000 | 05331nam a22005775i 4500 | ||
---|---|---|---|
999 |
_c12285 _d12285 |
||
001 | 978-3-319-44790-2 | ||
003 | DE-He213 | ||
005 | 20211204094222.0 | ||
008 | 161018s2017 gw | s |||| 0|eng d | ||
020 | _a9783319447902 | ||
040 | _cAIKTC-KRRC | ||
041 | _aENG | ||
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aIntelligent Techniques in Signal Processing for Multimedia Security _h[electronic resource] / |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aIX, 485 p. 226 illus., 96 illus. in color. _bCard Paper |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-949X ; _v660 |
|
520 | _aThis book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems. | ||
650 | 0 |
_aEXTC Engineering _94619 |
|
653 | _aComputational Intelligence. | ||
653 | _aArtificial Intelligence. | ||
653 | _aSignal, Image and Speech Processing. | ||
653 | _aMultimedia Information Systems. | ||
700 | 1 |
_aDey, Nilanjan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSanthi, V. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319447896 |
776 | 0 | 8 |
_iPrinted edition: _z9783319447919 |
776 | 0 | 8 |
_iPrinted edition: _z9783319831374 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-949X ; _v660 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-319-44790-2 _zClick here to access eBook in Springer Nature platform. (Within Campus only.) |
942 |
_cEBOOKS _2ddc |