000899014 000__ 05083cam\a2200469Ii\4500 000899014 001__ 899014 000899014 005__ 20230306150255.0 000899014 006__ m\\\\\o\\d\\\\\\\\ 000899014 007__ cr\cn\nnnunnun 000899014 008__ 190723s2019\\\\sz\a\\\\ob\\\\001\0\eng\d 000899014 019__ $$a1110080755$$a1110378134$$a1110902226$$a1111683906$$a1112118450$$a1112470993$$a1114214279 000899014 020__ $$a9783030158873$$q(electronic book) 000899014 020__ $$a303015887X$$q(electronic book) 000899014 020__ $$z9783030158866 000899014 020__ $$z3030158861 000899014 0247_ $$a10.1007/978-3-030-15 000899014 035__ $$aSP(OCoLC)on1109957125 000899014 035__ $$aSP(OCoLC)1109957125$$z(OCoLC)1110080755$$z(OCoLC)1110378134$$z(OCoLC)1110902226$$z(OCoLC)1111683906$$z(OCoLC)1112118450$$z(OCoLC)1112470993$$z(OCoLC)1114214279 000899014 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dYDX$$dLQU$$dUKMGB$$dGW5XE 000899014 049__ $$aISEA 000899014 050_4 $$aQA76.575 000899014 08204 $$a006.7$$223 000899014 24500 $$aHandbook of multimedia information security :$$btechniques and applications /$$ceditor, Amit Kumar Singh and Anand Mohan. 000899014 264_1 $$aCham :$$bSpringer,$$c[2019] 000899014 264_4 $$c©2019 000899014 300__ $$a1 online resource :$$billustrations 000899014 336__ $$atext$$btxt$$2rdacontent 000899014 337__ $$acomputer$$bc$$2rdamedia 000899014 338__ $$aonline resource$$bcr$$2rdacarrier 000899014 504__ $$aIncludes bibliographical references and index. 000899014 5050_ $$aPreface -- Froward -- Table of Contents -- Part 1 Multimedia Security -- 1. Information to Multimedia Tools and Applications -- 2. An overview of Biometrics Methods -- 3. SIE: An application to secure Stereo Images using Encryption -- 4. Example based Privacy-Preserving Video Color Grading -- 5. A novel Watermarking Technique for Multimedia Security -- 6. A Secure Medical Image Watermarking Technique for E-Healthcare Applications -- 7. Hybrid Transforms based Oblivious Fragile Watermarking Techniques -- 8. Performance Analysis of Invariant Quaternion Moments in Color Image Watermarking -- 9. Security Biometric and Biomedical Images using Sparse Domain based Watermarking Technique -- 10. Performance Analysis of Image Encryption Methods using Chaotic, Multiple Chaotic and Hyper-Chaotic Maps -- 11. Perceptual Hash function for images based on Hierarchical Ordinal Pattern -- 12. Hash Function based Optimal Blockchain Model for the Internet of Things -- 13. An Adaptive and Viable Face Identification for Android Mobile Devices -- 14. Realization of Chaos-Based Private Multiprocessor Network via USART of Embedded Devices -- 15. Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images -- Part II Multimedia Processing -- 1. Image Processing based Automated Glaucoma Detection Techniques and Role of De-noising: A Technical Survey -- 2. A Study on Dictionary Learning based Image Reconstruction Techniques for Big Medical Data -- 3. Quantum Image Processing and its Applications -- 4. 3-D Shape Reconstruction Based CT Image Enhancement -- 5. A segmentation-less Efficient Alzheimer Detection Approach using Hybrid Image Features -- 6. On Video based Human Abnormal Activity Detection with Histogram of Oriented Gradients -- 7. Enhancement and De-noising of OCT Image by Adaptive Wavelet Thresholding Method -- 8. Quantization Table Selection using Firefly with Teaching and Learning based Optimization Algorithm for Image Compression -- 9. Wavelet Packet Based CT Im age De-noising Using Bilateral Method and Bayes Shrinkage Rule -- 10. Automated Detection of Eye Related Diseases using Digital Image Processing -- 11. Detector and descriptor based Recognition and Counting of Objects in Real Time Environments -- Part III Multimedia Applications -- 1. Role of Multimedia in Medicine: Study of Visual Prosthesis -- 2. Finger Biometrics for e-Health Security -- 3. ECG Security Challenges: Case Study on Change of ECG According to Time for User Identification -- 4. An Efficient Lung Image Classification using GDA based Feature Reduction and Tree Classifier -- 5. Analysis of Streaming Data using Big Data and Hybrid Machine Learning Approach -- 6. Deep Neural Networks for Human Behavior Understanding -- 7. Digital Image Forensics-Gateway to Authenticity: Crafted with Observations, Trends and Forecasts -- 8. Resources Allocation in Co-operative Relay Networks for IOT Driven Broadband Multimedia Processing -- 10. Internet of Things for Healthcare: System Architecture, Predictive Analysis and Potential Challenges -- 11. Internet of Things with Blockchain Technology: State-of-the-art and Potential Challenges. 000899014 506__ $$aAccess limited to authorized users. 000899014 588__ $$aOnline resource ; title from PDF title page (viewed July 24, 2019). 000899014 650_0 $$aMultimedia systems. 000899014 650_0 $$aComputer security. 000899014 7001_ $$aSingh, Amit Kumar$$c(Of Jaypee University of Information Technology),$$eeditor. 000899014 7001_ $$aMohan, Anand$$c(Of Indian Institute of Technology),$$eeditor. 000899014 77608 $$iPrint version: $$z3030158861$$z9783030158866$$w(OCoLC)1086012108 000899014 852__ $$bebk 000899014 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-15887-3$$zOnline Access$$91397441.1 000899014 909CO $$ooai:library.usi.edu:899014$$pGLOBAL_SET 000899014 980__ $$aEBOOK 000899014 980__ $$aBIB 000899014 982__ $$aEbook 000899014 983__ $$aOnline 000899014 994__ $$a92$$bISE