000777548 000__ 03284cam\a2200529Ii\4500 000777548 001__ 777548 000777548 005__ 20230306142722.0 000777548 006__ m\\\\\o\\d\\\\\\\\ 000777548 007__ cr\nn\nnnunnun 000777548 008__ 161019s2017\\\\sz\\\\\\ob\\\\000\0\eng\d 000777548 019__ $$a963357802$$a974651076 000777548 020__ $$a9783319442709$$q(electronic book) 000777548 020__ $$a3319442708$$q(electronic book) 000777548 020__ $$z9783319442686 000777548 020__ $$z3319442686 000777548 0247_ $$a10.1007/978-3-319-44270-9$$2doi 000777548 035__ $$aSP(OCoLC)ocn960909446 000777548 035__ $$aSP(OCoLC)960909446$$z(OCoLC)963357802$$z(OCoLC)974651076 000777548 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dEBLCP$$dN$T$$dIDEBK$$dGW5XE$$dAZU$$dYDX$$dMERUC$$dUAB$$dUPM$$dOCLCF$$dIOG 000777548 049__ $$aISEA 000777548 050_4 $$aQA76.575 000777548 08204 $$a005.8$$223 000777548 24500 $$aMultimedia forensics and security :$$bfoundations, innovations, and applications /$$c[edited by] Aboul Ella Hassanien [and 5 others]. 000777548 264_1 $$a[Cham, Switzerland] :$$bSpringer,$$c[2017] 000777548 300__ $$a1 online resource. 000777548 336__ $$atext$$btxt$$2rdacontent 000777548 337__ $$acomputer$$bc$$2rdamedia 000777548 338__ $$aonline resource$$bcr$$2rdacarrier 000777548 347__ $$atext file$$bPDF$$2rda 000777548 4901_ $$aIntelligent systems reference library ;$$vvolume 115 000777548 504__ $$aIncludes bibliographical references. 000777548 5050_ $$aPart 1: Forensic Analysis in Cloud Computing -- Part 2: Forensics Multimedia and Watermarking Techniques -- Part 3: Digital Forensic Applications. 000777548 506__ $$aAccess limited to authorized users. 000777548 520__ $$aThis book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court. 000777548 588__ $$aDescription based on print version record. 000777548 650_0 $$aMultimedia systems$$xSecurity measures. 000777548 650_0 $$aData encryption (Computer science) 000777548 650_0 $$aData protection. 000777548 650_0 $$aComputer crimes$$xInvestigation. 000777548 650_0 $$aForensic sciences. 000777548 7001_ $$aHassanien, Aboul Ella,$$eeditor. 000777548 77608 $$iPrint version:$$tMultimedia Forensics and Security.$$d[Place of publication not identified] : Springer-Verlag New York Inc 2016$$z9783319442686$$w(OCoLC)953709066 000777548 830_0 $$aIntelligent systems reference library ;$$vv.115. 000777548 852__ $$bebk 000777548 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-44270-9$$zOnline Access$$91397441.1 000777548 909CO $$ooai:library.usi.edu:777548$$pGLOBAL_SET 000777548 980__ $$aEBOOK 000777548 980__ $$aBIB 000777548 982__ $$aEbook 000777548 983__ $$aOnline 000777548 994__ $$a92$$bISE