소장자료

>>
소장자료
>
000 cam i
001 2210080898394
003 OCoLC
005 20210225115139
006 m d
007 cr |||||||||||
008 190927s2020 paua ob 001 0 eng
010 a 2019043844
019 a1151197028a1151199489
020 a9781799827023qelectronic book
020 a179982702Xqelectronic book
020 a1799827038q(electronic bk.)
020 a9781799827030q(electronic bk.)
020 z9781799827016qhardcover
035 a2437482b(NT)
035 a(OCoLC)1122689273z(OCoLC)1151197028z(OCoLC)1151199489
040 aDLCbengerdacDLCdOCLCOdOCLCFdYDXdIGIGLdOCLCQdUKAHLdEBLCPdNd221008
042 apcc
050 aTK5105.15b.H3585 2020
082 a006.7223
245 00 aHandbook of research on multimedia cyber security /cBrij B. Gupta, Deepak Gupta (editors).
260 aHershey PA :bInformation Science Reference, an imprint of IGI Global,c[2020]
300 a1 online resource (xxiii, 372 pages).
336 atextbtxt2rdacontent
337 acomputerbn2rdamedia
338 aonline resourcebnc2rdacarrier
490 aAdvances in information security, privacy, and ethics (AISPE) book series
504 aIncludes bibliographical references and index.
505 aChapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security.
520 a"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--cProvided by publisher.
588 aDescription based on online resource; title from digital title page (viewed on April 17, 2020).
590 aAdded to collection customer.56279.3
650 aMultimedia communicationsxSecurity measures.
650 aBiometric identification.
650 aDatabase security.
650 aBiometric identification.2fast0(OCoLC)fst00832607
650 aDatabase security.2fast0(OCoLC)fst00888063
655 aElectronic books.
700 aGupta, Brij,d1982-eeditor.
700 aGupta, Deepak,d1983-eeditor.
776 iPrint version:tHandbook of research on multimedia cyber securitydHershey PA : Information Science Reference, [2020]z9781799827016w(DLC) 2019043843
830 aAdvances in information security, privacy, and ethics (AISPE) book series.
856 3EBSCOhostuhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2437482
938 aAskews and Holts Library ServicesbASKHnAH37628849
938 aIGI GlobalbIGIGn00237827
938 aYBP Library ServicesbYANKn16736144
938 aProQuest Ebook CentralbEBLBnEBL6175302
938 aEBSCOhostbEBSCn2437482
994 a92bN
Handbook of research on multimedia cyber security /Brij B. Gupta, Deepak Gupta (editors)
종류
전자책
서명
Handbook of research on multimedia cyber security /Brij B. Gupta, Deepak Gupta (editors)
저자명
형태사항
1 online resource (xxiii, 372 pages)
주기사항
Includes bibliographical references and index. / "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"
내용주기
Chapter 1. A review on the technological and literary background of multimedia compression / Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices / Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud / Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks / Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking / Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication / Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark / Chapter 8. The fundamentals of digital forensics / Chapter 9. Comparative evaluations of human behavior recognition using deep learning / Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments / Chapter 11. Gait recognition using deep learning / Chapter 12. USRP-based secure data transmission / Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches / Chapter 14. Design and implementation of visual blockchain with Merkle tree / Chapter 15. Multiple flames recognition using deep learning / Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods / Chapter 17. The cost perspective of password security.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기