Multimedia Security Using Chaotic Maps: Principles and Methodologies

Multimedia Security Using Chaotic Maps: Principles and Methodologies PDF

Author: Khalid M. Hosny

Publisher: Springer Nature

Published: 2020-02-28

Total Pages: 271

ISBN-13: 3030387003

DOWNLOAD EBOOK →

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Multimedia Security Using Chaotic Maps: Principles and Methodologies

Multimedia Security Using Chaotic Maps: Principles and Methodologies PDF

Author: Khalid M. Hosny

Publisher:

Published: 2020

Total Pages: 0

ISBN-13: 9783030387013

DOWNLOAD EBOOK →

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Advances in Cyber Security

Advances in Cyber Security PDF

Author: Nibras Abdullah

Publisher: Springer Nature

Published: 2021-12-02

Total Pages: 611

ISBN-13: 9811680590

DOWNLOAD EBOOK →

This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.

Cybersecurity

Cybersecurity PDF

Author: Ahmed A. Abd El-Latif

Publisher: Springer Nature

Published: 2022-03-25

Total Pages: 244

ISBN-13: 3030921662

DOWNLOAD EBOOK →

This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications

Fractional-Order Design

Fractional-Order Design PDF

Author: Ahmed G. Radwan

Publisher: Academic Press

Published: 2021-10-22

Total Pages: 550

ISBN-13: 0323902049

DOWNLOAD EBOOK →

Fractional-Order Design: Devices, Circuits, and Systems introduces applications from the design perspective so that the reader can learn about, and get ready to, design these applications. The book also includes the different techniques employed to comprehensively and straightforwardly design fractional-order systems/devices. Furthermore, a lot of mathematics is available in the literature for solving the fractional-order calculus for system application. However, a small portion is employed in the design of fractional-order systems. This book introduces the mathematics that has been employed explicitly for fractional-order systems. Students and scholars who wants to quickly understand the field of fractional-order systems and contribute to its different domains and applications will find this book a welcomed resource. Presents a simple and comprehensive understanding of the field of fractional-order systems Offers practical knowledge on the design of fractional-order systems for different applications Exposes users to the possible new areas of applications of fractional-order systems

Intelligent Techniques in Signal Processing for Multimedia Security

Intelligent Techniques in Signal Processing for Multimedia Security PDF

Author: Nilanjan Dey

Publisher: Springer

Published: 2016-10-18

Total Pages: 483

ISBN-13: 3319447904

DOWNLOAD EBOOK →

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Illumination of Artificial Intelligence in Cybersecurity and Forensics

Illumination of Artificial Intelligence in Cybersecurity and Forensics PDF

Author: Sanjay Misra

Publisher: Springer Nature

Published: 2022-02-08

Total Pages: 378

ISBN-13: 3030934535

DOWNLOAD EBOOK →

This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.

Handbook of Multimedia Information Security: Techniques and Applications

Handbook of Multimedia Information Security: Techniques and Applications PDF

Author: Amit Kumar Singh

Publisher: Springer

Published: 2019-07-19

Total Pages: 808

ISBN-13: 303015887X

DOWNLOAD EBOOK →

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.