My Account Log in

1 option

Access Control and Security Monitoring of Multimedia Information Processing and Transmission.

EBSCOhost Academic eBook Collection (North America) Available online

View online
Format:
Book
Author/Creator:
Lyu, Zhihan, 1984-
Contributor:
Lloret Mauri, Jaime.
Song, Houbing Herbert.
Series:
Computing and Networks Series
Language:
English
Subjects (All):
Multimedia systems.
Digital watermarking.
Physical Description:
1 online resource (371 pages)
Edition:
1st ed.
Place of Publication:
Stevenage : Institution of Engineering & Technology, 2023.
Summary:
This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.
Contents:
Title
Copyright
Contents
About the editors
Foreword
1 Introduction
1.1 Introduction
1.2 Types of multimedia content and analysis of multimedia security technology
1.2.1 Classification of multimedia content and analysis of network attack methods
1.2.2 Overview and research of multimedia security technology
1.3 Multimedia watermark technology and multimedia security
1.3.1 Principle and application of multimedia watermarking technology
1.4 Multimedia encryption technology and multimedia security
1.4.1 Principle and application of multimedia encryption technology
1.5 Multimedia digital signature technology and multimedia authentication technology
1.5.1 Multimedia digital signature technology and multimedia security
1.5.2 Multimedia authentication technology and multimedia security
1.6 introduction
1.6.1 Preserving multimedia information security through the use of fractal-based cryptosystems
1.6.2 Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
1.6.3 Machine/deep learning techniques for multimedia security
1.6.4 Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
1.6.5 Privacy-preserving identification for monitoring images
1.6.6 Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
1.6.7 Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
1.6.8 Violence detection in videos: a review on hand-crafted and deep-learning techniques
1.6.9 Image compression-encryption scheme using SPIHT and 2D-BCM
1.6.10 Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
1.6.11 Detection of secret information in the processing of multimedia information
1.6.12 Trustworthy grant-free random access in an untrusted shared network: dilemma, solution, and evaluation Generated by AI.
Notes:
Description based on publisher supplied metadata and other sources.
Part of the metadata in this record was created by AI, based on the text of the resource.
Other Format:
Print version: Lv, Zhihan Access Control and Security Monitoring of Multimedia Information Processing and Transmission
ISBN:
9781839536946
OCLC:
1415896989

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account