Installieren Sie die genialokal App auf Ihrem Startbildschirm für einen schnellen Zugriff und eine komfortable Nutzung.
Tippen Sie einfach auf Teilen:
Und dann auf "Zum Home-Bildschirm [+]".
Bei genialokal.de kaufen Sie online bei Ihrer lokalen, inhabergeführten Buchhandlung!
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative. This book provides comprehensive research on multimedia information security and bridges the gap between theoretical bases and practical applications. Authored by leading experts in the area, the book focusses on cryptography, watermarking, steganography and its advanced security solution while keeping a clear and engaging description and sets this book apart in its capability to make complex concepts accessible and practical, making it an incalculable resource for beginners and seasoned professionals alike. Key Features: - Detailed study of encryption techniques, including encryption and decryption methods adapted to multimedia data - A comprehensive discussion of techniques for embedding and detecting hidden information in digital media - A survey of the latest advances in multimedia security, including quantum cryptography and blockchain applications - Real-world case studies and illustrations that demonstrate the application of multimedia information security techniques in various initiatives - Contributions from computer science and information technology experts offer a comprehensive perspective on multimedia security This book is an invaluable help for cybersecurity professionals, IT professionals, and computer and information technology students. Securing the Digital World equips readers with the information and tools required to safeguard multimedia content in a cyber-spatiality full of security challenges.
Dr Subhrajyoti Deb is an Assistant Professor in the Department of CSE at the ICFAI University Tripura, India. Before joining ICFAI University, he was a postdoctoral visiting scientist in the applied statistics unit at ISI Kolkata, India. He received his M.Tech and Ph.D. degrees in Engineering from the NIT Agartala and NEHU Shillong, respectively. Dr. Deb is a member of IEEE and CRSI. His research interests include Cryptography, Information security, Data Hiding Steganography, and IoT. Dr. Deb has one patent filed and has published 30 publications in refereed journals, book chapters, and conference proceedings. He serves as the organizing chair for MICA 2023. He has participated in international conferences as an Organizer and Session Chair. He is an editorial board member and a reviewer of SCI-indexed journals. He received his M.Tech and Ph.D. degrees from the NIT Agartala and NEHU Shillong, respectively. Dr. Deb has previously served as a co-editor for the Special Issue on Recent Advances in IoT and Its Applications in the IEEE MMTC Communication Frontier. Dr Aditya Kumar Sahu is an associate professor at Amrita School of Computing, Amaravati. Andhra Pradesh, India. Dr. Sahu has been listed in the top 2% cited researchers list two times. He has over 17 years of teaching and research experience. He is working in the research areas of Multimedia Forensics, Digital Image Watermarking, Image Tamper Detection and Localization, Image Steganography, Reversible Data Hiding, and Convolution Neural Network based Data hiding. He completed his Ph.D. degree in Digital Image Steganography and Steganalysis. He is a member of several editorial boards and associate editor in reputed journals.
About the Editors. List of Contributors. 1. Multimedia Tamper Detection and Localization using Digital Watermarking. 2. Implementation and Analysis of Digital Watermarking Techniques for Multimedia Authentication. 3. Digital Image Robust Information Hiding Approach. 4. Safeguarding Multimedia in the Quantum Age. 5. Secured Textual Medical Information using a Modified LSB Image Steganography Technique. 6. Multimedia Security: Basics, its subfields and Allied Areas. 7. A Comprehensive Review on Multimedia Security through Blockchain. 8. Cyber Security-based Artificial Intelligence Healthcare Management System. 9. A taxonomical review on cloud security and its solutions. Index.
Dieses eBook wird im PDF-Format geliefert und ist mit einem Adobe Kopierschutz (DRM) versehen. Sie können dieses eBook mit allen Geräten lesen, die das PDF-Format und den Adobe Kopierschutz (DRM) unterstützen.
Zum Beispiel mit den folgenden Geräten:
• tolino Reader
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions.
• Sony Reader & andere eBook Reader
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte mit epub- und Adobe DRM-Unterstützung.
• Tablets & Smartphones
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets.
• PC & Mac
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ - „online lesen“.
Schalten Sie das eBook mit Ihrer persönlichen Adobe ID auf bis zu sechs Geräten gleichzeitig frei.
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.