000 05331nam a22005775i 4500
999 _c12285
_d12285
001 978-3-319-44790-2
003 DE-He213
005 20211204094222.0
008 161018s2017 gw | s |||| 0|eng d
020 _a9783319447902
040 _cAIKTC-KRRC
041 _aENG
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aIntelligent Techniques in Signal Processing for Multimedia Security
_h[electronic resource] /
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aIX, 485 p. 226 illus., 96 illus. in color.
_bCard Paper
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-949X ;
_v660
520 _aThis book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
650 0 _aEXTC Engineering
_94619
653 _aComputational Intelligence.
653 _aArtificial Intelligence.
653 _aSignal, Image and Speech Processing.
653 _aMultimedia Information Systems.
700 1 _aDey, Nilanjan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSanthi, V.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319447896
776 0 8 _iPrinted edition:
_z9783319447919
776 0 8 _iPrinted edition:
_z9783319831374
830 0 _aStudies in Computational Intelligence,
_x1860-949X ;
_v660
856 4 0 _uhttps://doi.org/10.1007/978-3-319-44790-2
_zClick here to access eBook in Springer Nature platform. (Within Campus only.)
942 _cEBOOKS
_2ddc