Access Control and Security Monitoring of Multimedia Information Processing and Transmission
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
Lloret, Jaime; Song, Houbing Herbert; Lyu, Zhihan
Institution of Engineering and Technology
01/2024
303
Dura
Inglês
9781839536939
15 a 20 dias
Descrição não disponível.
Chapter 1: Introduction
Chapter 2: Detection of secret information in the processing of multimedia information
Chapter 3: Machine/Deep learning techniques for multimedia security
Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
Chapter 10: Privacy-preserving identification for monitoring images
Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
Chapter 14: Conclusion
Chapter 2: Detection of secret information in the processing of multimedia information
Chapter 3: Machine/Deep learning techniques for multimedia security
Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
Chapter 10: Privacy-preserving identification for monitoring images
Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
Chapter 14: Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Internet of Things; image coding; computer network security; data protection; cryptography
Chapter 1: Introduction
Chapter 2: Detection of secret information in the processing of multimedia information
Chapter 3: Machine/Deep learning techniques for multimedia security
Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
Chapter 10: Privacy-preserving identification for monitoring images
Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
Chapter 14: Conclusion
Chapter 2: Detection of secret information in the processing of multimedia information
Chapter 3: Machine/Deep learning techniques for multimedia security
Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
Chapter 10: Privacy-preserving identification for monitoring images
Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
Chapter 14: Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.