找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Intelligent Techniques in Signal Processing for Multimedia Security; Nilanjan Dey,V. Santhi Book 2017 Springer International Publishing Sw

[复制链接]
查看: 17844|回复: 55
发表于 2025-3-21 16:22:22 | 显示全部楼层 |阅读模式
书目名称Intelligent Techniques in Signal Processing for Multimedia Security
编辑Nilanjan Dey,V. Santhi
视频video
概述Presents applications of intelligent techniques in signal processing for multimedia security.Provides solutions to real-world problems by combining computational intelligence techniques.Offers insight
丛书名称Studies in Computational Intelligence
图书封面Titlebook: Intelligent Techniques in Signal Processing for Multimedia Security;  Nilanjan Dey,V. Santhi Book 2017 Springer International Publishing Sw
描述This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. .As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here..This book equips perception technology professionals with the latest technologies, techniques
出版日期Book 2017
关键词Computational Intelligence; Intelligent Systems; Multimedia Security; Signal Processing; Intelligent Tec
版次1
doihttps://doi.org/10.1007/978-3-319-44790-2
isbn_softcover978-3-319-83137-4
isbn_ebook978-3-319-44790-2Series ISSN 1860-949X Series E-ISSN 1860-9503
issn_series 1860-949X
copyrightSpringer International Publishing Switzerland 2017
The information of publication is updating

书目名称Intelligent Techniques in Signal Processing for Multimedia Security影响因子(影响力)




书目名称Intelligent Techniques in Signal Processing for Multimedia Security影响因子(影响力)学科排名




书目名称Intelligent Techniques in Signal Processing for Multimedia Security网络公开度




书目名称Intelligent Techniques in Signal Processing for Multimedia Security网络公开度学科排名




书目名称Intelligent Techniques in Signal Processing for Multimedia Security被引频次




书目名称Intelligent Techniques in Signal Processing for Multimedia Security被引频次学科排名




书目名称Intelligent Techniques in Signal Processing for Multimedia Security年度引用




书目名称Intelligent Techniques in Signal Processing for Multimedia Security年度引用学科排名




书目名称Intelligent Techniques in Signal Processing for Multimedia Security读者反馈




书目名称Intelligent Techniques in Signal Processing for Multimedia Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:21:24 | 显示全部楼层
发表于 2025-3-22 00:55:33 | 显示全部楼层
发表于 2025-3-22 06:21:04 | 显示全部楼层
Information Hiding: Steganographyre the data, the appearance of encrypted images and video streams makes them vulnerable to attacks. This situation can be disastrous in cases where security and privacy are of utmost importance, such as in military, medical, or covert applications. This drawback of cryptography is one of the many fa
发表于 2025-3-22 09:34:03 | 显示全部楼层
Digital Watermarking: A Potential Solution for Multimedia Authenticationation of the intellectual artifact. The combining, replication, and distribution facility of the digital media such as text, images, audio, and video easier and faster has no doubt revolutionized the world. However, the unauthorized use and maldistribution of information by online pirates is the sol
发表于 2025-3-22 13:33:36 | 显示全部楼层
发表于 2025-3-22 20:29:55 | 显示全部楼层
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decompositiog techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this
发表于 2025-3-23 00:48:35 | 显示全部楼层
发表于 2025-3-23 04:25:50 | 显示全部楼层
Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in g (OFDM) is the most reliable modulation technique which has been adopted. To reduce the redundancy, storage requirements, and communication costs and to protect our data from eavesdropping, data compression algorithms are used. With the increasing demand of secure multimedia, there is a need to dev
发表于 2025-3-23 06:22:13 | 显示全部楼层
Hand Image Biometric Based Personal Authentication Systemrong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. The proposed approach consists of many phases like acquisition of hand images of the use
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 10:46
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表