author: Kaiser J. Giri
Publisher: Springer Nature
Total Pages: 305
Release: 2021-01-11
Genre: Technology & Engineering
ISBN: 9811587116

This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.

Wearable and Implantable Medical Devices

Wearable and Implantable Medical Devices
Author: Nilanjan Dey
Publisher: Academic Press
Total Pages: 279
Release: 2019-09-06
Genre: Science
ISBN: 0128156376

Wearable and Implantable Medical Devices: Applications and Challenges, Fourth Edition highlights the new aspects of wearable and implanted sensors technology in the healthcare sector and monitoring systems. The book's contributions include several interdisciplinary domains, such as wearable sensors, implanted sensors devices, Internet-of-Things (IoT), security, real-time medical healthcare monitoring, WIBSN design and data management, encryption, and decision-support systems. Contributions emphasize several topics, including real-world applications and the design and implementation of wearable devices. This book demonstrates that this new field has a brilliant future in applied healthcare research and in healthcare monitoring systems. - Includes comprehensive information on wearable and implanted device technology, wearable and implanted sensors design, WIBSN requirements, WIBSN in monitoring systems and security concepts - Highlights machine learning and computing in healthcare monitoring systems based on WIBSN - Includes a multidisciplinary approach to different healthcare applications and their associated challenges based on wearable and implanted technologies

Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery

Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 689
Release: 2021-01-15
Genre: Medical
ISBN: 1799881075

Telemedicine, which involves electronic communications and software, provides the same clinical services to patients without the requirement of an in-person visit. Essentially, this is considered remote healthcare. Though telemedicine is not a new practice, it has become an increasingly popular form of healthcare delivery due to current events, including the COVID-19 pandemic. Not only are visits being moved onto virtual platforms, but additional materials and correspondence can remain in the digital sphere. Virtual lab results, digital imaging, medical diagnosis, and video consultations are just a few examples that encompass how telemedicine can be used for increased accessibility in healthcare delivery. With telemedicine being used in both the diagnosis and treatment of patients, technology in healthcare can be implemented at almost any phase of the patient experience. As healthcare delivery follows the digital shift, it is important to understand the technologies, benefits and challenges, and overall impacts of the remote healthcare experience. The Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery presents the latest research on best practices for adopting telehealth into medical practices and its efficacy and solutions for the improvement of telemedicine, as well as addresses emerging challenges and opportunities, including issues such as securing patient data and providing healthcare accessibility to rural populations. Covering important themes that include doctor-patient relationships, tele-wound monitoring, and telemedicine regulations, this book is essential for healthcare professionals, doctors, medical students, academic and medical libraries, medical technologists, practitioners, stakeholders, researchers, academicians, and students interested in the emerging technological developments and solutions within the field of telemedicine.

Digital Image Watermarking

Digital Image Watermarking
Author: Surekha Borra
Publisher: CRC Press
Total Pages: 175
Release: 2018-12-07
Genre: Computers
ISBN: 0429751575

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Recent Trends in Computational Intelligence

Recent Trends in Computational Intelligence
Author: Ali Sadollah
Publisher: BoD – Books on Demand
Total Pages: 200
Release: 2020-05-06
Genre: Computers
ISBN: 1838807055

Traditional models struggle to cope with complexity, noise, and the existence of a changing environment, while Computational Intelligence (CI) offers solutions to complicated problems as well as reverse problems. The main feature of CI is adaptability, spanning the fields of machine learning and computational neuroscience. CI also comprises biologically-inspired technologies such as the intellect of swarm as part of evolutionary computation and encompassing wider areas such as image processing, data collection, and natural language processing. This book aims to discuss the usage of CI for optimal solving of various applications proving its wide reach and relevance. Bounding of optimization methods and data mining strategies make a strong and reliable prediction tool for handling real-life applications.

Supervised and Unsupervised Data Engineering for Multimedia Data

Supervised and Unsupervised Data Engineering for Multimedia Data
Author: Suman Kumar Swarnkar
Publisher: John Wiley & Sons
Total Pages: 251
Release: 2024-04-02
Genre: Medical
ISBN: 1119786428

SUPERVISED and UNSUPERVISED DATA ENGINEERING for MULTIMEDIA DATA Explore the cutting-edge realms of data engineering in multimedia with Supervised and Unsupervised Data Engineering for Multimedia Data, where expert contributors delve into innovative methodologies, offering invaluable insights to empower both novices and seasoned professionals in mastering the art of manipulating multimedia data with precision and efficiency. Supervised and Unsupervised Data Engineering for Multimedia Data presents a groundbreaking exploration into the intricacies of handling multimedia data through the lenses of both supervised and unsupervised data engineering. Authored by a team of accomplished experts in the field, this comprehensive volume serves as a go-to resource for data scientists, computer scientists, and researchers seeking a profound understanding of cutting-edge methodologies. The book seamlessly integrates theoretical foundations with practical applications, offering a cohesive framework for navigating the complexities of multimedia data. Readers will delve into a spectrum of topics, including artificial intelligence, machine learning, and data analysis, all tailored to the challenges and opportunities presented by multimedia datasets. From foundational principles to advanced techniques, each chapter provides valuable insights, making this book an essential guide for academia and industry professionals alike. Whether you’re a seasoned practitioner or a newcomer to the field, Supervised and Unsupervised Data Engineering for Multimedia Data illuminates the path toward mastery in manipulating and extracting meaningful insights from multimedia data in the modern age.

Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications

Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1805
Release: 2019-09-06
Genre: Computers
ISBN: 1522598677

The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.

Artificial Intelligence and Security

Artificial Intelligence and Security
Author: Xingming Sun
Publisher: Springer
Total Pages: 678
Release: 2019-07-18
Genre: Computers
ISBN: 303024265X

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.