001433443 000__ 04725cam\a2200649\i\4500 001433443 001__ 1433443 001433443 003__ OCoLC 001433443 005__ 20230309003606.0 001433443 006__ m\\\\\o\\d\\\\\\\\ 001433443 007__ cr\cn\nnnunnun 001433443 008__ 210113s2021\\\\si\a\\\\ob\\\\000\0\eng\d 001433443 019__ $$a1231606794$$a1237487031$$a1241066027$$a1249944478$$a1250097064$$a1250576339$$a1253402954 001433443 020__ $$a9811587116$$q(electronic book) 001433443 020__ $$a9789811587115$$q(electronic bk.) 001433443 020__ $$a9789811587122$$q(print) 001433443 020__ $$a9811587124 001433443 020__ $$a9789811587139$$q(print) 001433443 020__ $$a9811587132 001433443 020__ $$z9811587108 001433443 020__ $$z9789811587108 001433443 0247_ $$a10.1007/978-981-15-8711-5$$2doi 001433443 035__ $$aSP(OCoLC)1230568070 001433443 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dYDXIT$$dGW5XE$$dOCLCO$$dSFB$$dEBLCP$$dOCLCF$$dDKU$$dLEATE$$dN$T$$dSNK$$dVT2$$dLIP$$dOCLCQ$$dOCLCO$$dCOM$$dOCLCQ 001433443 049__ $$aISEA 001433443 050_4 $$aQA76.575$$b.M85 2021 001433443 08204 $$a005.8/2$$223 001433443 24500 $$aMultimedia security :$$balgorithm development, analysis and applications /$$cKaiser J. Giri, Shabir Ahmad Parah, Rumaan Bashir, Khan Muhammad, editors. 001433443 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001433443 300__ $$a1 online resource (xii, 302 pages) :$$billustrations (some color) 001433443 336__ $$atext$$btxt$$2rdacontent 001433443 337__ $$acomputer$$bc$$2rdamedia 001433443 338__ $$aonline resource$$bcr$$2rdacarrier 001433443 347__ $$atext file 001433443 347__ $$bPDF 001433443 4901_ $$aAlgorithms for intelligent systems 001433443 504__ $$aIncludes bibliographical references. 001433443 5050_ $$aSecuring Medical Images via a Texture and Chaotic Key Framework -- Hybrid Local Phase Quantization and Grey Wolf Optimization based SVM for Finger Vein Recognition -- Image Encryption based on DNA Substitution and Chaotic Theory -- Impact of Computational Power on Cryptography -- Privacy Preserving Anti-Forensic Techniques -- Information Embedding using DNA Sequences for Covert Communication -- Information Hiding in Color Images utilizing Multi-bit Substitution Patterns -- Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- Survey on Reversible Watermarking Techniques for Medical Images -- Security and Privacy of e-health Data. 001433443 506__ $$aAccess limited to authorized users. 001433443 520__ $$aThis book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world, digitization offers an effective mechanism to process, preserve and transfer all types of information. The incredible progresses in computing and communication technologies augmented by economic feasibility have revolutionized the world. The availability of efficient algorithms together with inexpensive digital recording and storage peripherals have created a multimedia era bringing conveniences to people in sharing the digital data that includes images, audio and video. The ever-increasing pace, at which the multimedia and communication technology is growing, has also made it possible to combine, replicate and distribute the content faster and easier, thereby empowering mankind by having a wealth of information at their disposal. However, security of multimedia is giving tough time to the research community around the globe, due to ever-increasing and efficient attacks carried out on multimedia data by intruders, eves-droppers and hackers. Further, duplication, unauthorized use and mal-distribution of digital content have become a serious challenge as it leads to copyright violation and is considered to be the principal reason that refrains the information providers in freely sharing their proprietary digital content. The book is useful for students, researchers and professionals to advance their study. 001433443 588__ $$aOnline resource; title from digital title page (viewed on March 01, 2021). 001433443 650_0 $$aMultimedia systems$$xSecurity measures. 001433443 650_0 $$aComputer security. 001433443 650_6 $$aMultimédia$$xSécurité$$xMesures. 001433443 650_6 $$aSécurité informatique. 001433443 655_0 $$aElectronic books. 001433443 7001_ $$aGiri, Kaiser J.,$$eeditor. 001433443 7001_ $$aParah, Shabir Ahmad,$$eeditor. 001433443 7001_ $$aBashir, Rumaan,$$eeditor. 001433443 7001_ $$aMuhammad, Khan,$$eeditor. 001433443 77608 $$iPrint version:$$z9811587108$$z9789811587108$$w(OCoLC)1191241398 001433443 830_0 $$aAlgorithms for intelligent systems. 001433443 852__ $$bebk 001433443 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-15-8711-5$$zOnline Access$$91397441.1 001433443 909CO $$ooai:library.usi.edu:1433443$$pGLOBAL_SET 001433443 980__ $$aBIB 001433443 980__ $$aEBOOK 001433443 982__ $$aEbook 001433443 983__ $$aOnline 001433443 994__ $$a92$$bISE