LitMy.ru - литература в один клик

Multimedia Security: Tools, Techniques, and Applications

  • Добавил: literator
  • Дата: Вчера, 03:31
  • Комментариев: 0
Название: Multimedia Security: Tools, Techniques, and Applications
Автор: Bhaskar Mondal, Shyam Singh Rajput
Издательство: Apple Academic Press/CRC Press
Год: 2025
Страниц: 370
Язык: английский
Формат: epub (true)
Размер: 24.2 MB

Multimedia security has become one of the most important topics for organizations and individuals. Presenting important state-of-the art multimedia security techniques and algorithms, this book focuses on data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pan sharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. It also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security.

Multimedia security has become one of the most important topics for organizations and individuals. A huge amount of multimedia data like images, audio, and videos are generated every day, and they are transmitted over the Internet. Any user with ill-intent may intercept these data and misuse, tamper, or modify them for personal gain and cause severe damage to the victim. This book on security is thus extremely relevant to the present times. This book presents state-of-the-art multimedia security techniques and algorithms along with the recent advancements in the field. This book consists of 10 chapters, which are organized as follows:

Chapter 1 provides a detailed explanation of the overall aspect of multimedia security which includes the definition of multimedia security, the types of multimedia security, data hiding, data encryption, and analysis and evaluation of the data. Moreover, certain mathematical models used in data hiding and data evaluation techniques have been stated and discussed thoroughly to develop a good understanding of the principles of multimedia security.

Chapter 2 presents a detailed study of evaluation metrics used for image encryption to analyze the efficiency of various attacks. The pixel values of the encrypted image are altered through the use of an encryption algorithm, resulting in a randomized outcome that conceals any patterns or features. A good encryption algorithm ensures that the correlation coefficient between adjacent pixel values in the encrypted image is close to zero. Visual examination is the primary method of assessing the encrypted image, with the objective of ensuring that the features of the plain image are not visible. However, visual examination alone is not sufficient for evaluating security efficiency, and therefore additional metrics are employed to measure the randomness and effectiveness of the encryption.

Chapter 3 demonstrates an AI-based malware analysis using freely available open-source intelligence tools (OSINTs). Analysis shows that malware detection in stego images is indeed challenging due to its hidden behavior and malicious scripts.

Chapter 4 provides a detailed discussion of all aspects of biometric template security. Biometric cryptosystems are designed to enhance the security of original biometric templates by combining them with cryptographic keys or generating keys directly from the templates. This ensures that the original biometric data remains secure. There are some essential properties, such as revocability, diversity, security, and performance, which need to be followed to determine the overall effectiveness of a biometric template protection (BTP) technique.

Скачать Multimedia Security: Tools, Techniques, and Applications












[related-news] [/related-news]
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.