Skip to main content
  • Conference proceedings
  • © 2020

Security with Intelligent Computing and Big-data Services

Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018)

  • Includes the latest research findings and development activities regarding information security and intelligent computing
  • Presents the proceedings of the Second International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), held in Guilin, China, from December 14 to 16, 2018
  • Written by respected experts in the field

Conference proceedings info: SICBS 2018.

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (75 papers)

  1. Front Matter

    Pages i-xvii
  2. Blockchain Technology and Application

    1. Front Matter

      Pages 1-1
    2. Fast Adaptive Blockchain’s Consensus Algorithm via Wlan Mesh Network

      • Xin Jiang, Mingzhe Liu, Feixiang Zhao, Qin Zhou, Ruili Wang
      Pages 3-16
    3. Toward a Blockchain Based Image Network Copyright Transaction Protection Approach

      • Chengqiang Zhao, Mingzhe Liu, Yanhan Yang, Feixiang Zhao, Shijie Chen
      Pages 17-28
    4. A Blockchain-Based Scheme for Secure Sharing of X-Ray Medical Images

      • Bingqi Liu, Mingzhe Liu, Xin Jiang, Feixiang Zhao, Ruili Wang
      Pages 29-42
    5. Designing Smart-Contract Based Auctions

      • Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Michael Baronchelli
      Pages 54-64
  3. Multimedia Security

    1. Front Matter

      Pages 77-77
    2. Relations Between Secret Sharing and Secret Image Sharing

      • Xuehu Yan, Jinming Li, Yuliang Lu, Lintao Liu, Guozheng Yang, Huixian Chen
      Pages 79-93
    3. Enhanced Secret Image Sharing Using POB Number System

      • Yan-Xiao Liu, Ching-Nung Yang
      Pages 94-102
    4. Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding

      • Wen-Chung Kuo, Ren-Jun Xiao, Chun-Cheng Wang, Yu-Chih Huang
      Pages 103-115
    5. A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation

      • Lintao Liu, Yuliang Lu, Xuehu Yan, Wanmeng Ding, Qitian Xuan
      Pages 129-139
    6. CT Image Secret Sharing Based on Chaotic Map and Singular Value Decomposition

      • Feixiang Zhao, Mingzhe Liu, Xianghe Liu, Xin Jiang, Zhirong Tang
      Pages 140-155
  4. Information Processing

    1. Front Matter

      Pages 157-157
    2. Robust Speaker Recognition Using Improved GFCC and Adaptive Feature Selection

      • Xingyu Zhang, Xia Zou, Meng Sun, Penglong Wu
      Pages 159-169
    3. Outlier Detection Based on Local Density of Vector Dot Product in Data Stream

      • Zhaoyu Shou, Fengbo Zou, Hao Tian, Simin Li
      Pages 170-184
    4. Multi-level Competitive Swarm Optimizer for Large Scale Optimization

      • Li Zhang, Yu Zhu, Si Zhong, Rushi Lan, Xiaonan Luo
      Pages 185-197
    5. Experimental Comparison of Free IP Geolocation Services

      • Wei Xu, Yaodong Tao, Xin Guan
      Pages 198-208

Other Volumes

  1. Security with Intelligent Computing and Big-data Services

About this book

This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.

Editors and Affiliations

  • Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan

    Ching-Nung Yang, Sheng-Lung Peng

  • University of Canberra, Canberra, Australia

    Lakhmi C. Jain

Bibliographic Information

  • Book Title: Security with Intelligent Computing and Big-data Services

  • Book Subtitle: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018)

  • Editors: Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain

  • Series Title: Advances in Intelligent Systems and Computing

  • DOI: https://doi.org/10.1007/978-3-030-16946-6

  • Publisher: Springer Cham

  • eBook Packages: Intelligent Technologies and Robotics, Intelligent Technologies and Robotics (R0)

  • Copyright Information: Springer Nature Switzerland AG 2020

  • Softcover ISBN: 978-3-030-16945-9Published: 18 April 2019

  • eBook ISBN: 978-3-030-16946-6Published: 16 April 2019

  • Series ISSN: 2194-5357

  • Series E-ISSN: 2194-5365

  • Edition Number: 1

  • Number of Pages: XVII, 928

  • Number of Illustrations: 224 b/w illustrations, 242 illustrations in colour

  • Topics: Computational Intelligence, Artificial Intelligence

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access