Cryptographic and information security approaches for images and videos
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examp...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New Yrok
CRC Press
2024
|
Ausgabe: | Revised second edition |
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049027920 | ||
003 | DE-604 | ||
005 | 20241001 | ||
007 | t| | ||
008 | 230629s2024 xx a||| |||| 00||| eng d | ||
020 | |a 9781032598031 |c pbk |9 9781032598031 | ||
020 | |a 9781032598024 |c hbk |9 9781032598024 | ||
024 | 3 | |a 9781032598031 | |
035 | |a (OCoLC)1466924183 | ||
035 | |a (DE-599)BVBBV049027920 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
245 | 1 | 0 | |a Cryptographic and information security |b approaches for images and videos |c edited by S. Ramakrishnan |
250 | |a Revised second edition | ||
264 | 1 | |a Boca Raton ; London ; New Yrok |b CRC Press |c 2024 | |
300 | |a xx, 916 Seiten |b Illustrationen, Diagramme |c 234 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications. | ||
520 | |a This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques | ||
650 | 4 | |a bicssc / Legal aspects of IT | |
650 | 4 | |a bicssc / Computer security | |
650 | 4 | |a bicssc / Science - general issues | |
650 | 4 | |a bicssc / Environmental science, engineering & technology | |
650 | 4 | |a bicssc / Electrical engineering | |
650 | 4 | |a bicssc / Image processing | |
650 | 4 | |a bisacsh / COMPUTERS / Security / General | |
650 | 4 | |a bisacsh / COMPUTERS / Internet / General | |
650 | 4 | |a bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems | |
700 | 1 | |a Ramakrishnan, S. |0 (DE-588)1183871392 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9780429435461 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034290681 |
Datensatz im Suchindex
_version_ | 1820161031873232896 |
---|---|
adam_text | |
any_adam_object | |
author2 | Ramakrishnan, S. |
author2_role | edt |
author2_variant | s r sr |
author_GND | (DE-588)1183871392 |
author_facet | Ramakrishnan, S. |
building | Verbundindex |
bvnumber | BV049027920 |
ctrlnum | (OCoLC)1466924183 (DE-599)BVBBV049027920 |
edition | Revised second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049027920</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241001</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">230629s2024 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032598031</subfield><subfield code="c">pbk</subfield><subfield code="9">9781032598031</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032598024</subfield><subfield code="c">hbk</subfield><subfield code="9">9781032598024</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032598031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466924183</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049027920</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic and information security</subfield><subfield code="b">approaches for images and videos</subfield><subfield code="c">edited by S. Ramakrishnan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Revised second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New Yrok</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 916 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">234 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Science - general issues</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Environmental science, engineering & technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Image processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramakrishnan, S.</subfield><subfield code="0">(DE-588)1183871392</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9780429435461</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034290681</subfield></datafield></record></collection> |
id | DE-604.BV049027920 |
illustrated | Illustrated |
indexdate | 2025-01-02T18:00:27Z |
institution | BVB |
isbn | 9781032598031 9781032598024 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034290681 |
oclc_num | 1466924183 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xx, 916 Seiten Illustrationen, Diagramme 234 mm |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan Revised second edition Boca Raton ; London ; New Yrok CRC Press 2024 xx, 916 Seiten Illustrationen, Diagramme 234 mm txt rdacontent n rdamedia nc rdacarrier Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications. This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques bicssc / Legal aspects of IT bicssc / Computer security bicssc / Science - general issues bicssc / Environmental science, engineering & technology bicssc / Electrical engineering bicssc / Image processing bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / General bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems Ramakrishnan, S. (DE-588)1183871392 edt Erscheint auch als Online-Ausgabe 9780429435461 |
spellingShingle | Cryptographic and information security approaches for images and videos bicssc / Legal aspects of IT bicssc / Computer security bicssc / Science - general issues bicssc / Environmental science, engineering & technology bicssc / Electrical engineering bicssc / Image processing bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / General bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems |
title | Cryptographic and information security approaches for images and videos |
title_auth | Cryptographic and information security approaches for images and videos |
title_exact_search | Cryptographic and information security approaches for images and videos |
title_full | Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan |
title_fullStr | Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan |
title_full_unstemmed | Cryptographic and information security approaches for images and videos edited by S. Ramakrishnan |
title_short | Cryptographic and information security |
title_sort | cryptographic and information security approaches for images and videos |
title_sub | approaches for images and videos |
topic | bicssc / Legal aspects of IT bicssc / Computer security bicssc / Science - general issues bicssc / Environmental science, engineering & technology bicssc / Electrical engineering bicssc / Image processing bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / General bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems |
topic_facet | bicssc / Legal aspects of IT bicssc / Computer security bicssc / Science - general issues bicssc / Environmental science, engineering & technology bicssc / Electrical engineering bicssc / Image processing bisacsh / COMPUTERS / Security / General bisacsh / COMPUTERS / Internet / General bisacsh / TECHNOLOGY & ENGINEERING / Imaging Systems |
work_keys_str_mv | AT ramakrishnans cryptographicandinformationsecurityapproachesforimagesandvideos |