Handbook of research on multimedia cyber security:
"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799827023 |
DOI: | 10.4018/978-1-7998-2701-6 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046691164 | ||
003 | DE-604 | ||
005 | 20211109 | ||
007 | cr|uuu---uuuuu | ||
008 | 200423s2020 xx o|||| 00||| eng d | ||
020 | |a 9781799827023 |9 978-1-7998-2702-3 | ||
035 | |a (OCoLC)1152268060 | ||
035 | |a (DE-599)BVBBV046691164 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Handbook of research on multimedia cyber security |c Brij B. Gupta, Deepak Gupta |
246 | 1 | 3 | |a Multimedia cyber security |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security | |
520 | |a "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- | ||
650 | 4 | |a Multimedia communications / Security measures | |
650 | 4 | |a Biometric identification | |
650 | 4 | |a Database security | |
650 | 7 | |a Biometric identification |2 fast | |
650 | 7 | |a Database security |2 fast | |
700 | 1 | |a Gupta, Brij |d 1982- |0 (DE-588)1103817469 |4 edt | |
700 | 1 | |a Gupta, Deepak |0 (DE-588)1204268657 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-2701-6 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-2701-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032101919 | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2701-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2701-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2701-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2701-6 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1822792240755376128 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Gupta, Brij 1982- Gupta, Deepak |
author2_role | edt edt |
author2_variant | b g bg d g dg |
author_GND | (DE-588)1103817469 (DE-588)1204268657 |
author_facet | Gupta, Brij 1982- Gupta, Deepak |
building | Verbundindex |
bvnumber | BV046691164 |
collection | ZDB-98-IGB |
contents | Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security |
ctrlnum | (OCoLC)1152268060 (DE-599)BVBBV046691164 |
doi_str_mv | 10.4018/978-1-7998-2701-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV046691164</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211109</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200423s2020 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799827023</subfield><subfield code="9">978-1-7998-2702-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1152268060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046691164</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on multimedia cyber security</subfield><subfield code="c">Brij B. Gupta, Deepak Gupta</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Multimedia cyber security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia communications / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biometric identification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1103817469</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Deepak</subfield><subfield code="0">(DE-588)1204268657</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-2701-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-2701-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032101919</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2701-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2701-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2701-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2701-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046691164 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:25:09Z |
indexdate | 2025-01-31T19:02:23Z |
institution | BVB |
isbn | 9781799827023 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032101919 |
oclc_num | 1152268060 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Handbook of research on multimedia cyber security Brij B. Gupta, Deepak Gupta Multimedia cyber security Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- Multimedia communications / Security measures Biometric identification Database security Biometric identification fast Database security fast Gupta, Brij 1982- (DE-588)1103817469 edt Gupta, Deepak (DE-588)1204268657 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-2701-6 https://doi.org/10.4018/978-1-7998-2701-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of research on multimedia cyber security Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security Multimedia communications / Security measures Biometric identification Database security Biometric identification fast Database security fast |
title | Handbook of research on multimedia cyber security |
title_alt | Multimedia cyber security |
title_auth | Handbook of research on multimedia cyber security |
title_exact_search | Handbook of research on multimedia cyber security |
title_exact_search_txtP | Handbook of research on multimedia cyber security |
title_full | Handbook of research on multimedia cyber security Brij B. Gupta, Deepak Gupta |
title_fullStr | Handbook of research on multimedia cyber security Brij B. Gupta, Deepak Gupta |
title_full_unstemmed | Handbook of research on multimedia cyber security Brij B. Gupta, Deepak Gupta |
title_short | Handbook of research on multimedia cyber security |
title_sort | handbook of research on multimedia cyber security |
topic | Multimedia communications / Security measures Biometric identification Database security Biometric identification fast Database security fast |
topic_facet | Multimedia communications / Security measures Biometric identification Database security |
url | https://doi.org/10.4018/978-1-7998-2701-6 |
work_keys_str_mv | AT guptabrij handbookofresearchonmultimediacybersecurity AT guptadeepak handbookofresearchonmultimediacybersecurity AT guptabrij multimediacybersecurity AT guptadeepak multimediacybersecurity |