Advertisement

Handbook of Multimedia Information Security: Techniques and Applications

  • Amit Kumar Singh
  • Anand Mohan
Book

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Multimedia Security

    1. Front Matter
      Pages 1-1
    2. Abdul Rahaman Wahab Sait, J. Uthayakumar, K. Shankar, K. Sathesh Kumar
      Pages 3-14
    3. Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah, Mussarat Yasmin, Steven Lawrence Fernandes
      Pages 15-35
    4. Sanoj Kumar, Gaurav Bhatnagar
      Pages 37-61
    5. Amitesh Singh Rajput, Balasubramanian Raman
      Pages 63-87
    6. Satendra Pal Singh, Gaurav Bhatnagar
      Pages 89-118
    7. Nasir N. Hurrah, Shabir A. Parah, Javaid A. Sheikh
      Pages 119-141
    8. Arambam Neelima, Kh. Manglem Singh
      Pages 267-287
    9. Andino Maseleno, Marini Othman, P. Deepalakshmi, K. Shankar, M. Ilayaraja
      Pages 289-300
    10. Tehseen Mehraj, Burhan Ul Islam Khan, Rashidah F. Olanrewaju, Farhat Anwar, Ahmad Zamani Bin Jusoh
      Pages 301-322
    11. Siva Janakiraman, K. Thenmozhi, John Bosco Balaguru Rayappan, V. Moorthi Paramasivam, Rengarajan Amirtharajan
      Pages 323-340
  3. Multimedia Processing

    1. Front Matter
      Pages 357-357
    2. Sima Sahu, Harsh Vikram Singh, Basant Kumar, Amit Kumar Singh, Prabhat Kumar
      Pages 359-375
    3. Shailendra Tiwari, Kavkirat Kaur, K. V. Arya
      Pages 377-393
    4. J. J. Ranjani
      Pages 395-411
    5. Manoj Diwakar, Pardeep Kumar
      Pages 413-419
    6. Sitara Afzal, Mubashir Javed, Muazzam Maqsood, Farhan Aadil, Seungmin Rho, Irfan Mehmood
      Pages 421-429
    7. Nadeem Iqbal, Malik M. Saad Missen, Nadeem Salamat, V. B. Surya Prasath
      Pages 431-448
    8. Sima Sahu, Harsh Vikram Singh, Basant Kumar, Amit Kumar Singh, Prabhat Kumar
      Pages 449-471
    9. Shailesh Kumar, Shashwat Pathak, Basant Kumar
      Pages 513-544
  4. Multimedia Applications

  5. Back Matter
    Pages 797-808

About this book

Introduction

This handbook is organized under three major parts.  The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function.

The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing.

The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications.

This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

Keywords

Multimedia Security Watermarking Encryption Biometrics Soft computing Big-data transmission cloud computing Block chain IoT healthcare Chaos quantum image alzheimer enhancement de-noising compression ECG neural networks

Editors and affiliations

  • Amit Kumar Singh
    • 1
  • Anand Mohan
    • 2
  1. 1.Department of Computer Science and EngineeringNIT PatnaPatnaIndia
  2. 2.Department of Electronics EngineeringIndian Institute of Technology, BHUVaranasiIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-15887-3
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-15886-6
  • Online ISBN 978-3-030-15887-3
  • Buy this book on publisher's site
Industry Sectors
Pharma
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering