001453448 000__ 06429cam\a2200577\a\4500 001453448 001__ 1453448 001453448 003__ OCoLC 001453448 005__ 20230314003351.0 001453448 006__ m\\\\\o\\d\\\\\\\\ 001453448 007__ cr\un\nnnunnun 001453448 008__ 221203s2023\\\\sz\\\\\\o\\\\\100\0\eng\d 001453448 019__ $$a1352415899 001453448 020__ $$a9783031054914$$q(electronic bk.) 001453448 020__ $$a3031054911$$q(electronic bk.) 001453448 020__ $$z9783031054907 001453448 020__ $$z3031054903 001453448 0247_ $$a10.1007/978-3-031-05491-4$$2doi 001453448 035__ $$aSP(OCoLC)1352973670 001453448 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dYDX$$dOCLCF 001453448 049__ $$aISEA 001453448 050_4 $$aQ334 001453448 08204 $$a006.3$$223/eng/20221212 001453448 1112_ $$aInternational Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications$$n(1st :$$d2021 :$$cTaichung, Taiwan) 001453448 24510 $$a2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications /$$cGeorge A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin, editors. 001453448 260__ $$aCham :$$bSpringer,$$c2023. 001453448 300__ $$a1 online resource (406 p.). 001453448 4901_ $$aSmart Innovation, Systems and Technologies ;$$vv.314 001453448 500__ $$a3.3 Discussion and Comparison 001453448 504__ $$aReferences -- Network and System Security (I) -- A Prototype Design on Privacy-Preserving Outsourced Bayesian Network -- 1 Introduction -- 2 Preliminaries -- 3 System Model -- 4 Construction -- 4.1 Building Blocks -- 4.2 Round Trick -- 4.3 Main Protocol -- 5 Analysis and Discussions -- 6 Conclusions -- References -- The Security Challenge of Consumers' Mobile Payment -- 1 Introduction -- 2 Consumers' Mobile Payment Use Intention -- 3 Consumers' Mobile Payment Security -- 4 Research Methodology -- 4.1 Sample and Data Sources -- 4.2 Variables and Measures -- 4.3 Reliability Analysis 001453448 5050_ $$aIntro -- Organization -- Preface -- Contents -- About the Editors -- Multimedia -- Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- 1 Introduction -- 2 Related Works -- 2.1 Secret Embedding Procedure -- 2.2 Message Extracting and Image Recovery -- 3 The Proposed Method -- 3.1 Image Encryption and Secret Embedding -- 3.2 Message Extracting and Image Recovery -- 4 Experimental Result -- 5 Conclusion -- References -- Comments on the Visual Binary QR Code -- 1 Introduction -- 2 Schemes of Visual Binary QR Code -- 2.1 Unitag -- 2.2 QArt -- 2.3 Halftone QR Code -- 3 Comparisons 001453448 5058_ $$a4 Conclusions -- References -- NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Hardware Architecture -- 3.2 Software Architecture -- 4 Experiments & Results -- 4.1 Application Components & Input Dataset -- 4.2 Accommodations for Lag -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Efficient Steganographic Method Based on Modulo Cube -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Preliminary Phase -- 3.2 Embedding Phase -- 3.3 Extraction phase 001453448 5058_ $$a4 Experimental Results -- 5 Conclusions -- References -- A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding -- 1 Introduction -- 2 Proposed Method -- 2.1 Apply the Huffman Tree Building Algorithm -- 2.2 Reduce Reference Bytes -- 2.3 Remove the Redundant Length Column -- 3 Experimental Results -- 3.1 Commonly Used Test Images -- 4 Conclusion -- References -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- 1 Introduction -- 2 Qiu et al. Scheme -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusions 001453448 5058_ $$a4.4 Validity Analysis -- 5 Results -- 5.1 The Structural Equation Modeling (SEM) Results for Mobile Payment Security-Mobile Payment Use Intention -- 5.2 The Impact of Consumers' Mobile Payment Security on Consumers' Mobile Payment Use Intention -- 6 Conclusions -- References -- Research on the Analysis of Key Attack Modes in a Wireless Environment -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 Method Architecture -- 2.2 Test Flow Chart -- 2.3 Introduction to WPA2 Four-Way Handshakes Process -- 3 Analysis of Key Attack Modes -- 3.1 Dictionary Cracking Mode -- 3.2 Script Cracking Mode 001453448 506__ $$aAccess limited to authorized users. 001453448 520__ $$aThis book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. 001453448 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 12, 2022). 001453448 650_0 $$aArtificial intelligence$$vCongresses. 001453448 650_0 $$aInternet of things$$vCongresses. 001453448 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001453448 655_0 $$aElectronic books. 001453448 7001_ $$aTsihrintzis, George A. 001453448 7001_ $$aWang, Shiuh-Jeng. 001453448 7001_ $$aLin, Iuon-Chang. 001453448 77608 $$iPrint version:$$aTsihrintzis, George A.$$t2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications$$dCham : Springer International Publishing AG,c2023$$z9783031054907 001453448 830_0 $$aSmart innovation, systems, and technologies ;$$v314. 001453448 852__ $$bebk 001453448 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-05491-4$$zOnline Access$$91397441.1 001453448 909CO $$ooai:library.usi.edu:1453448$$pGLOBAL_SET 001453448 980__ $$aBIB 001453448 980__ $$aEBOOK 001453448 982__ $$aEbook 001453448 983__ $$aOnline 001453448 994__ $$a92$$bISE