Skip to main content
Book cover

Intelligent Techniques in Signal Processing for Multimedia Security

  • Book
  • © 2017

Overview

  • Presents applications of intelligent techniques in signal processing for multimedia security
  • Provides solutions to real-world problems by combining computational intelligence techniques
  • Offers insights into various signal processing techniques for multimedia security
  • Includes supplementary material: sn.pub/extras

Part of the book series: Studies in Computational Intelligence (SCI, volume 660)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (21 chapters)

  1. Overview on Multimedia Data Security and Its Evaluation

  2. Personal Authentication and Recognition Systems

  3. Medical Security Applications

Keywords

About this book

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. 


As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.


This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.




Editors and Affiliations

  • Department of Information Technology, Techno India College of Technology Department of Information Technology, Kolkata, India

    Nilanjan Dey

  • School of Computing Science and Eng., VIT University School of Computing Science and Eng., Vellore, India

    V. Santhi

Bibliographic Information

Publish with us