Handbook of research on multimedia cyber security:
"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- |
Beschreibung: | 27 PDFs (372 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799827023 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00237827 | ||
003 | IGIG | ||
005 | 20200414103131.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200415s2020 pau fob 001 0 eng d | ||
010 | |z 2019043844 | ||
020 | |a 9781799827023 |q ebook | ||
020 | |z 179982702X | ||
020 | |z 9781799827016 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-2701-6 |2 doi | |
035 | |a (CaBNVSL)slc00000417 | ||
035 | |a (OCoLC)1122689273 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.15 |b .H36 2020e | |
082 | 7 | |a 006.7 |2 23 | |
245 | 0 | 0 | |a Handbook of research on multimedia cyber security |c Brij B. Gupta and Deepak Gupta, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 27 PDFs (372 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/15/2020). | ||
650 | 0 | |a Biometric identification. | |
650 | 0 | |a Database security. | |
650 | 0 | |a Multimedia communications |x Security measures. | |
650 | 7 | |a Biometric identification. |2 fast | |
650 | 7 | |a Database security. |2 fast | |
700 | 1 | |a Gupta, Brij |d 1982- |e editor. | |
700 | 1 | |a Gupta, Deepak |d 1983- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019043844 | |
776 | 0 | 8 | |i Print version: |z 1799827011 |z 9781799827016 |w (DLC) 2019043844 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2701-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00237827 |
---|---|
_version_ | 1816797083279032320 |
adam_text | |
any_adam_object | |
author2 | Gupta, Brij 1982- Gupta, Deepak 1983- |
author2_role | edt edt |
author2_variant | b g bg d g dg |
author_facet | Gupta, Brij 1982- Gupta, Deepak 1983- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.15 .H36 2020e |
callnumber-search | TK5105.15 .H36 2020e |
callnumber-sort | TK 45105.15 H36 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security. |
ctrlnum | (CaBNVSL)slc00000417 (OCoLC)1122689273 |
dewey-full | 006.7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.7 |
dewey-search | 006.7 |
dewey-sort | 16.7 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03713nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00237827</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200414103131.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200415s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019043844</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799827023</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">179982702X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799827016</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2701-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000417</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1122689273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.15</subfield><subfield code="b">.H36 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.7</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on multimedia cyber security </subfield><subfield code="c">Brij B. Gupta and Deepak Gupta, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">27 PDFs (372 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/15/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Multimedia communications</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biometric identification.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Deepak</subfield><subfield code="d">1983-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019043844</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799827011</subfield><subfield code="z">9781799827016</subfield><subfield code="w">(DLC) 2019043844</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2701-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00237827 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:56Z |
institution | BVB |
isbn | 9781799827023 |
language | English |
oclc_num | 1122689273 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 27 PDFs (372 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on multimedia cyber security Brij B. Gupta and Deepak Gupta, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 27 PDFs (372 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security. Restricted to subscribers or individual electronic text purchasers. "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/15/2020). Biometric identification. Database security. Multimedia communications Security measures. Biometric identification. fast Database security. fast Gupta, Brij 1982- editor. Gupta, Deepak 1983- editor. IGI Global, publisher. (Original) (DLC)2019043844 Print version: 1799827011 9781799827016 (DLC) 2019043844 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2701-6 Volltext |
spellingShingle | Handbook of research on multimedia cyber security Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security. Biometric identification. Database security. Multimedia communications Security measures. Biometric identification. fast Database security. fast |
title | Handbook of research on multimedia cyber security |
title_auth | Handbook of research on multimedia cyber security |
title_exact_search | Handbook of research on multimedia cyber security |
title_full | Handbook of research on multimedia cyber security Brij B. Gupta and Deepak Gupta, editors. |
title_fullStr | Handbook of research on multimedia cyber security Brij B. Gupta and Deepak Gupta, editors. |
title_full_unstemmed | Handbook of research on multimedia cyber security Brij B. Gupta and Deepak Gupta, editors. |
title_short | Handbook of research on multimedia cyber security |
title_sort | handbook of research on multimedia cyber security |
topic | Biometric identification. Database security. Multimedia communications Security measures. Biometric identification. fast Database security. fast |
topic_facet | Biometric identification. Database security. Multimedia communications Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2701-6 |
work_keys_str_mv | AT guptabrij handbookofresearchonmultimediacybersecurity AT guptadeepak handbookofresearchonmultimediacybersecurity AT igiglobal handbookofresearchonmultimediacybersecurity |