Multimedia Security
Tools, Techniques, and Applications

Edited by Shyam Singh Rajput,Bhaskar Mondal

ISBN13: 9781774915028

Imprint: Apple Academic Press Inc.

Publisher: Apple Academic Press Inc.

Format: Hardback

Published: 07/07/2025

Availability: Not yet available

Description
Multimedia security has become one of the most important topics for organizations and individuals. A huge amount of multimedia data, such as images, audio, and videos, are generated every day, and they are transmitted over the Internet. Any user with ill intentions may intercept those data and misuse, tamper, or modify them for personal gain and cause severe damage to the victim. This new book presents important state-of-the art multimedia security techniques and algorithms. This book focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. This book also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security. Written for those in the computer and information science disciplines, Multimedia Security: Tools, Techniques, and Applications provides a better understanding of the basics of multimedia processing and the tools and techniques available to protect multimedia content from unauthorized access and modification.
1. Understanding Multimedia Security 2. Evaluation Metrics Used for Image Encryption to Analyze the Efficiency Towards Various Attacks 3. Machine Learning Approaches to Malware Detection Systems 4. Securing Identities Through Biometric Template Security 5. Watermarking and Copyright Protection of Remotely Sensed Images 6. A Future Cybersecurity for Secured Smart Home Applications Using the Internet of Things and Blockchain Technology 7. A Secure and Efficient Quantum Adopted Chaotic Cryptosystem for Video Surveillance Applications 8. Evaluation of Pansharpening Techniques for Multimedia Image Enhancement 9. Spam Remark Revelation Utilizing Supervised Machine Learning Approaches in Security Issues 10. Secure Chaos-Based Image Encryption Techniques Based on a Feedback Convolution Method
  • Computer security
  • Internet guides & online services
  • Professional & Vocational
  • Tertiary Education (US: College)
Height:
Width:
Spine:
Weight:453.00
List Price: £140.00