Access Control and Security Monitoring of Multimedia Information Processing and Transmission
In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.

This book covers innovations and future perspectives in access control and security monitoring of multimedia Information processing and transmission. The authors present cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and deepfake video security monitoring.

This will be a useful reference for researchers, engineers and scientists in both academia and industry as well as lecturers and advanced students for developing efficient methods, frameworks and techniques for multimedia information processing security and privacy. It will also be of interest to multimedia platform and system developers and designers.

1144518400
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.

This book covers innovations and future perspectives in access control and security monitoring of multimedia Information processing and transmission. The authors present cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and deepfake video security monitoring.

This will be a useful reference for researchers, engineers and scientists in both academia and industry as well as lecturers and advanced students for developing efficient methods, frameworks and techniques for multimedia information processing security and privacy. It will also be of interest to multimedia platform and system developers and designers.

150.0 In Stock
Access Control and Security Monitoring of Multimedia Information Processing and Transmission

Access Control and Security Monitoring of Multimedia Information Processing and Transmission

Access Control and Security Monitoring of Multimedia Information Processing and Transmission

Access Control and Security Monitoring of Multimedia Information Processing and Transmission

Hardcover

$150.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.

This book covers innovations and future perspectives in access control and security monitoring of multimedia Information processing and transmission. The authors present cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and deepfake video security monitoring.

This will be a useful reference for researchers, engineers and scientists in both academia and industry as well as lecturers and advanced students for developing efficient methods, frameworks and techniques for multimedia information processing security and privacy. It will also be of interest to multimedia platform and system developers and designers.


Product Details

ISBN-13: 9781839536939
Publisher: The Institution of Engineering and Technology
Publication date: 01/02/2024
Series: Computing and Networks
Pages: 303
Product dimensions: 6.14(w) x 9.21(h) x (d)

About the Author

Zhihan Lyu is an associate professor at Uppsala University, Sweden, where he specializes in virtual and augmented reality, computer vision and visualization and the internet of things. He has successfully completed several projects on PC, website, smartphone and smart glasses. Zhihan has two granted patents.


Jaime Lloret is a full professor at the Polytechnic University of Valencia, Spain. He is the chair of the Integrated Management Coastal Research Institute (IGIC). He has authored 15 books and has more than 800 research papers published in national and international conferences, international journals. Since 2016 he has been the Spanish researcher with highest h-index in TELECOMMUNICATIONS. He is included in the world's top 2% scientists according to the Stanford UniversityList since 2020.


Houbing Herbert Song is director of security and optimization for the Networked Globe Laboratory (SONG Lab, http://songlab.us/) and a professor in the Department of Information Systems at the University of Maryland, Baltimore County, USA. His research interests include cyber-physical systems, internet of things, cybersecurity and privacy, AI and machine learning, big data analytics, edge computing, unmanned aircraft systems, connected vehicles, smart and connected health and wireless communications and networking. He is an IEEE fellow.

Table of Contents

  • Chapter 1: Introduction
  • Chapter 2: Detection of secret information in the processing of multimedia information
  • Chapter 3: Machine/Deep learning techniques for multimedia security
  • Chapter 4: Preserving multimedia information security through the use of fractal-based cryptosystems: trends and challenges
  • Chapter 5: Secure interaction and processing of multimedia data in the Internet of Things based on wearable devices
  • Chapter 6: Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in IoT
  • Chapter 7: Trustworthy grant-free random access in an shared untrusted network: dilemma, solution, and evaluation
  • Chapter 8: Image compression-encryption scheme using SPIHT and 2D-BCM
  • Chapter 9: Security of an image utilizing modified use of DWT and SVD along with multiple watermarking
  • Chapter 10: Privacy-preserving identification for monitoring images
  • Chapter 11: Analysis phases in multimedia data forensics for source identification, deleted data reconstruction, and perpetrator identification
  • Chapter 12: Violence detection in videos: a review on hand-crafted and deep-learning techniques
  • Chapter 13: Enhancing medical image security: a look into crypto-watermarking method via LabVIEW
  • Chapter 14: Conclusion
From the B&N Reads Blog

Customer Reviews