Cryptographic and information security approaches for images and videos

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Ramakrishnan, S. (HerausgeberIn)
Format: Buch
Sprache:English
Veröffentlicht: Boca Raton ; London ; New Yrok CRC Press 2024
Ausgabe:Revised second edition
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV049027920
003 DE-604
005 20241001
007 t|
008 230629s2024 xx a||| |||| 00||| eng d
020 |a 9781032598031  |c pbk  |9 9781032598031 
020 |a 9781032598024  |c hbk  |9 9781032598024 
024 3 |a 9781032598031 
035 |a (OCoLC)1466924183 
035 |a (DE-599)BVBBV049027920 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-29T 
245 1 0 |a Cryptographic and information security  |b approaches for images and videos  |c edited by S. Ramakrishnan 
250 |a Revised second edition 
264 1 |a Boca Raton ; London ; New Yrok  |b CRC Press  |c 2024 
300 |a xx, 916 Seiten  |b Illustrationen, Diagramme  |c 234 mm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
500 |a Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications. 
520 |a This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques 
650 4 |a bicssc / Legal aspects of IT 
650 4 |a bicssc / Computer security 
650 4 |a bicssc / Science - general issues 
650 4 |a bicssc / Environmental science, engineering & technology 
650 4 |a bicssc / Electrical engineering 
650 4 |a bicssc / Image processing 
650 4 |a bisacsh / COMPUTERS / Security / General 
650 4 |a bisacsh / COMPUTERS / Internet / General 
650 4 |a bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems 
700 1 |a Ramakrishnan, S.  |0 (DE-588)1183871392  |4 edt 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 9780429435461 
943 1 |a oai:aleph.bib-bvb.de:BVB01-034290681 

Datensatz im Suchindex

_version_ 1820161031873232896
adam_text
any_adam_object
author2 Ramakrishnan, S.
author2_role edt
author2_variant s r sr
author_GND (DE-588)1183871392
author_facet Ramakrishnan, S.
building Verbundindex
bvnumber BV049027920
ctrlnum (OCoLC)1466924183
(DE-599)BVBBV049027920
edition Revised second edition
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049027920</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241001</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">230629s2024 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032598031</subfield><subfield code="c">pbk</subfield><subfield code="9">9781032598031</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032598024</subfield><subfield code="c">hbk</subfield><subfield code="9">9781032598024</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032598031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466924183</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049027920</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic and information security</subfield><subfield code="b">approaches for images and videos</subfield><subfield code="c">edited by S. Ramakrishnan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Revised second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New Yrok</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 916 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">234 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Science - general issues</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Environmental science, engineering &amp; technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Image processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / TECHNOLOGY &amp; ENGINEERING / Imaging Systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramakrishnan, S.</subfield><subfield code="0">(DE-588)1183871392</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9780429435461</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034290681</subfield></datafield></record></collection>
id DE-604.BV049027920
illustrated Illustrated
indexdate 2025-01-02T18:00:27Z
institution BVB
isbn 9781032598031
9781032598024
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034290681
oclc_num 1466924183
open_access_boolean
owner DE-29T
owner_facet DE-29T
physical xx, 916 Seiten Illustrationen, Diagramme 234 mm
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher CRC Press
record_format marc
spelling Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan
Revised second edition
Boca Raton ; London ; New Yrok CRC Press 2024
xx, 916 Seiten Illustrationen, Diagramme 234 mm
txt rdacontent
n rdamedia
nc rdacarrier
Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques
bicssc / Legal aspects of IT
bicssc / Computer security
bicssc / Science - general issues
bicssc / Environmental science, engineering & technology
bicssc / Electrical engineering
bicssc / Image processing
bisacsh / COMPUTERS / Security / General
bisacsh / COMPUTERS / Internet / General
bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems
Ramakrishnan, S. (DE-588)1183871392 edt
Erscheint auch als Online-Ausgabe 9780429435461
spellingShingle Cryptographic and information security approaches for images and videos
bicssc / Legal aspects of IT
bicssc / Computer security
bicssc / Science - general issues
bicssc / Environmental science, engineering & technology
bicssc / Electrical engineering
bicssc / Image processing
bisacsh / COMPUTERS / Security / General
bisacsh / COMPUTERS / Internet / General
bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems
title Cryptographic and information security approaches for images and videos
title_auth Cryptographic and information security approaches for images and videos
title_exact_search Cryptographic and information security approaches for images and videos
title_full Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan
title_fullStr Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan
title_full_unstemmed Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan
title_short Cryptographic and information security
title_sort cryptographic and information security approaches for images and videos
title_sub approaches for images and videos
topic bicssc / Legal aspects of IT
bicssc / Computer security
bicssc / Science - general issues
bicssc / Environmental science, engineering & technology
bicssc / Electrical engineering
bicssc / Image processing
bisacsh / COMPUTERS / Security / General
bisacsh / COMPUTERS / Internet / General
bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems
topic_facet bicssc / Legal aspects of IT
bicssc / Computer security
bicssc / Science - general issues
bicssc / Environmental science, engineering & technology
bicssc / Electrical engineering
bicssc / Image processing
bisacsh / COMPUTERS / Security / General
bisacsh / COMPUTERS / Internet / General
bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems
work_keys_str_mv AT ramakrishnans cryptographicandinformationsecurityapproachesforimagesandvideos