Intelligent techniques in signal processing for multimedia security

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography,...

Full description

Saved in:
Bibliographic Details
Other Authors: Dey, Nilanjan, 1984- (Editor), Santhi, V., 1971- (Editor)
Format: eBook
Language: English
Published: Cham, Switzerland : Springer, [2016]
Series: Studies in computational intelligence ; v. 660.
Subjects:
ISBN: 9783319447902
9783319447896
Physical Description: 1 online resource (ix, 485 pages) : illustrations (some color)

Cover

Table of contents

Description
Summary: This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
ISBN: 9783319447902
9783319447896
ISSN: 1860-949X ;
Access: Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty