Skip to main content

Intelligent Multimedia Analysis for Security Applications

  • Book
  • © 2010

Overview

  • Gives a thorough description of intelligent multimedia analysis techniques used for security applications
  • Covers the basic theories, architectures and algorithms of multimedia (Image, Video, Audio, Speech, etc.) analysis techniques for security applications
  • Written by experts in the field

Part of the book series: Studies in Computational Intelligence (SCI, volume 282)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (16 chapters)

Keywords

About this book

The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.

Editors and Affiliations

  • TOBB ETÜ Computer Engineering Department, Ankara, Turkey

    Husrev Taha Sencar

  • Computing, Information Systems and Mathematics, Kingston University London, Surrey, UK

    Sergio Velastin

  • Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece

    Nikolaos Nikolaidis

  • France Telecom R&D (Orange Labs) Beijing, Raycom Infotech Park C, Beijing, China

    Shiguo Lian

Bibliographic Information

  • Book Title: Intelligent Multimedia Analysis for Security Applications

  • Editors: Husrev Taha Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian

  • Series Title: Studies in Computational Intelligence

  • DOI: https://doi.org/10.1007/978-3-642-11756-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2010

  • Hardcover ISBN: 978-3-642-11754-1Published: 22 April 2010

  • Softcover ISBN: 978-3-642-26322-4Published: 28 May 2012

  • eBook ISBN: 978-3-642-11756-5Published: 03 April 2010

  • Series ISSN: 1860-949X

  • Series E-ISSN: 1860-9503

  • Edition Number: 1

  • Number of Pages: X, 404

  • Number of Illustrations: 153 b/w illustrations

  • Topics: Mathematical and Computational Engineering, Artificial Intelligence, Multimedia Information Systems

Publish with us