• Complain

Kaiser J. Giri (editor) - Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)

Here you can read online Kaiser J. Giri (editor) - Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kaiser J. Giri (editor) Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)

Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study.

Kaiser J. Giri (editor): author's other books


Who wrote Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Multimedia Security Algorithms for Intelligent Systems Series - photo 1
Book cover of Multimedia Security
Algorithms for Intelligent Systems
Series Editors
Jagdish Chand Bansal
Department of Mathematics, South Asian University, New Delhi, Delhi, India
Kusum Deep
Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee, Uttarakhand, India
Atulya K. Nagar
School of Mathematics, Computer Science and Engineering, Liverpool Hope University, Liverpool, UK

This book series publishes research on the analysis and development of algorithms for intelligent systems with their applications to various real world problems. It covers research related to autonomous agents, multi-agent systems, behavioral modeling, reinforcement learning, game theory, mechanism design, machine learning, meta-heuristic search, optimization, planning and scheduling, artificial neural networks, evolutionary computation, swarm intelligence and other algorithms for intelligent systems.

The book series includes recent advancements, modification and applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi agent systems, machine learning and other intelligent systems related areas. The material will be beneficial for the graduate students, post-graduate students as well as the researchers who want a broader view of advances in algorithms for intelligent systems. The contents will also be useful to the researchers from other fields who have no knowledge of the power of intelligent systems, e.g. the researchers in the field of bioinformatics, biochemists, mechanical and chemical engineers, economists, musicians and medical practitioners.

The series publishes monographs, edited volumes, advanced textbooks and selected proceedings.

More information about this series at http://www.springer.com/series/16171

Editors
Kaiser J. Giri , Shabir Ahmad Parah , Rumaan Bashir and Khan Muhammad
Multimedia Security
Algorithm Development, Analysis and Applications
1st ed. 2021
Logo of the publisher Editors Kaiser J Giri Department of Computer - photo 2
Logo of the publisher
Editors
Kaiser J. Giri
Department of Computer Science, Islamic University of Science and Technology, Pulwama, Jammu and Kashmir, India
Shabir Ahmad Parah
Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, Jammu and Kashmir, India
Rumaan Bashir
Department of Computer Science, Islamic University of Science and Technology, Pulwama, Jammu and Kashmir, India
Khan Muhammad
Department of Software, Sejong University, Seoul, Republic of Korea
ISSN 2524-7565 e-ISSN 2524-7573
Algorithms for Intelligent Systems
ISBN 978-981-15-8710-8 e-ISBN 978-981-15-8711-5
https://doi.org/10.1007/978-981-15-8711-5
Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.

The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Preface

The contemporary multimedia communication has converted the world into a global village. The digitization of sensitive multimedia, its storage and transmission over the Internet has increased massively. There is an exponential increase in the use of the Internet for applications in healthcare, commercial, government, and industrial sectors because of improved networked technology and computing power. The advantages of a completely digital system include ease of data management, cost reduction, high speed, and reliability among many others. However, there is a possibility of encountering numerous threats like phishing attacks, malware, ransomware, unauthorized access, and tampering of the digital content. Therefore, it is of utmost importance that digital information is secured and objectives of confidentiality, integrity, availability, authentication, and non-repudiation are fulfilled. One of the most important challenges is to develop algorithms that can protect sensitive data. Sensitive multimedia can include text files, audios, images, and videos. However, images form a large percentage of the transmitted and stored content and therefore need to be secured completely. This book shall serve as a comprehensive reference to multimedia security and copyright protection, and it deliberates on various enabling technologies in the field. It provides a good account of multimedia security, quality metrics that govern security, and algorithm development for multimedia secure transmission.

Multimedia security technologies broadly include cryptography and information hiding. Cryptography transforms data into an observable meaningless form and includes variants like symmetric-key- and asymmetric-key-based algorithms and more recently have included techniques like chaos-based encryption and DNA encryption. The security of the cryptosystem lies in the secrecy of the key and as such requires proper key management techniques. Information hiding methods on the other hand hide the complete existence and possibility of a secret into a cover media and can be divided into major domains like steganography, watermarking, multimedia mining, and digital forensics. Steganography deals with the optimization of algorithms for embedding secret data into cover images such that embedding capacity is increased without affecting the detectability, whereas digital watermarking is concerned with embedding a small number of bits into a document such that it is protected from forgery. The watermark can be robust, fragile, visible, or concealed and is mainly embedded for copyright protection of the data.

This book provides an in-depth explanation of several robust security algorithms aiming to provide confidentiality and authenticity to digital multimedia content. It attempts to include novel research works about several aspects of multimedia security which are generally not much investigated. The book is mainly divided into three main parts. Part I: Security Using Cryptography and Chaotic Theory: Algorithm Development and Analysis

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)»

Look at similar books to Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)»

Discussion, reviews of the book Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.