
Multimedia Security
Tools, Techniques, and Applications
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Multimedia security has become one of the most important topics for organizations and individuals. Presenting important state-of-the art multimedia security techniques and algorithms, this book focuses on data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pan sharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. It also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security.
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Cover Page
- Half Title Page
- Title Page
- Copyright Page
- About The Book Series: AAP Research Notes on Optimization And Decision Making Theories
- About the Editors
- Contents
- Contributors
- Abbreviations
- Preface
- Chapter 1 Understanding Multimedia Security
- Chapter 2 Evaluation Metrics Used For Image Encryption to Analyze the Efficiency Toward Various Attacks
- Chapter 3 Machine Learning Approaches to Malware Detection Systems
- Chapter 4 Securing Identities through Biometric Template Security
- Chapter 5 Watermarking and Copyright Protection of Remotely Sensed Images
- Chapter 6 A Future Cyber Security For Secured Smart Home Applications Using The Internet of Things and Blockchain Technology
- Chapter 7 A Secure And Efficient Quantum Adopted Chaotic Cryptosystem For Video Surveillance Applications
- Chapter 8 Evaluation of Pansharpening Techniques for Multimedia Image Enhancement
- Chapter 9 Spam Remark Revelation Utilizing Supervised Machine Learning Approaches in Security Issues
- Chapter 10 Secure Chaos-Based Image Encryption Techniques Based on Feedback Convolution Method
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app