Table of contents
About this book
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation.
As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.
This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
Computational Intelligence Intelligent Systems Multimedia Security Signal Processing Intelligent Techniques
Editors and affiliations
- DOI https://doi.org/10.1007/978-3-319-44790-2
- Copyright Information Springer International Publishing Switzerland 2017
- Publisher Name Springer, Cham
- eBook Packages Engineering Engineering (R0)
- Print ISBN 978-3-319-44789-6
- Online ISBN 978-3-319-44790-2
- Series Print ISSN 1860-949X
- Series Online ISSN 1860-9503
- Buy this book on publisher's site