Skip to main content
  • Book
  • © 2017

Intelligent Techniques in Signal Processing for Multimedia Security

  • Presents applications of intelligent techniques in signal processing for multimedia security
  • Provides solutions to real-world problems by combining computational intelligence techniques
  • Offers insights into various signal processing techniques for multimedia security
  • Includes supplementary material: sn.pub/extras

Part of the book series: Studies in Computational Intelligence (SCI, volume 660)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 chapters)

  1. Front Matter

    Pages i-ix
  2. Overview on Multimedia Data Security and Its Evaluation

    1. Front Matter

      Pages 1-1
    2. Security of Multimedia Contents: A Brief

      • Amira S. Ashour, Nilanjan Dey
      Pages 3-14
    3. A Survey on Intelligent Security Techniques for High-Definition Multimedia Data

      • S. D. Desai, N. R. Pudakalakatti, V. P. Baligar
      Pages 15-45
    4. Information Hiding: Steganography

      • V. Thanikaiselvan, Shounak Shastri, Shaik Ahmad
      Pages 65-91
    5. Real-time Implementation of Reversible Watermarking

      • H. R. Lakshmi, B. Surekha, S. Viswanadha Raju
      Pages 113-132
    6. Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking

      • Sayan Chakraborty, Souvik Chatterjee, Nilanjan Dey, Amira S. Ashour, Aboul Ella Hassanien
      Pages 133-149
    7. Biometric-Based Security System: Issues and Challenges

      • Ujwalla Gawande, Yogesh Golhar, Kamal Hajari
      Pages 151-176
  3. Personal Authentication and Recognition Systems

    1. Front Matter

      Pages 199-199
    2. A Study on Security and Surveillance System Using Gait Recognition

      • M. Sivarathinabala, S. Abirami, R. Baskaran
      Pages 227-252
    3. Face Recognition Under Dry and Wet Face Conditions

      • K. Dharavath, F. A. Talukdar, R. H. Laskar, N. Dey
      Pages 253-271
    4. Improved Approach for 3D Face Characterization

      • S. Sghaier, C. Souani, H. Faeidh, K. Besbes
      Pages 273-291
    5. Attendance Recording System Using Partial Face Recognition Algorithm

      • Borra Surekha, Kanchan Jayant Nazare, S. Viswanadha Raju, Nilanjan Dey
      Pages 293-319
    6. Automatic Human Emotion Recognition in Surveillance Video

      • J. Arunnehru, M. Kalaiselvi Geetha
      Pages 321-342
  4. Medical Security Applications

    1. Front Matter

      Pages 343-343
    2. Watermarking in Biomedical Signal Processing

      • Nilanjan Dey, Amira S. Ashour, Sayan Chakraborty, Sukanya Banerjee, Evgeniya Gospodinova, Mitko Gospodinov et al.
      Pages 345-369

About this book

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. 


As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.


This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.




Editors and Affiliations

  • Department of Information Technology, Techno India College of Technology Department of Information Technology, Kolkata, India

    Nilanjan Dey

  • School of Computing Science and Eng., VIT University School of Computing Science and Eng., Vellore, India

    V. Santhi

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access